diff options
author | Viresh Kumar <viresh.kumar@linaro.org> | 2019-11-07 08:50:25 +0530 |
---|---|---|
committer | Jason Gunthorpe <jgg@mellanox.com> | 2019-11-14 11:49:15 -0400 |
commit | 7ee23491b39259ae83899dd93b2a29ef0f22f0a7 (patch) | |
tree | 924f3d8b13496eddaf6e1a2417d8b2a4964b0bac /drivers/infiniband | |
parent | da046d5f895fca18d63b15ac8faebd5bf784e23a (diff) | |
download | blackbird-op-linux-7ee23491b39259ae83899dd93b2a29ef0f22f0a7.tar.gz blackbird-op-linux-7ee23491b39259ae83899dd93b2a29ef0f22f0a7.zip |
RDMA/qib: Validate ->show()/store() callbacks before calling them
The permissions of the read-only or write-only sysfs files can be
changed (as root) and the user can then try to read a write-only file or
write to a read-only file which will lead to kernel crash here.
Protect against that by always validating the show/store callbacks.
Link: https://lore.kernel.org/r/d45cc26361a174ae12dbb86c994ef334d257924b.1573096807.git.viresh.kumar@linaro.org
Signed-off-by: Viresh Kumar <viresh.kumar@linaro.org>
Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
Diffstat (limited to 'drivers/infiniband')
-rw-r--r-- | drivers/infiniband/hw/qib/qib_sysfs.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/drivers/infiniband/hw/qib/qib_sysfs.c b/drivers/infiniband/hw/qib/qib_sysfs.c index 3926be78036e..568b21eb6ea1 100644 --- a/drivers/infiniband/hw/qib/qib_sysfs.c +++ b/drivers/infiniband/hw/qib/qib_sysfs.c @@ -301,6 +301,9 @@ static ssize_t qib_portattr_show(struct kobject *kobj, struct qib_pportdata *ppd = container_of(kobj, struct qib_pportdata, pport_kobj); + if (!pattr->show) + return -EIO; + return pattr->show(ppd, buf); } @@ -312,6 +315,9 @@ static ssize_t qib_portattr_store(struct kobject *kobj, struct qib_pportdata *ppd = container_of(kobj, struct qib_pportdata, pport_kobj); + if (!pattr->store) + return -EIO; + return pattr->store(ppd, buf, len); } |