linux-can.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
@ 2021-03-24 21:54 Oliver Hartkopp
  2021-03-24 22:19 ` Richard Weinberger
  2021-03-25  8:13 ` Kurt Van Dijck
  0 siblings, 2 replies; 7+ messages in thread
From: Oliver Hartkopp @ 2021-03-24 21:54 UTC (permalink / raw)
  To: linux-can; +Cc: Oliver Hartkopp, Richard Weinberger, Kurt Van Dijck

Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939
members") the sockaddr_can has been extended in size and a new
CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol
specific needed size.

The ABI for the msg_name and msg_namelen has not been adapted to the
new CAN_REQUIRED_SIZE macro which leads to a problem when an existing
binary reads the (increased) struct sockaddr_can in msg_name.

Fixes: f5223e9eee65 ("can: extend sockaddr_can to include j1939 members")
Link: https://lore.kernel.org/linux-can/1135648123.112255.1616613706554.JavaMail.zimbra@nod.at/T/#t
Reported-by: Richard Weinberger <richard@nod.at>
Suggested-by: Kurt Van Dijck <dev.kurt@vandijck-laurijssen.be>
Signed-off-by: Oliver Hartkopp <socketcan@hartkopp.net>
---
 net/can/bcm.c   | 14 ++++++++++----
 net/can/isotp.c | 14 ++++++++++----
 net/can/raw.c   | 17 +++++++++++------
 3 files changed, 31 insertions(+), 14 deletions(-)

diff --git a/net/can/bcm.c b/net/can/bcm.c
index 0e5c37be4a2b..0886d5bca65d 100644
--- a/net/can/bcm.c
+++ b/net/can/bcm.c
@@ -84,10 +84,12 @@
 MODULE_DESCRIPTION("PF_CAN broadcast manager protocol");
 MODULE_LICENSE("Dual BSD/GPL");
 MODULE_AUTHOR("Oliver Hartkopp <oliver.hartkopp@volkswagen.de>");
 MODULE_ALIAS("can-proto-2");
 
+#define BCM_MIN_NAMELEN CAN_REQUIRED_SIZE(struct sockaddr_can, can_ifindex)
+
 /*
  * easy access to the first 64 bit of can(fd)_frame payload. cp->data is
  * 64 bit aligned so the offset has to be multiples of 8 which is ensured
  * by the only callers in bcm_rx_cmp_to_index() bcm_rx_handler().
  */
@@ -1290,11 +1292,11 @@ static int bcm_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
 
 	if (!ifindex && msg->msg_name) {
 		/* no bound device as default => check msg_name */
 		DECLARE_SOCKADDR(struct sockaddr_can *, addr, msg->msg_name);
 
-		if (msg->msg_namelen < CAN_REQUIRED_SIZE(*addr, can_ifindex))
+		if (msg->msg_namelen < BCM_MIN_NAMELEN)
 			return -EINVAL;
 
 		if (addr->can_family != AF_CAN)
 			return -EINVAL;
 
@@ -1532,11 +1534,11 @@ static int bcm_connect(struct socket *sock, struct sockaddr *uaddr, int len,
 	struct sock *sk = sock->sk;
 	struct bcm_sock *bo = bcm_sk(sk);
 	struct net *net = sock_net(sk);
 	int ret = 0;
 
-	if (len < CAN_REQUIRED_SIZE(*addr, can_ifindex))
+	if (len < BCM_MIN_NAMELEN)
 		return -EINVAL;
 
 	lock_sock(sk);
 
 	if (bo->bound) {
@@ -1598,10 +1600,14 @@ static int bcm_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	int noblock;
 	int err;
 
 	noblock =  flags & MSG_DONTWAIT;
 	flags   &= ~MSG_DONTWAIT;
+
+	if (msg->msg_name && msg->msg_namelen < BCM_MIN_NAMELEN)
+		return -EINVAL;
+
 	skb = skb_recv_datagram(sk, flags, noblock, &error);
 	if (!skb)
 		return error;
 
 	if (skb->len < size)
@@ -1614,12 +1620,12 @@ static int bcm_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	}
 
