Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp2307706pxb; Sat, 21 Nov 2020 17:31:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJyivPfQhaylaAdRMgNjs7NGO/CKI7Lm40oy0nxIUgTOm4nTs15iA5ZIMMLDSGH8nUM5aZEZ X-Received: by 2002:a17:906:7f95:: with SMTP id f21mr37466535ejr.340.1606008685876; Sat, 21 Nov 2020 17:31:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606008685; cv=none; d=google.com; s=arc-20160816; b=ZMojGa0Zmy2cGOZfcHLxs/paEZS8XH0yKDlb49tINntizFF8uTxFTWe36t+D93+dyh xFKUmhi6Zkk1DE3JqBPDtVOfGUNfQbLfUnSDZ53Flqgolcd5ILTs9z+NGrRM4wFTZdDN 6OJtVvjzx/L7uv7Mi7qco/29m0pKTrE1wjTxj1uYmCdT2rfmoFL/bh0Gx8YmjigKGAaq 1wVfR7bIfYz3gujq8EKy/gLtnbg149dcA86N9eT+JrcTOC3UCj6dkTghf/KnCmmTvglk 6gQ/44Jy6f0WdKoXT+cX82hdK21Xl6rfrWez0ccXrsyR0ABsKS3ylTdtcFcUYFazkn8p GIjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=FnqACzEuiQyrHG8IKp45SjZxKoAtkq6AMAVZi+Et/AM=; b=xY2fWOsvhEwU35DJubVdA+D4mHJAxmcdSbZtVPoF4cmiTGC5Lnbgn5HIIX/e+QueWX sEr+Deyqvt3txQ4nXplUC/eNEmQ3WxdK8Xv2u0aj6AmWPh0dmBPUrSCaM+YYvfC0fqX3 I4TV/M2Xiqxr+0m85bvvctvQIH2e2jyRM64qFS99JVr82SDIWcnamTmrOAbCwDMqDhDa 0f99tBAGuGTZ1QdLjQo9TFhizoiSchJ5CIvoOyuQN6XhpAewzP6TJzX3WWsKd15QXd7A nlVz0tz601RIBp7zXS0cyGlxhh/GTzcMY9cah+pqF4Svwl036heaUPZvq6mYcjlpGUmZ AQTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=XAZI9f6L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m13si5095267edi.374.2020.11.21.17.31.03; Sat, 21 Nov 2020 17:31:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=XAZI9f6L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727104AbgKVB16 (ORCPT + 99 others); Sat, 21 Nov 2020 20:27:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44140 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726431AbgKVB1z (ORCPT ); Sat, 21 Nov 2020 20:27:55 -0500 Received: from mail-qt1-x841.google.com (mail-qt1-x841.google.com [IPv6:2607:f8b0:4864:20::841]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E1BB7C0613CF for ; Sat, 21 Nov 2020 17:27:54 -0800 (PST) Received: by mail-qt1-x841.google.com with SMTP id z3so10158129qtw.9 for ; Sat, 21 Nov 2020 17:27:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=FnqACzEuiQyrHG8IKp45SjZxKoAtkq6AMAVZi+Et/AM=; b=XAZI9f6LApDEldNxEWeuZNxP7UK9/qnN9TWiax+wGwTdTwvQfgD4g+nNV4dwjMORTt zn6zEE4GgFpeY7lVWRo5wbTlLdtLDPK9IWcQqpejoV49w5Pvkz8Xh6DfSfu+gn2Pyy5C jM6jjstWMXimlMiLWvtB8TYc69Glb1XyxQqGwUOLDTVeNeMw7FgQXMZOtsNpPBEsqcZY rR71xczkqDJqJMgaRQm4rMa+34oo9322z01cmcjTBXKjr/wntP0oYmrr5W3vsjVD6Z6L 51RP5YNTOfVJQStc5YqZ4D2FcVovKmyIDGrNaDUhJEm6efN4Iao3epS5tjbEP4ebNONb gz7g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=FnqACzEuiQyrHG8IKp45SjZxKoAtkq6AMAVZi+Et/AM=; b=M4VrSgIV6EEIjDd6ar0tdegf3ki+5NXkvoVz/f6wLXwELIus7OSyGJx+xEkEyUtZ7t By7Pof1OIFJ1xbxbHgabnC04HCclXKuus+I/xayQksizsauHanrZe3I1/6qM+FVjIV5I m639I10APSQ/9UmerinB1G+SEaBEiuErFB2CW2vJaP0DwMl+XgG/HgjSvkRjdu5fAL07 raqlhIEVhkm63Bupmj5Xr28oyoYBcQwLoD0vcM9qAxtNJCe2YZHV/Izrro3PYnBKmjmW tba+qd59Zq40blOvYOaYLipde3RY2+Whh1ZA48bd4+x3GPMy4YYBBUvXnOU/X+dTB20q AvAw== X-Gm-Message-State: AOAM532Hid39pj2z0DbmnESRprHOjBwnOv8C1VGx68PurSKFoo0ln/TW O72boSzWHfAObQ34rXM0Ed4= X-Received: by 2002:aed:20c2:: with SMTP id 60mr19829271qtb.280.1606008473973; Sat, 21 Nov 2020 17:27:53 -0800 (PST) Received: from tong-desktop.local ([2601:5c0:c200:27c6:65df:e6:bdb7:d0a7]) by smtp.googlemail.com with ESMTPSA id c1sm5234919qkd.74.2020.11.21.17.27.