Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4688339pxj; Wed, 12 May 2021 10:55:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyldYI8xemLXysT7nihz1NxF9/4FZXecPaaLmahuC9HGhtSockIynX4/nxI7c1D6wgwXonW X-Received: by 2002:a05:6402:3548:: with SMTP id f8mr44324050edd.251.1620842045749; Wed, 12 May 2021 10:54:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620842045; cv=none; d=google.com; s=arc-20160816; b=cGYY6TMW6Tv+JkzuH+FwH7LFTUy/2a8Fxpc2rE/rmvUBNr+CjwZzTDRdyiAOu7SzCi CDT+dBI96YZ4pVVSmJpps6X+sEcZeTfU/Fhlbl6hn02Sex1+MgEpJac/Gf1G3FivZGbi 64Geiukascv+NuRXOGfBwZGszYbps0mUk0p6OSRMjuG9R4TLotaCJl8DwjWvLyQbqlLn TZ7u7yAIsQ67QsUKJBBK5uROVhRMnJJEQ2RMplI2CoqUoBiuzF3PXteha9FuuwFGIqFS 34Hri7MCvBUihsUSURWnXBBwmll8GsxbRCJ1q9FgonxRdBiNDohKQpUFNDEedbdZv0rq VHpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rCoORPGXSNKdQAxYYs4qnTPXkCBwD4YIGTVFHGxDo20=; b=zR/2VZhPfVERi8EMsuORrRjmPgcjgpUJ8e7dWvFaDA6ISRcGyEY7J6pYEpnporQiSc ca4+34JyzNjz6GGKH4M9MDKylqeMNY3GkmUxH6faLrNBRcLIwT6FSwVOb+fWQQ6UOLy9 f8WhNzK3ZBoh6A9UNyA+t8ttT3+mV4Q0WT4oJklyfJLIBSbDVwrq8kT+SbLy/OLa+HE8 bHiIMy9BHhvMZ/uSPPYZU4NLkkASIF1SmiOe4dB+g+22s3OjRZHKYtCx7Nazdvnf64tx bZoR6VoyM5ac+CQ49Zg4N5mglc4B1qw+Yb/RxFoaTIKQoDH/XuQyAH1Av3MWAgVfH0Oy 0/ow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=adhGeXE6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b23si356821edv.199.2021.05.12.10.53.41; Wed, 12 May 2021 10:54:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=adhGeXE6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348905AbhELRjl (ORCPT + 99 others); Wed, 12 May 2021 13:39:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:36284 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239656AbhELQKh (ORCPT ); Wed, 12 May 2021 12:10:37 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 02F4E61D3C; Wed, 12 May 2021 15:40:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620834029; bh=lfMOwoDe8XY20PJQp7QD0Yqc1+exE/sp75vOZi4Pj00=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=adhGeXE6+FG41QGhbwgT9/NPf2uH0eeUwRt3Bm+2bXSPMZM4snvhMJXuLmkG0vOHr hxCfaFYciOklxKezH7RkkSDIfTY+KMdCVaIlDujZ8f9h69y2GIrVJT5TF82z80T9c6 kG98nvlYHicZYtEKCh/MfWMNcRQx0SBa3NKsbYso= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Pavel Begunkov , Jens Axboe , Sasha Levin Subject: [PATCH 5.11 382/601] io_uring: fix overflows checks in provide buffers Date: Wed, 12 May 2021 16:47:39 +0200 Message-Id: <20210512144840.374313871@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144827.811958675@linuxfoundation.org> References: <20210512144827.811958675@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Begunkov [ Upstream commit 38134ada0ceea3e848fe993263c0ff6207fd46e7 ] Colin reported before possible overflow and sign extension problems in io_provide_buffers_prep(). As Linus pointed out previous attempt did nothing useful, see d81269fecb8ce ("io_uring: fix provide_buffers sign extension"). Do that with help of check__overflow helpers. And fix struct io_provide_buf::len type, as it doesn't make much sense to keep it signed. Reported-by: Colin Ian King Fixes: efe68c1ca8f49 ("io_uring: validate the full range of provided buffers for access") Signed-off-by: Pavel Begunkov Link: https://lore.kernel.org/r/46538827e70fce5f6cdb50897cff4cacc490f380.1618488258.git.asml.silence@gmail.com Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- fs/io_uring.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/fs/io_uring.c b/fs/io_uring.c index 157ceda04650..c42c2e9570e5 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -535,7 +535,7 @@ struct io_splice { struct io_provide_buf { struct file *file; __u64 addr; - __s32 len; + __u32 len; __u32 bgid; __u16 nbufs; __u16 bid; @@ -4214,7 +4214,7 @@ static int io_remove_buffers(struct io_kiocb *req, bool force_nonblock, static int io_provide_buffers_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) { - unsigned long size; + unsigned long size, tmp_check; struct io_provide_buf *p = &req->pbuf; u64 tmp; @@ -4228,6 +4228,12 @@ static int io_provide_buffers_prep(struct io_kiocb *req, p->addr = READ_ONCE(sqe->addr); p->len = READ_ONCE(sqe->len); + if (check_mul_overflow((unsigned long)p->len, (unsigned long)p->nbufs, + &size)) + return -EOVERFLOW; + if (check_add_overflow((unsigned long)p->addr, size, &tmp_check)) + return -EOVERFLOW; + size = (unsigned long)p->len * p->nbufs; if (!access_ok(u64_to_user_ptr(p->addr), size)) return -EFAULT; -- 2.30.2