 	sock_recv_ts_and_drops(msg, sk, skb);
 
 	if (msg->msg_name) {
-		__sockaddr_check_size(sizeof(struct sockaddr_can));
-		msg->msg_namelen = sizeof(struct sockaddr_can);
+		__sockaddr_check_size(BCM_MIN_NAMELEN);
+		msg->msg_namelen = BCM_MIN_NAMELEN;
 		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
 	}
 
 	skb_free_datagram(sk, skb);
 
diff --git a/net/can/isotp.c b/net/can/isotp.c
index 3ef7f78e553b..29ad5b7077df 100644
--- a/net/can/isotp.c
+++ b/net/can/isotp.c
@@ -75,10 +75,12 @@
 MODULE_DESCRIPTION("PF_CAN isotp 15765-2:2016 protocol");
 MODULE_LICENSE("Dual BSD/GPL");
 MODULE_AUTHOR("Oliver Hartkopp <socketcan@hartkopp.net>");
 MODULE_ALIAS("can-proto-6");
 
+#define ISOTP_MIN_NAMELEN CAN_REQUIRED_SIZE(struct sockaddr_can, can_addr.tp)
+
 #define SINGLE_MASK(id) (((id) & CAN_EFF_FLAG) ? \
 			 (CAN_EFF_MASK | CAN_EFF_FLAG | CAN_RTR_FLAG) : \
 			 (CAN_SFF_MASK | CAN_EFF_FLAG | CAN_RTR_FLAG))
 
 /* ISO 15765-2:2016 supports more than 4095 byte per ISO PDU as the FF_DL can
@@ -969,10 +971,13 @@ static int isotp_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	int noblock;
 
 	noblock = flags & MSG_DONTWAIT;
 	flags &= ~MSG_DONTWAIT;
 
+	if (msg->msg_name && msg->msg_namelen < ISOTP_MIN_NAMELEN)
+		return -EINVAL;
+
 	skb = skb_recv_datagram(sk, flags, noblock, &err);
 	if (!skb)
 		return err;
 
 	if (size < skb->len)
@@ -987,11 +992,12 @@ static int isotp_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	}
 
 	sock_recv_timestamp(msg, sk, skb);
 
 	if (msg->msg_name) {
-		msg->msg_namelen = sizeof(struct sockaddr_can);
+		__sockaddr_check_size(ISOTP_MIN_NAMELEN);
+		msg->msg_namelen = ISOTP_MIN_NAMELEN;
 		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
 	}
 
 	skb_free_datagram(sk, skb);
 
@@ -1057,11 +1063,11 @@ static int isotp_bind(struct socket *sock, struct sockaddr *uaddr, int len)
 	struct net_device *dev;
 	int err = 0;
 	int notify_enetdown = 0;
 	int do_rx_reg = 1;
 
-	if (len < CAN_REQUIRED_SIZE(struct sockaddr_can, can_addr.tp))
+	if (len < ISOTP_MIN_NAMELEN)
 		return -EINVAL;
 
 	/* do not register frame reception for functional addressing */
 	if (so->opt.flags & CAN_ISOTP_SF_BROADCAST)
 		do_rx_reg = 0;
@@ -1153,17 +1159,17 @@ static int isotp_getname(struct socket *sock, struct sockaddr *uaddr, int peer)
 	struct isotp_sock *so = isotp_sk(sk);
 
 	if (peer)
 		return -EOPNOTSUPP;
 
-	memset(addr, 0, sizeof(*addr));
+	memset(addr, 0, ISOTP_MIN_NAMELEN);
 	addr->can_family = AF_CAN;
 	addr->can_ifindex = so->ifindex;
 	addr->can_addr.tp.rx_id = so->rxid;
 	addr->can_addr.tp.tx_id = so->txid;
 
