Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp3188898pxa; Tue, 25 Aug 2020 14:04:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5Kg4CCI1ijKgy6AHrmIvr7had7X0esDJk6OA/QW5KV3oy4WOge9yOqAv7I1+jJqoJkvwb X-Received: by 2002:aa7:c405:: with SMTP id j5mr2171358edq.329.1598389479731; Tue, 25 Aug 2020 14:04:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598389479; cv=none; d=google.com; s=arc-20160816; b=OEp+0mAlplZm5n6qC+OfkFvNTqVnUhgIclT80gPVCFd1YmIHCrc+BlqBhfae5dINwK mfKe6jeO5wpNbPX+hLrKxL68/3qyc/Eu7YUiFH9lq0hhQJyygUpY7dL+hxy00qxHirpd G/v1V07B+GYNB2zs0Gg5ykNVCGl84wmGrNASBbR5CU7TlNjOjuu4njDMmhVB9vobh6af 5O6g7sS938SA17Kio9pG1a5fk4R7VEi0i8GaM2AdOFUQ5u/KR7VL1x/2M9XnfFF1xmFB 3YO4mRJ72jlOtb91EAP/OGgMRYdz0szQQAFLwxU5fX6pmocERFWckPMQLhkyJT/yJOxd WWjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=YiQosPnUbJltatnhYmaMYvXeDJkSAec2ypBziUzmlAs=; b=wyvvdqHd2/LOINQJHZ1pRRHgH94KwzVSRbaFaBdWvCebqicQyWQM7MWuc8m18PlXBd UyWXrkBhRTTbCcbZdVQKe27cY5t4FoeKA2da3XcdZ5n8ECGYwW8sBkSlSmxJz2/jDH95 yr3luEaQNtZHRjK5djECSA3vsKSr8zlvxWI5nofU20HqIzVEFI/cw9BUfXhCB9eX8av5 iJt4RqI0+wp1IBbJp0C4jQiVgfVsgtLbq4/ZQc7rZnG0hQMaHm79FITu9Pqc5+f5EcBS OD2qUolFVVi5tkicYj4EHgntkW0wOh0l9j5v7xah4htsvcXX2LkL4zh5lKSBvgFaiFzR JPxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@crapouillou.net header.s=mail header.b=IomyVSIz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=crapouillou.net Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m20si25042eds.466.2020.08.25.14.04.16; Tue, 25 Aug 2020 14:04:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@crapouillou.net header.s=mail header.b=IomyVSIz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=crapouillou.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726570AbgHYVBh (ORCPT + 99 others); Tue, 25 Aug 2020 17:01:37 -0400 Received: from crapouillou.net ([89.234.176.41]:50668 "EHLO crapouillou.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726149AbgHYVBh (ORCPT ); Tue, 25 Aug 2020 17:01:37 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=crapouillou.net; s=mail; t=1598389294; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references; bh=YiQosPnUbJltatnhYmaMYvXeDJkSAec2ypBziUzmlAs=; b=IomyVSIzBptidH1chI3rnfuOki0KTV9EtNOFxkgdXC1Z4yOoKJ8pnC1H172rRsnJmvTKm5 Ry/wXaK5XvGuDEn2aYYfXgeuW10stCZJ26oyyQiUY17WffHxUJGR57Nv38PGTHasA8MvUq bjJIKFElQau/8wC5niTUGPSyZhrtb4c= From: Paul Cercueil To: Nick Terrell , Thomas Bogendoerfer Cc: linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, od@zcrc.me, Paul Cercueil Subject: [PATCH v2 1/2] lib: decompress_unzstd: Limit output size Date: Tue, 25 Aug 2020 23:01:26 +0200 Message-Id: <20200825210127.17850-1-paul@crapouillou.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The zstd decompression code, as it is right now, will have internal values overflow on 32-bit systems when the output size is bigger than 1 GiB. Until someone smarter than me can figure out how to fix the zstd code properly, limit the destination buffer size to 1 GiB, which should be enough for everybody, in order to make it usable on 32-bit systems. Signed-off-by: Paul Cercueil Reviewed-by: Nick Terrell --- Notes: v2: Change limit to 1 GiB lib/decompress_unzstd.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/lib/decompress_unzstd.c b/lib/decompress_unzstd.c index 0ad2c15479ed..414517baedb0 100644 --- a/lib/decompress_unzstd.c +++ b/lib/decompress_unzstd.c @@ -77,6 +77,7 @@ #include #include +#include #include /* 128MB is the maximum window size supported by zstd. */ @@ -179,7 +180,7 @@ static int INIT __unzstd(unsigned char *in_buf, long in_len, size_t ret; if (out_len == 0) - out_len = LONG_MAX; /* no limit */ + out_len = SZ_1G; /* should be big enough, right? */ if (fill == NULL && flush == NULL) /* -- 2.28.0