Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752685AbdLHDD6 (ORCPT ); Thu, 7 Dec 2017 22:03:58 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:2220 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752370AbdLHDD4 (ORCPT ); Thu, 7 Dec 2017 22:03:56 -0500 Subject: Re: [PATCH] fs: Fix signed integer overflow for vfs_setpos To: Al Viro References: <20171207152659.GC21978@ZenIV.linux.org.uk> CC: , "linux-kernel@vger.kernel.org" , LinuxArm From: Ding Tianhong Message-ID: <899e0faf-edd2-0df3-aa20-8ca7ef21f8f8@huawei.com> Date: Fri, 8 Dec 2017 11:02:41 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <20171207152659.GC21978@ZenIV.linux.org.uk> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.23.32] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3695 Lines: 88 On 2017/12/7 23:27, Al Viro wrote: > On Thu, Dec 07, 2017 at 09:19:10PM +0800, Ding Tianhong wrote: >> The undefined behaviour sanatizer detected an signed integer overflow like this: >> >> r0 = memfd_create(&(0x7f0000002000-0x12)="2e726571756573745f6b65795f6175746800",0x0) >> lseek(r0, 0x4040000000000000, 0x1) >> setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, >> &(0x7f000000b000-0xd)={@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, >> 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x9, 0x1, 0xff, 0x2, 0x6, 0x1,0xd27}, 0x20) >> mmap(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x3, 0x32,0xffffffffffffffff, 0x0) >> ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f000000f000-0x4)=0x10000) >> --------------------------------------------------------------------------------- >> UBSAN: Undefined behaviour in fs/read_write.c:107:12 >> signed integer overflow: >> 4629700416936869888 + 4629700416936869888 cannot be represented in type >> 'long long int' >> CPU: 0 PID: 11653 Comm: syz-executor0 Not tainted 4.x.xx+ #2 >> Hardware name: linux,dummy-virt (DT) >> Call trace: >> [] dump_backtrace+0x0/0x2a0 >> [] show_stack+0x20/0x30 >> [] dump_stack+0x11c/0x16c >> [] ubsan_epilogue+0x18/0x70 >> [] handle_overflow+0x14c/0x188 >> [] __ubsan_handle_add_overflow+0x34/0x44 >> [] generic_file_llseek_size+0x1f8/0x2a0 >> [] shmem_file_llseek+0x7c/0x1f8 >> [] SyS_lseek+0xc0/0x118 >> -------------------------------------------------------------------------------- >> >> The problem happened because the calculation of signed integer resulted >> an overflow for the signed integer, so use the unsigned integer to avoid >> undefined behaviour when it does overflow. > > TBH, I don't like that solution - there's too much of "make UBSAN STFU" in > it. Besides, there are very similar places elsewhere. Right next to this > one there's default_llseek(), with its > case SEEK_CUR: > if (offset == 0) { > retval = file->f_pos; > goto out; > } > offset += file->f_pos; > break; > and offset is loff_t there. Exact same issue, IOW. Grepping around shows > tons of similar places. E.g. ceph_llseek() has > if (offset == 0) { > ret = file->f_pos; > goto out; > } > offset += file->f_pos; > break; > with offset being loff_t and ocfs2_file_llseek() is the same. memory_lseek() > does something very similar, except that it doesn't use vfs_setpos(), > ditto for xillybus_llseek(), wil_pmc_llseek(), hmcdrv_dev_seek(), etc. > > That kind of whack-a-mole ("UBSAN has stepped on that one, let's plug it", > while the other places like that keep breeding) is, IMO, the wrong approach ;-/ > > BTW, a fun unrelated bogosity: > static loff_t scom_llseek(struct file *file, loff_t offset, int whence) > { > switch (whence) { > case SEEK_CUR: > break; > case SEEK_SET: > file->f_pos = offset; > break; > default: > return -EINVAL; > } > > return offset; > } > IOW, lseek(fd, SEEK_CUR, n) quietly returns n there. Separate issue, though... > Totally agree with you, this problem also make me very confused, but looks like the undefined behaviour is really critical issue, so should we reconsider this problem and solve it completely ? Thanks Ding > . >