-	return sizeof(*addr);
+	return ISOTP_MIN_NAMELEN;
 }
 
 static int isotp_setsockopt(struct socket *sock, int level, int optname,
 			    sockptr_t optval, unsigned int optlen)
 {
diff --git a/net/can/raw.c b/net/can/raw.c
index 37b47a39a3ed..d6eaa1d4eadb 100644
--- a/net/can/raw.c
+++ b/net/can/raw.c
@@ -58,10 +58,12 @@
 MODULE_DESCRIPTION("PF_CAN raw protocol");
 MODULE_LICENSE("Dual BSD/GPL");
 MODULE_AUTHOR("Urs Thuermann <urs.thuermann@volkswagen.de>");
 MODULE_ALIAS("can-proto-1");
 
+#define RAW_MIN_NAMELEN CAN_REQUIRED_SIZE(struct sockaddr_can, can_ifindex)
+
 #define MASK_ALL 0
 
 /* A raw socket has a list of can_filters attached to it, each receiving
  * the CAN frames matching that filter.  If the filter list is empty,
  * no CAN frames will be received by the socket.  The default after
@@ -392,11 +394,11 @@ static int raw_bind(struct socket *sock, struct sockaddr *uaddr, int len)
 	struct raw_sock *ro = raw_sk(sk);
 	int ifindex;
 	int err = 0;
 	int notify_enetdown = 0;
 
-	if (len < CAN_REQUIRED_SIZE(*addr, can_ifindex))
+	if (len < RAW_MIN_NAMELEN)
 		return -EINVAL;
 	if (addr->can_family != AF_CAN)
 		return -EINVAL;
 
 	lock_sock(sk);
@@ -473,15 +475,15 @@ static int raw_getname(struct socket *sock, struct sockaddr *uaddr,
 	struct raw_sock *ro = raw_sk(sk);
 
 	if (peer)
 		return -EOPNOTSUPP;
 
-	memset(addr, 0, sizeof(*addr));
+	memset(addr, 0, RAW_MIN_NAMELEN);
 	addr->can_family  = AF_CAN;
 	addr->can_ifindex = ro->ifindex;
 
-	return sizeof(*addr);
+	return RAW_MIN_NAMELEN;
 }
 
 static int raw_setsockopt(struct socket *sock, int level, int optname,
 			  sockptr_t optval, unsigned int optlen)
 {
@@ -737,11 +739,11 @@ static int raw_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
 	int err;
 
 	if (msg->msg_name) {
 		DECLARE_SOCKADDR(struct sockaddr_can *, addr, msg->msg_name);
 
-		if (msg->msg_namelen < CAN_REQUIRED_SIZE(*addr, can_ifindex))
+		if (msg->msg_namelen < RAW_MIN_NAMELEN)
 			return -EINVAL;
 
 		if (addr->can_family != AF_CAN)
 			return -EINVAL;
 
@@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	int noblock;
 
 	noblock = flags & MSG_DONTWAIT;
 	flags &= ~MSG_DONTWAIT;
 
+	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
+		return -EINVAL;
+
 	if (flags & MSG_ERRQUEUE)
 		return sock_recv_errqueue(sk, msg, size,
 					  SOL_CAN_RAW, SCM_CAN_RAW_ERRQUEUE);
 
 	skb = skb_recv_datagram(sk, flags, noblock, &err);
@@ -830,12 +835,12 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 	}
 
 	sock_recv_ts_and_drops(msg, sk, skb);
 
 	if (msg->msg_name) {
-		__sockaddr_check_size(sizeof(struct sockaddr_can));
-		msg->msg_namelen = sizeof(struct sockaddr_can);
+		__sockaddr_check_size(RAW_MIN_NAMELEN);
+		msg->msg_namelen = RAW_MIN_NAMELEN;
 		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
 	}
 
 	/* assign the flags that have been recorded in raw_rcv() */
 	msg->msg_flags |= *(raw_flags(skb));
-- 
2.30.2


^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-24 21:54 [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE Oliver Hartkopp
@ 2021-03-24 22:19 ` Richard Weinberger
  2021-03-25  7:31   ` Oliver Hartkopp
  2021-03-25  8:13 ` Kurt Van Dijck
  1 sibling, 1 reply; 7+ messages in thread
From: Richard Weinberger @ 2021-03-24 22:19 UTC (permalink / raw)
  To: Oliver Hartkopp; +Cc: linux-can, Kurt Van Dijck

Oliver,

----- Ursprüngliche Mail -----
> @@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr
> *msg, size_t size,
> 	int noblock;
> 
> 	noblock = flags & MSG_DONTWAIT;
> 	flags &= ~MSG_DONTWAIT;
> 
> +	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
> +		return -EINVAL;
> +

Like with Kurt's patch, my test fails here too because msg->msg_namelen is 0.
->msg_namelen is always 0 in the recvfrom() case.

