All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: [PATCH] NFSD: prevent integer overflow on 32 bit systems
@ 2022-03-15  7:35 kernel test robot
  0 siblings, 0 replies; 9+ messages in thread
From: kernel test robot @ 2022-03-15  7:35 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 5054 bytes --]

CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220314140958.GE30883@kili>
References: <20220314140958.GE30883@kili>
TO: Dan Carpenter <error27@gmail.com>
TO: Chuck Lever <chuck.lever@oracle.com>
TO: Trond Myklebust <trond.myklebust@hammerspace.com>
CC: Anna Schumaker <anna@kernel.org>
CC: linux-nfs(a)vger.kernel.org
CC: kernel-janitors(a)vger.kernel.org
CC: Harshit Mogalapalli <harshit.m.mogalapalli@oracle.com>

Hi Dan,

Thank you for the patch! Perhaps something to improve:

[auto build test WARNING on trondmy-nfs/linux-next]
[also build test WARNING on linus/master v5.17-rc8 next-20220310]
[cannot apply to cel-2.6/for-next]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]

url:    https://github.com/0day-ci/linux/commits/Dan-Carpenter/NFSD-prevent-integer-overflow-on-32-bit-systems/20220314-221126
base:   git://git.linux-nfs.org/projects/trondmy/linux-nfs.git linux-next
:::::: branch date: 17 hours ago
:::::: commit date: 17 hours ago
config: x86_64-randconfig-m001-20220314 (https://download.01.org/0day-ci/archive/20220315/202203151552.RotMz4kf-lkp(a)intel.com/config)
compiler: gcc-9 (Ubuntu 9.4.0-1ubuntu1~20.04) 9.4.0

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>

New smatch warnings:
include/linux/sunrpc/xdr.h:734 xdr_stream_decode_uint32_array() warn: impossible condition '(len > (~0) / 4) => (0-u32max > 4611686018427387903)'

Old smatch warnings:
fs/nfs/nfs4xdr.c:1194 encode_attrs() error: we previously assumed 'umask' could be null (see line 1103)

vim +734 include/linux/sunrpc/xdr.h

37c88763def8474 Trond Myklebust 2018-03-20  712  
37c88763def8474 Trond Myklebust 2018-03-20  713  /**
37c88763def8474 Trond Myklebust 2018-03-20  714   * xdr_stream_decode_uint32_array - Decode variable length array of integers
37c88763def8474 Trond Myklebust 2018-03-20  715   * @xdr: pointer to xdr_stream
37c88763def8474 Trond Myklebust 2018-03-20  716   * @array: location to store the integer array or NULL
37c88763def8474 Trond Myklebust 2018-03-20  717   * @array_size: number of elements to store
37c88763def8474 Trond Myklebust 2018-03-20  718   *
37c88763def8474 Trond Myklebust 2018-03-20  719   * Return values:
37c88763def8474 Trond Myklebust 2018-03-20  720   *   On success, returns number of elements stored in @array
37c88763def8474 Trond Myklebust 2018-03-20  721   *   %-EBADMSG on XDR buffer overflow
37c88763def8474 Trond Myklebust 2018-03-20  722   *   %-EMSGSIZE if the size of the array exceeds @array_size
37c88763def8474 Trond Myklebust 2018-03-20  723   */
37c88763def8474 Trond Myklebust 2018-03-20  724  static inline ssize_t
37c88763def8474 Trond Myklebust 2018-03-20  725  xdr_stream_decode_uint32_array(struct xdr_stream *xdr,
37c88763def8474 Trond Myklebust 2018-03-20  726  		__u32 *array, size_t array_size)
37c88763def8474 Trond Myklebust 2018-03-20  727  {
37c88763def8474 Trond Myklebust 2018-03-20  728  	__be32 *p;
37c88763def8474 Trond Myklebust 2018-03-20  729  	__u32 len;
37c88763def8474 Trond Myklebust 2018-03-20  730  	ssize_t retval;
37c88763def8474 Trond Myklebust 2018-03-20  731  
37c88763def8474 Trond Myklebust 2018-03-20  732  	if (unlikely(xdr_stream_decode_u32(xdr, &len) < 0))
37c88763def8474 Trond Myklebust 2018-03-20  733  		return -EBADMSG;
455f80f80ed3496 Dan Carpenter   2022-03-14 @734  	if (len > ULONG_MAX / sizeof(*p))
455f80f80ed3496 Dan Carpenter   2022-03-14  735  		return -EBADMSG;
37c88763def8474 Trond Myklebust 2018-03-20  736  	p = xdr_inline_decode(xdr, len * sizeof(*p));
37c88763def8474 Trond Myklebust 2018-03-20  737  	if (unlikely(!p))
37c88763def8474 Trond Myklebust 2018-03-20  738  		return -EBADMSG;
37c88763def8474 Trond Myklebust 2018-03-20  739  	if (array == NULL)
37c88763def8474 Trond Myklebust 2018-03-20  740  		return len;
37c88763def8474 Trond Myklebust 2018-03-20  741  	if (len <= array_size) {
37c88763def8474 Trond Myklebust 2018-03-20  742  		if (len < array_size)
37c88763def8474 Trond Myklebust 2018-03-20  743  			memset(array+len, 0, (array_size-len)*sizeof(*array));
37c88763def8474 Trond Myklebust 2018-03-20  744  		array_size = len;
37c88763def8474 Trond Myklebust 2018-03-20  745  		retval = len;
37c88763def8474 Trond Myklebust 2018-03-20  746  	} else
37c88763def8474 Trond Myklebust 2018-03-20  747  		retval = -EMSGSIZE;
37c88763def8474 Trond Myklebust 2018-03-20  748  	for (; array_size > 0; p++, array++, array_size--)
37c88763def8474 Trond Myklebust 2018-03-20  749  		*array = be32_to_cpup(p);
37c88763def8474 Trond Myklebust 2018-03-20  750  	return retval;
37c88763def8474 Trond Myklebust 2018-03-20  751  }
^1da177e4c3f415 Linus Torvalds  2005-04-16  752  