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 21 Nov 2020 17:27:53 -0800 (PST) From: Tong Zhang To: Anders Larsen , linux-kernel@vger.kernel.org Cc: ztong0001@gmail.com Subject: [PATCH v2] qnx4_match: do not over run the buffer Date: Sat, 21 Nov 2020 20:27:40 -0500 Message-Id: <20201122012740.4814-1-ztong0001@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org the di_fname may not terminated by '\0', use strnlen to prevent buffer overrun [ 513.248784] qnx4_readdir: bread failed (3718095557) [ 513.250880] ================================================================== [ 513.251109] BUG: KASAN: use-after-free in strlen+0x1f/0x40 [ 513.251268] Read of size 1 at addr ffff888002700000 by task find/230 [ 513.251419] [ 513.251677] CPU: 0 PID: 230 Comm: find Not tainted 5.10.0-rc4+ #64 [ 513.251805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-48-gd84 [ 513.252069] Call Trace: [ 513.252310] dump_stack+0x7d/0xa3 [ 513.252443] print_address_description.constprop.0+0x1e/0x220 [ 513.252572] ? _raw_spin_lock_irqsave+0x7b/0xd0 [ 513.252681] ? _raw_write_lock_irqsave+0xd0/0xd0 [ 513.252785] ? strlen+0x1f/0x40 [ 513.252869] ? strlen+0x1f/0x40 [ 513.252955] kasan_report.cold+0x37/0x7c [ 513.253059] ? qnx4_block_map+0x130/0x1d0 [ 513.253152] ? strlen+0x1f/0x40 [ 513.253237] strlen+0x1f/0x40 [ 513.253329] qnx4_lookup+0xab/0x220 [ 513.253431] __lookup_slow+0x103/0x220 [ 513.253531] ? vfs_unlink+0x2e0/0x2e0 [ 513.253626] ? down_read+0xd8/0x190 [ 513.253721] ? down_write_killable+0x110/0x110 [ 513.253823] ? generic_permission+0x4c/0x240 [ 513.253929] walk_component+0x214/0x2c0 [ 513.254035] ? handle_dots.part.0+0x760/0x760 [ 513.254137] ? walk_component+0x2c0/0x2c0 [ 513.254233] ? path_init+0x546/0x6b0 [ 513.254327] ? __kernel_text_address+0x9/0x30 [ 513.254430] ? unwind_get_return_address+0x2a/0x40 [ 513.254538] ? create_prof_cpu_mask+0x20/0x20 [ 513.254637] ? arch_stack_walk+0x99/0xf0 [ 513.254736] path_lookupat.isra.0+0xb0/0x240 [ 513.254840] filename_lookup+0x128/0x250 [ 513.254939] ? may_linkat+0xb0/0xb0 [ 513.255033] ? __fput+0x199/0x3c0 [ 513.255127] ? kasan_save_stack+0x32/0x40 [ 513.255224] ? kasan_save_stack+0x1b/0x40 [ 513.255323] ? kasan_unpoison_shadow+0x33/0x40 [ 513.255426] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 513.255538] ? getname_flags+0x100/0x2a0 [ 513.255635] vfs_statx+0xd8/0x1d0 [ 513.255728] ? vfs_getattr+0x40/0x40 [ 513.255821] ? lockref_put_return+0xb2/0x120 [ 513.255922] __do_sys_newfstatat+0x7d/0xd0 [ 513.256022] ? __ia32_sys_newlstat+0x30/0x30 [ 513.256122] ? __kasan_slab_free+0x121/0x150 [ 513.256222] ? rcu_segcblist_enqueue+0x72/0x80 [ 513.256333] ? fpregs_assert_state_consistent+0x4d/0x60 [ 513.256446] ? exit_to_user_mode_prepare+0x2d/0xf0 [ 513.256551] ? __x64_sys_newfstatat+0x39/0x60 [ 513.256651] do_syscall_64+0x33/0x40 [ 513.256750] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Co-Developed-by: Anders Larsen Signed-off-by: Tong Zhang --- v2: The name can grow longer than QNX4_SHORT_NAME_MAX if de is a QNX4_FILE_LINK type and de should points to a qnx4_link_info struct, so this is safe. We also remove redundant checks in this version. fs/qnx4/namei.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/fs/qnx4/namei.c b/fs/qnx4/namei.c index 8d72221735d7..2bcbbd7c772e 100644 --- a/fs/qnx4/namei.c +++ b/fs/qnx4/namei.c @@ -40,9 +40,7 @@ static int qnx4_match(int len, const char *name, } else { namelen = QNX4_SHORT_NAME_MAX; } - thislen = strlen( de->di_fname ); - if ( thislen > namelen ) - thislen = namelen; + thislen = strnlen( de->di_fname, namelen ); if (len != thislen) { return 0; } -- 2.25.1