Thanks,
//richard

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-24 22:19 ` Richard Weinberger
@ 2021-03-25  7:31   ` Oliver Hartkopp
  2021-03-25  8:07     ` Kurt Van Dijck
  0 siblings, 1 reply; 7+ messages in thread
From: Oliver Hartkopp @ 2021-03-25  7:31 UTC (permalink / raw)
  To: Richard Weinberger; +Cc: linux-can, Kurt Van Dijck



On 24.03.21 23:19, Richard Weinberger wrote:
> Oliver,
> 
> ----- Ursprüngliche Mail -----
>> @@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr
>> *msg, size_t size,
>> 	int noblock;
>>
>> 	noblock = flags & MSG_DONTWAIT;
>> 	flags &= ~MSG_DONTWAIT;
>>
>> +	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
>> +		return -EINVAL;
>> +
> 
> Like with Kurt's patch, my test fails here too because msg->msg_namelen is 0.
> ->msg_namelen is always 0 in the recvfrom() case.

Agreed!

I just adopted that part and did no more testing yesterday (needed some 
sleep).

E.g. 'candump any' also fails at CAN frame reception time due to this 
wrong check ;-)

Will send an update soon.

Regards,
Oliver

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-25  7:31   ` Oliver Hartkopp
@ 2021-03-25  8:07     ` Kurt Van Dijck
  2021-03-25  8:46       ` Kurt Van Dijck
  0 siblings, 1 reply; 7+ messages in thread
From: Kurt Van Dijck @ 2021-03-25  8:07 UTC (permalink / raw)
  To: Oliver Hartkopp; +Cc: Richard Weinberger, linux-can

On Thu, 25 Mar 2021 08:31:09 +0100, Oliver Hartkopp wrote:
> On 24.03.21 23:19, Richard Weinberger wrote:
> >Oliver,
> >
> >----- Ursprüngliche Mail -----
> >>@@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr
> >>*msg, size_t size,
> >>	int noblock;
> >>
> >>	noblock = flags & MSG_DONTWAIT;
> >>	flags &= ~MSG_DONTWAIT;
> >>
> >>+	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
> >>+		return -EINVAL;
> >>+
> >
> >Like with Kurt's patch, my test fails here too because msg->msg_namelen is 0.
> >->msg_namelen is always 0 in the recvfrom() case.
> 
> Agreed!
> 
> I just adopted that part and did no more testing yesterday (needed some
> sleep).
> 
> E.g. 'candump any' also fails at CAN frame reception time due to this wrong
> check ;-)

I'd like to understand how this check is wrong.
msg->msg_namelen should contain the size of msg->msg_name, isn't it.
if that is less than RAW_MIN_NAMELEN, you can't store the address.

candump sets msg->msg_namelen to sizeof(), so it is not 0.

> 
> Will send an update soon.

looking forward
Kurt

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-24 21:54 [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE Oliver Hartkopp
  2021-03-24 22:19 ` Richard Weinberger
@ 2021-03-25  8:13 ` Kurt Van Dijck
  2021-03-25  8:16   ` Oliver Hartkopp
  1 sibling, 1 reply; 7+ messages in thread
From: Kurt Van Dijck @ 2021-03-25  8:13 UTC (permalink / raw)
  To: Oliver Hartkopp; +Cc: linux-can, Richard Weinberger