---
0-DAY CI Kernel Test Service
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

^ permalink raw reply	[flat|nested] 9+ messages in thread
* [PATCH] NFSD: prevent integer overflow on 32 bit systems
@ 2022-03-14 14:09 Dan Carpenter
  2022-03-14 14:45 ` Chuck Lever III
  2022-03-14 19:57 ` kernel test robot
  0 siblings, 2 replies; 9+ messages in thread
From: Dan Carpenter @ 2022-03-14 14:09 UTC (permalink / raw)
  To: Chuck Lever, Trond Myklebust
  Cc: Anna Schumaker, linux-nfs, kernel-janitors, Harshit Mogalapalli

On a 32 bit system, the "len * sizeof(*p)" operation can have an
integer overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
---
It's hard to pick a Fixes tag for this...  The temptation is to say:
Fixes: 37c88763def8 ("NFSv4; Clean up XDR encoding of type bitmap4")
But there were integer overflows in the code before that as well.

 include/linux/sunrpc/xdr.h | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/include/linux/sunrpc/xdr.h b/include/linux/sunrpc/xdr.h
index b519609af1d0..61b92e6b9813 100644
--- a/include/linux/sunrpc/xdr.h
+++ b/include/linux/sunrpc/xdr.h
@@ -731,6 +731,8 @@ xdr_stream_decode_uint32_array(struct xdr_stream *xdr,
 
 	if (unlikely(xdr_stream_decode_u32(xdr, &len) < 0))
 		return -EBADMSG;
+	if (len > ULONG_MAX / sizeof(*p))
+		return -EBADMSG;
 	p = xdr_inline_decode(xdr, len * sizeof(*p));
 	if (unlikely(!p))
 		return -EBADMSG;
-- 
2.20.1


^ permalink raw reply related	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2022-03-15 15:40 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-15  7:35 [PATCH] NFSD: prevent integer overflow on 32 bit systems kernel test robot
  -- strict thread matches above, loose matches on Subject: below --
2022-03-14 14:09 Dan Carpenter
2022-03-14 14:45 ` Chuck Lever III
2022-03-14 17:03   ` Dan Carpenter
2022-03-14 18:05     ` Chuck Lever III
2022-03-14 19:25       ` Trond Myklebust
2022-03-14 19:57 ` kernel test robot
2022-03-15 15:40   ` Dan Carpenter
2022-03-15 15:40     ` Dan Carpenter

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.