Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1265267pxb; Fri, 22 Jan 2021 10:58:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJy7fh1892R3bj0rMksL2wHjjx6B8uW2jRAfbKOMyYF1kX/AN0euiF/H9xtUGw/vcjt8g2rN X-Received: by 2002:aa7:c485:: with SMTP id m5mr4280940edq.320.1611341895106; Fri, 22 Jan 2021 10:58:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611341895; cv=none; d=google.com; s=arc-20160816; b=IC3zAWdD8lQcHJHW6ONx8PmiGZHfld30DFZM8zdSKe8FxGl070qtv515lML/vEMgWS 4Zr/8cWj/oQfVwxZG0fdPDBI9OHW1VPVZh2aFf3+Jid0cuBDZthtuZz0dawch4omnGr5 xsmpC95DrVG5zo4WC4lk7nR+L6tg2IJa4ahmcSwYR764tWHWm275rlZJowJEHLP5D0gX B56o8me0878T1iFPhJbAx8QeknLQg3U/fu3NV9knYl+J1/IWNo90PNlg0imwGp2fT4+w 1Gk7iEOaB24qC0j5y6WOLXz++oqvX9ALBKjJnTOXIZ2kJVO3Huvu/tf5kEJzjvoQmWOV Cv0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SEqqYwe4F1WMKQd9fZiIKAJfJv7JvlwL5bY9KFXPXNQ=; b=vCblxTz7MoCWuJxgfTCWGZOxmcj3pAv6VUI/eZz6CTuZxFXm4bcGq8U2fEvTuOgsvt XC75iHnHBxPbr+WxeKMC1x9e8QEOKJHhvK3qkdocD8wNh4/+AkurSPkSYtBE+dASOT24 xnUYPglnHDwQw3cotDLfapg/XGgaysiqGyCkvuABPH9Sg8Nr/wb8cxBpkjf24Ryu/LcA Dfqg5laVi+VNYB6RTo/TSK+Nu0rVnbJrS+1OVVhLsr8AC2h9sABnqYXFjQZyU5MA8QQH TGZJijihNclFBLx+tXPO7U1KqHy+sxYjPAg4PA+IWQ3XTVzYT1Rl7jFIabVxxSiZQVZK L4mw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JhGa86fb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qw12si3405791ejb.550.2021.01.22.10.57.49; Fri, 22 Jan 2021 10:58:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JhGa86fb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730214AbhAVSxK (ORCPT + 99 others); Fri, 22 Jan 2021 13:53:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:40026 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728513AbhAVOW0 (ORCPT ); Fri, 22 Jan 2021 09:22:26 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9652D23B46; Fri, 22 Jan 2021 14:15:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1611324952; bh=JUbV4WDWYeuFOG5RUQMedKAYuLqR5xDajD+MGa6Gdsc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JhGa86fbwfdgl0gFi8vVwo+UAQYyOxJ+pW1jX1+Lnf6mY1XYULGx6IA4F+oZCDz6A aKAVpWc/nZhfqR166nyNmCdg+xJ/OgmbA59P+SuzVeDpzIuw6tZ6DblyY6eWkpEvUw rAihj31ApwhL4rJtj7Qdnz3GhOTHjOWdwP5nngKo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tom Rix , David Howells , Jakub Kicinski Subject: [PATCH 4.19 17/22] rxrpc: Fix handling of an unsupported token type in rxrpc_read() Date: Fri, 22 Jan 2021 15:12:35 +0100 Message-Id: <20210122135732.597400387@linuxfoundation.org> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210122135731.921636245@linuxfoundation.org> References: <20210122135731.921636245@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Howells [ Upstream commit d52e419ac8b50c8bef41b398ed13528e75d7ad48 ] Clang static analysis reports the following: net/rxrpc/key.c:657:11: warning: Assigned value is garbage or undefined toksize = toksizes[tok++]; ^ ~~~~~~~~~~~~~~~ rxrpc_read() contains two consecutive loops. The first loop calculates the token sizes and stores the results in toksizes[] and the second one uses the array. When there is an error in identifying the token in the first loop, the token is skipped, no change is made to the toksizes[] array. When the same error happens in the second loop, the token is not skipped. This will cause the toksizes[] array to be out of step and will overrun past the calculated sizes. Fix this by making both loops log a message and return an error in this case. This should only happen if a new token type is incompletely implemented, so it should normally be impossible to trigger this. Fixes: 9a059cd5ca7d ("rxrpc: Downgrade the BUG() for unsupported token type in rxrpc_read()") Reported-by: Tom Rix Signed-off-by: David Howells Reviewed-by: Tom Rix Link: https://lore.kernel.org/r/161046503122.2445787.16714129930607546635.stgit@warthog.procyon.org.uk Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/rxrpc/key.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) --- a/net/rxrpc/key.c +++ b/net/rxrpc/key.c @@ -1112,7 +1112,7 @@ static long rxrpc_read(const struct key default: /* we have a ticket we can't encode */ pr_err("Unsupported key token type (%u)\n", token->security_index); - continue; + return -ENOPKG; } _debug("token[%u]: toksize=%u", ntoks, toksize); @@ -1227,7 +1227,9 @@ static long rxrpc_read(const struct key break; default: - break; + pr_err("Unsupported key token type (%u)\n", + token->security_index); + return -ENOPKG; } ASSERTCMP((unsigned long)xdr - (unsigned long)oldxdr, ==,