On Wed, 24 Mar 2021 22:54:42 +0100, Oliver Hartkopp wrote:
> Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939
> members") the sockaddr_can has been extended in size and a new
> CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol
> specific needed size.
> 
> The ABI for the msg_name and msg_namelen has not been adapted to the
> new CAN_REQUIRED_SIZE macro which leads to a problem when an existing
> binary reads the (increased) struct sockaddr_can in msg_name.
> 
> Fixes: f5223e9eee65 ("can: extend sockaddr_can to include j1939 members")
> Link: https://lore.kernel.org/linux-can/1135648123.112255.1616613706554.JavaMail.zimbra@nod.at/T/#t
> Reported-by: Richard Weinberger <richard@nod.at>
> Suggested-by: Kurt Van Dijck <dev.kurt@vandijck-laurijssen.be>
> Signed-off-by: Oliver Hartkopp <socketcan@hartkopp.net>
> ---
>  net/can/bcm.c   | 14 ++++++++++----
>  net/can/isotp.c | 14 ++++++++++----
>  net/can/raw.c   | 17 +++++++++++------
>  3 files changed, 31 insertions(+), 14 deletions(-)
> 
...
> @@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
>  	int noblock;
>  
>  	noblock = flags & MSG_DONTWAIT;
>  	flags &= ~MSG_DONTWAIT;
>  
> +	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
> +		return -EINVAL;
> +
>  	if (flags & MSG_ERRQUEUE)
>  		return sock_recv_errqueue(sk, msg, size,
>  					  SOL_CAN_RAW, SCM_CAN_RAW_ERRQUEUE);
>  
>  	skb = skb_recv_datagram(sk, flags, noblock, &err);
> @@ -830,12 +835,12 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
>  	}
>  
>  	sock_recv_ts_and_drops(msg, sk, skb);
>  
>  	if (msg->msg_name) {
> -		__sockaddr_check_size(sizeof(struct sockaddr_can));
> -		msg->msg_namelen = sizeof(struct sockaddr_can);
> +		__sockaddr_check_size(RAW_MIN_NAMELEN);
> +		msg->msg_namelen = RAW_MIN_NAMELEN;

Why not fill up to MIN(msg->msg_namelen, sizeof(struct sockaddr_can))? 

>  		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
>  	}
>  
>  	/* assign the flags that have been recorded in raw_rcv() */
>  	msg->msg_flags |= *(raw_flags(skb));
> -- 
> 2.30.2
> 

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-25  8:13 ` Kurt Van Dijck
@ 2021-03-25  8:16   ` Oliver Hartkopp
  0 siblings, 0 replies; 7+ messages in thread
From: Oliver Hartkopp @ 2021-03-25  8:16 UTC (permalink / raw)
  To: linux-can, Richard Weinberger



On 25.03.21 09:13, Kurt Van Dijck wrote:
> On Wed, 24 Mar 2021 22:54:42 +0100, Oliver Hartkopp wrote:
>> Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939
>> members") the sockaddr_can has been extended in size and a new
>> CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol
>> specific needed size.
>>
>> The ABI for the msg_name and msg_namelen has not been adapted to the
>> new CAN_REQUIRED_SIZE macro which leads to a problem when an existing
>> binary reads the (increased) struct sockaddr_can in msg_name.
>>
>> Fixes: f5223e9eee65 ("can: extend sockaddr_can to include j1939 members")
>> Link: https://lore.kernel.org/linux-can/1135648123.112255.1616613706554.JavaMail.zimbra@nod.at/T/#t
>> Reported-by: Richard Weinberger <richard@nod.at>
>> Suggested-by: Kurt Van Dijck <dev.kurt@vandijck-laurijssen.be>
>> Signed-off-by: Oliver Hartkopp <socketcan@hartkopp.net>
>> ---
>>   net/can/bcm.c   | 14 ++++++++++----
>>   net/can/isotp.c | 14 ++++++++++----
>>   net/can/raw.c   | 17 +++++++++++------
>>   3 files changed, 31 insertions(+), 14 deletions(-)
>>
> ...
>> @@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
>>   	int noblock;
>>   
>>   	noblock = flags & MSG_DONTWAIT;
>>   	flags &= ~MSG_DONTWAIT;
>>   
>> +	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
>> +		return -EINVAL;
>> +
>>   	if (flags & MSG_ERRQUEUE)
>>   		return sock_recv_errqueue(sk, msg, size,
>>   					  SOL_CAN_RAW, SCM_CAN_RAW_ERRQUEUE);
>>   
>>   	skb = skb_recv_datagram(sk, flags, noblock, &err);
>> @@ -830,12 +835,12 @@ static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
>>   	}
>>   
>>   	sock_recv_ts_and_drops(msg, sk, skb);
>>   
>>   	if (msg->msg_name) {
>> -		__sockaddr_check_size(sizeof(struct sockaddr_can));
>> -		msg->msg_namelen = sizeof(struct sockaddr_can);
>> +		__sockaddr_check_size(RAW_MIN_NAMELEN);
>> +		msg->msg_namelen = RAW_MIN_NAMELEN;
> 
> Why not fill up to MIN(msg->msg_namelen, sizeof(struct sockaddr_can))?
> 

