Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4742675pxj; Wed, 12 May 2021 12:10:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbQaqSg+YwBN9WdVE4P8tMNCwpbtjxqKThVV7NoLdybMjKQdIXbVts68Wh2K7L9LmsqrxT X-Received: by 2002:aa7:d915:: with SMTP id a21mr46725414edr.357.1620846648410; Wed, 12 May 2021 12:10:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620846648; cv=none; d=google.com; s=arc-20160816; b=DQQrbpybAPKJEAJd8l5x6noMiNPb+Bi7YE1cyPSjyIbkNYHhzkM2vbYEQS3uwl9y7g I6EIUblhUH90/qfU0eK+FEriuA916oZtdGzdH+/rwekIVwYu7dSbk8cysrzTHZH+6RvP GAbXqH9wro+fUbAR48Hy0Zev6aEBahDIP97/6/dR7MbMD84RWhld3Pdot/XPrVCnIh3z hw3x9sNjWHCM5xYImAQ1bTYqK7KOvYPofxSQNiZooFxB4FgzlIRIF3b6exYddcLU5k3v XyjbYoYgxk+1EnqWDOogjvog9Gdr18Y9n/n4KJbuHE5VENL/exJ6GaqU741/xoOlJYNV 0NFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WdVb+v7wgEfMvz8o/dPTu7jshS1MBLR0MmYCKeDhJ94=; b=ltH2Jyy5QfTJCh6MDc/g5+X/gqWzbfrqpbjBNBBOWSAxwugkhLr4KCf2zQNLKCi7Ow udfbVF+6bFj482GS6nnaETQsL818+8W75Ype5bXrJO9cZ5ZA3vUf5UulVRI4gjqfYQeZ cY3F34U81rRWUiI3GMZqrPoOkikdXOQGwkl6g0s9+Dw7Tcwx5RZgobNd1owi84sjfMsG JNAbykAzbDBVTKnpJMqPHJe27w/TP8nb+LxRN1ZnRRvQHKAEjlfgR5OYj4NVwCi3OOSp nNNPOGD2fX5vli3BnnB4oxiHr7w2E0t1GvTf6+cB6im/xrBu7Vl6p7NQjwRBvHwPsNJc 7RPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=OhxMSIkX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x12si699383ejj.664.2021.05.12.12.10.22; Wed, 12 May 2021 12:10:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=OhxMSIkX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357741AbhELTBT (ORCPT + 99 others); Wed, 12 May 2021 15:01:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:35814 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243838AbhELQmJ (ORCPT ); Wed, 12 May 2021 12:42:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BE00E61C3A; Wed, 12 May 2021 16:07:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620835652; bh=vac/PmXNIgxrJ7QjcWo+e62LDA7/kj5GZFUMfEqwEK0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OhxMSIkXaE2o/yJX66sirayXOzTmFt7kl/6H4fdYrWTMGPFmNgVk9DQzHe/0SbdvV KSWBCz8CT3lzWzFdmMzq6m6oKd/ry+/fpJpzfsbW6BjmDdRdQ733JF+85O+ZbIjAn7 ECkJB07CniN4rVsxZTEwKV8axNGr5N678lJMp32A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Pavel Begunkov , Jens Axboe , Sasha Levin Subject: [PATCH 5.12 430/677] io_uring: fix overflows checks in provide buffers Date: Wed, 12 May 2021 16:47:56 +0200 Message-Id: <20210512144851.626748341@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144837.204217980@linuxfoundation.org> References: <20210512144837.204217980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Begunkov [ Upstream commit 38134ada0ceea3e848fe993263c0ff6207fd46e7 ] Colin reported before possible overflow and sign extension problems in io_provide_buffers_prep(). As Linus pointed out previous attempt did nothing useful, see d81269fecb8ce ("io_uring: fix provide_buffers sign extension"). Do that with help of check__overflow helpers. And fix struct io_provide_buf::len type, as it doesn't make much sense to keep it signed. Reported-by: Colin Ian King Fixes: efe68c1ca8f49 ("io_uring: validate the full range of provided buffers for access") Signed-off-by: Pavel Begunkov Link: https://lore.kernel.org/r/46538827e70fce5f6cdb50897cff4cacc490f380.1618488258.git.asml.silence@gmail.com Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- fs/io_uring.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/fs/io_uring.c b/fs/io_uring.c index 2bdd7eab6c66..144056b0cac9 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -614,7 +614,7 @@ struct io_splice { struct io_provide_buf { struct file *file; __u64 addr; - __s32 len; + __u32 len; __u32 bgid; __u16 nbufs; __u16 bid; @@ -3979,7 +3979,7 @@ static int io_remove_buffers(struct io_kiocb *req, unsigned int issue_flags) static int io_provide_buffers_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) { - unsigned long size; + unsigned long size, tmp_check; struct io_provide_buf *p = &req->pbuf; u64 tmp; @@ -3993,6 +3993,12 @@ static int io_provide_buffers_prep(struct io_kiocb *req, p->addr = READ_ONCE(sqe->addr); p->len = READ_ONCE(sqe->len); + if (check_mul_overflow((unsigned long)p->len, (unsigned long)p->nbufs, + &size)) + return -EOVERFLOW; + if (check_add_overflow((unsigned long)p->addr, size, &tmp_check)) + return -EOVERFLOW; + size = (unsigned long)p->len * p->nbufs; if (!access_ok(u64_to_user_ptr(p->addr), size)) return -EFAULT; -- 2.30.2