|
@@ -1297,6 +1297,7 @@ static int ipa3_ioctl_add_rt_rule_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1335,6 +1336,24 @@ static int ipa3_ioctl_add_rt_rule_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_add_rt_rule_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_add_rt_rule_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_add_rt_rule_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1374,6 +1393,8 @@ static int ipa3_ioctl_add_rt_rule_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1389,6 +1410,7 @@ static int ipa3_ioctl_add_rt_rule_ext_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header,
|
|
@@ -1430,6 +1452,24 @@ static int ipa3_ioctl_add_rt_rule_ext_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_add_rt_rule_ext_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_add_rt_rule_ext_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_add_rt_rule_ext_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1471,6 +1511,8 @@ static int ipa3_ioctl_add_rt_rule_ext_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1486,6 +1528,7 @@ static int ipa3_ioctl_add_rt_rule_after_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1526,6 +1569,23 @@ static int ipa3_ioctl_add_rt_rule_after_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_add_rt_rule_after_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_add_rt_rule_after_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_add_rt_rule_after_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1565,6 +1625,8 @@ static int ipa3_ioctl_add_rt_rule_after_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1580,6 +1642,7 @@ static int ipa3_ioctl_mdfy_rt_rule_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1620,6 +1683,23 @@ static int ipa3_ioctl_mdfy_rt_rule_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_mdfy_rt_rule_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_mdfy_rt_rule_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_mdfy_rt_rule_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1659,6 +1739,8 @@ static int ipa3_ioctl_mdfy_rt_rule_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1674,6 +1756,7 @@ static int ipa3_ioctl_add_flt_rule_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1713,6 +1796,23 @@ static int ipa3_ioctl_add_flt_rule_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_add_flt_rule_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_add_flt_rule_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_add_flt_rule_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1751,6 +1851,8 @@ static int ipa3_ioctl_add_flt_rule_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1766,6 +1868,7 @@ static int ipa3_ioctl_add_flt_rule_after_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1806,6 +1909,23 @@ static int ipa3_ioctl_add_flt_rule_after_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_add_flt_rule_after_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_add_flt_rule_after_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_add_flt_rule_after_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1845,6 +1965,8 @@ static int ipa3_ioctl_add_flt_rule_after_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|
|
@@ -1860,6 +1982,7 @@ static int ipa3_ioctl_mdfy_flt_rule_v2(unsigned long arg)
|
|
|
u32 pyld_sz;
|
|
|
u64 uptr = 0;
|
|
|
u8 *param = NULL;
|
|
|
+ u8 *param2 = NULL;
|
|
|
u8 *kptr = NULL;
|
|
|
|
|
|
if (copy_from_user(header, (const void __user *)arg,
|
|
@@ -1900,6 +2023,23 @@ static int ipa3_ioctl_mdfy_flt_rule_v2(unsigned long arg)
|
|
|
retval = -EFAULT;
|
|
|
goto free_param_kptr;
|
|
|
}
|
|
|
+
|
|
|
+ param2 = memdup_user((const void __user *)arg,
|
|
|
+ sizeof(struct ipa_ioc_mdfy_flt_rule_v2));
|
|
|
+ if (IS_ERR(param2)) {
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* add check in case user-space module compromised */
|
|
|
+ if (unlikely(((struct ipa_ioc_mdfy_flt_rule_v2 *)param2)->num_rules
|
|
|
+ != pre_entry)) {
|
|
|
+ IPAERR_RL("current %d pre %d\n",
|
|
|
+ ((struct ipa_ioc_mdfy_flt_rule_v2 *)param2)->
|
|
|
+ num_rules, pre_entry);
|
|
|
+ retval = -EFAULT;
|
|
|
+ goto free_param_kptr;
|
|
|
+ }
|
|
|
/* alloc kernel pointer with actual payload size */
|
|
|
kptr = kzalloc(pyld_sz, GFP_KERNEL);
|
|
|
if (!kptr) {
|
|
@@ -1939,6 +2079,8 @@ static int ipa3_ioctl_mdfy_flt_rule_v2(unsigned long arg)
|
|
|
free_param_kptr:
|
|
|
if (!IS_ERR(param))
|
|
|
kfree(param);
|
|
|
+ if (!IS_ERR(param2))
|
|
|
+ kfree(param2);
|
|
|
kfree(kptr);
|
|
|
|
|
|
return retval;
|