I checked that in j1939/socket.c and there the content is also reduced 
to the minimum size.

At least that makes sense to me to have that consistent.

Regards,
Oliver

>>   		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
>>   	}
>>   
>>   	/* assign the flags that have been recorded in raw_rcv() */
>>   	msg->msg_flags |= *(raw_flags(skb));
>> -- 
>> 2.30.2
>>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE
  2021-03-25  8:07     ` Kurt Van Dijck
@ 2021-03-25  8:46       ` Kurt Van Dijck
  0 siblings, 0 replies; 7+ messages in thread
From: Kurt Van Dijck @ 2021-03-25  8:46 UTC (permalink / raw)
  To: Oliver Hartkopp, Richard Weinberger, linux-can

On Thu, 25 Mar 2021 09:07:23 +0100, Kurt Van Dijck wrote:
> On Thu, 25 Mar 2021 08:31:09 +0100, Oliver Hartkopp wrote:
> > On 24.03.21 23:19, Richard Weinberger wrote:
> > >Oliver,
> > >
> > >----- Ursprüngliche Mail -----
> > >>@@ -808,10 +810,13 @@ static int raw_recvmsg(struct socket *sock, struct msghdr
> > >>*msg, size_t size,
> > >>	int noblock;
> > >>
> > >>	noblock = flags & MSG_DONTWAIT;
> > >>	flags &= ~MSG_DONTWAIT;
> > >>
> > >>+	if (msg->msg_name && msg->msg_namelen < RAW_MIN_NAMELEN)
> > >>+		return -EINVAL;
> > >>+

This indeed fails. There exists a thin layer between the syscall and
socket's recvmsg that puts a seperate sockaddr and length 0 :-(

> > >
> > >Like with Kurt's patch, my test fails here too because msg->msg_namelen is 0.
> > >->msg_namelen is always 0 in the recvfrom() case.
> > 
> > Agreed!
> > 
> > I just adopted that part and did no more testing yesterday (needed some
> > sleep).
> > 
> > E.g. 'candump any' also fails at CAN frame reception time due to this wrong
> > check ;-)
> 
> I'd like to understand how this check is wrong.
> msg->msg_namelen should contain the size of msg->msg_name, isn't it.
> if that is less than RAW_MIN_NAMELEN, you can't store the address.
> 
> candump sets msg->msg_namelen to sizeof(), so it is not 0.
> 
> > 
> > Will send an update soon.
> 
> looking forward
> Kurt

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2021-03-25  8:47 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-03-24 21:54 [PATCH] [RFC] can: fix msg_namelen values depending on CAN_REQUIRED_SIZE Oliver Hartkopp
2021-03-24 22:19 ` Richard Weinberger
2021-03-25  7:31   ` Oliver Hartkopp
2021-03-25  8:07     ` Kurt Van Dijck
2021-03-25  8:46       ` Kurt Van Dijck
2021-03-25  8:13 ` Kurt Van Dijck
2021-03-25  8:16   ` Oliver Hartkopp

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).