Skip to content

Commit b2ce04c

Browse files
dwindsorkees
authored andcommitted
sctp: Copy struct sctp_sock.autoclose to userspace using put_user()
The autoclose field can be copied with put_user(), so there is no need to use copy_to_user(). In both cases, hardened usercopy is being bypassed since the size is constant, and not open to runtime manipulation. This patch is verbatim from Brad Spengler/PaX Team's PAX_USERCOPY whitelisting code in the last public patch of grsecurity/PaX based on my understanding of the code. Changes or omissions from the original code are mine and don't reflect the original grsecurity/PaX code. Signed-off-by: David Windsor <dave@nullcore.net> [kees: adjust commit log] Cc: Vlad Yasevich <vyasevich@gmail.com> Cc: Neil Horman <nhorman@tuxdriver.com> Cc: "David S. Miller" <davem@davemloft.net> Cc: linux-sctp@vger.kernel.org Cc: netdev@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org>
1 parent ab9ee8e commit b2ce04c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

net/sctp/socket.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5011,7 +5011,7 @@ static int sctp_getsockopt_autoclose(struct sock *sk, int len, char __user *optv
50115011
len = sizeof(int);
50125012
if (put_user(len, optlen))
50135013
return -EFAULT;
5014-
if (copy_to_user(optval, &sctp_sk(sk)->autoclose, sizeof(int)))
5014+
if (put_user(sctp_sk(sk)->autoclose, (int __user *)optval))
50155015
return -EFAULT;
50165016
return 0;
50175017
}

0 commit comments

Comments
 (0)