Re: [bug report] block: integer overflow in __bvec_gap_to_prev()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2024-06-11 at 09:15 -0600, Keith Busch wrote:
> On Tue, Jun 11, 2024 at 02:23:48PM +0000, Roman Smirnov wrote:
> > Hello.
> > 
> > There is a case of integer overflow in __bvec_gap_to_prev():
> > 
> >         ((bprv->bv_offset + bprv->bv_len) & lim->virt_boundary_mask);
> > 
> > bio_vec can cross multiple pages:
> > 
> > https://lore.kernel.org/lkml/20190215111324.30129-1-ming.lei@xxxxxxxxxx/t/
> > 
> > So, in case bio has one bio_vec bv_len can have a maximum value of UINT_MAX.
> > The check happens in bio_full(). In the case when bv_len is equal to
> > UINT_MAX and bv_offset is greater than zero, an overflow may occur.
> 
> Does it matter? The lower bits checked against the mask should be the
> same regardless of overflow.


There are several other places where this kind of thing happens:

https://elixir.bootlin.com/linux/latest/source/block/blk-merge.c#L292
https://elixir.bootlin.com/linux/latest/source/block/blk.h#L331

I think in those cases overflow would make a difference.

I also found a comment before __bio_add_page(). It says that the
caller should watch out for free space in bio:

https://elixir.bootlin.com/linux/latest/source/block/bio.c#L1075

But what happens if it doesn't keep a check on it? Such code
won't get into the kernel?




[Index of Archives]     [Linux RAID]     [Linux SCSI]     [Linux ATA RAID]     [IDE]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Device Mapper]

  Powered by Linux