Re: [PATCH net-next] net: ethtool: Fix out-of-bounds copy to user

From: Alexander Duyck
Date: Thu Jun 08 2023 - 10:18:08 EST


On Thu, Jun 8, 2023 at 2:06 AM Ding Hui <dinghui@xxxxxxxxxxxxxx> wrote:
>
> On 2023/6/6 2:39, Jakub Kicinski wrote:
> > On Mon, 5 Jun 2023 11:39:59 +0800 Ding Hui wrote:
> >> Case 1:
> >> If the user len/n_stats is not zero, we will treat it as correct usage
> >> (although we cannot distinguish between the real correct usage and
> >> uninitialized usage). Return -EINVAL if current length exceed the one
> >> user specified.
> >
> > This assumes user will zero-initialize the value rather than do
> > something like:
> >
> > buf = malloc(1 << 16); // 64k should always be enough
> > ioctl(s, ETHTOOL_GSTATS, buf)
> >
> > for (i = 0; i < buf.n_stats; i++)
> > /* use stats */
> >
> > :(
> >
>
> Sorry for late.
>
> Now I'm not sure what can I do next besides reporting the issue.

Well as I said before. The issue points to a driver problem more than
anything else.

Normally the solution is to make it so that the counts don't
fluctuate. That mostly consists of providing strings equal to the
maximum count, and then 0 populating the data for any fields that
don't exist in the case of ethtool -S.

So for example in the case of igb which you had pointed out you could
take a look at ixgbe for inspiration on how to fix it since the two
drivers should be similar and one has the issue and one does not.