Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp308139pxy; Sat, 31 Jul 2021 07:58:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMS4wu7cbaUpjCNbX6KGfqPQZuujAooOrsYJxQIbwAeWxOQL9jukUX2qEg/SPmsM0NTiA+ X-Received: by 2002:a92:cd8a:: with SMTP id r10mr4797057ilb.287.1627743529822; Sat, 31 Jul 2021 07:58:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627743529; cv=none; d=google.com; s=arc-20160816; b=zpdWy0uSlXf8xqexZZRH8jgtcRPeA+vzqMJ3UoS6gNsEQ6/ntCNveNFVmhCOQQ5XWM ZBBpmRr7Bm/2EzfrpCxLNMqFDOtrfWDNbqHrzGc5frChCZ80FFXPmhnAZuWyrxFsXy+E PAp1S00S3oEyK09O/sSVbVEYJsUh115/+aZPLKpY1xbVIZCO4zzGy+s8KX0oXRCpoRFW 1g7/uEctVtOtxQZB7Ah2yxLN45Ixkqipy3sQsH8ySm2BaP2ljgPYsW0RJ+YDCWkDPY5M fVDBF3ntnkj0K+UKkr8yxRLFyAL9TTd8acl6FiP0O5Mmo+sa5tsghKfErhp8A72bJVPj OCOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=cZF9Y6I+Qx6Gr1wByV30zO6gwQTmqMIjVaDGJsLh6xY=; b=YgsbrLh1bjfGIwc6UeOxhmucWOk2/usnLLuwF4K8rWqmmYPQYBWm8FoUuNHRmsXvzO So8WrZHN+3sQAGMFxsCF9M6MT+3gqTevqIhccfxLr4rrBZM9Q7sJKK7uI1Hsq/cSGBFP ZohbPutSF2mBxDMesiMIuGN3eRCwiaRjTXR/pJoYMm9AxI7o+zKwzZO1wGE2MwGqURrb k+fI2GedNNx8D3M2awyQhL2K/CNnbdfkX4jCiwHQ8wGYV90zyALMT1qG1Ftsd+5929Nl U4N5ns7gelFsp9SoLJ2RrIQr6/kYRuaY3EW207MHCefp02zLP/tFwvwQMykT2IOwqQMQ 7oaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b="BPCE/iJC"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v5si5879336jan.37.2021.07.31.07.58.37; Sat, 31 Jul 2021 07:58:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b="BPCE/iJC"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233245AbhGaO54 (ORCPT + 99 others); Sat, 31 Jul 2021 10:57:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36108 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233035AbhGaO5z (ORCPT ); Sat, 31 Jul 2021 10:57:55 -0400 Received: from mail-pl1-x636.google.com (mail-pl1-x636.google.com [IPv6:2607:f8b0:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 13B2BC0613CF for ; Sat, 31 Jul 2021 07:57:49 -0700 (PDT) Received: by mail-pl1-x636.google.com with SMTP id m11so2367638plx.4 for ; Sat, 31 Jul 2021 07:57:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=cZF9Y6I+Qx6Gr1wByV30zO6gwQTmqMIjVaDGJsLh6xY=; b=BPCE/iJCz7ZZdNq+YWfPBsJCVbK2LhY4aLwn2ORBLnmHW4Yeuex9V06v9M06CixNSg nbPXP9LzzmsmWNN+tNuwAhjcrLuQD3F3kRf5uszwAkSjsTcBk1w1Iajjkq05Ng+6GLNK UkskUAmaxmIwvbzElih3EmkDWdDLN3mSQ958h9GpDPB98rOAd21WYoCsOJLHYgJvCdkY 4zvEBMPjY8H7EfC23M2+B9Ke4I21lPkpsE27qhLeoh5vN/oH6XCSarOHOsE94Z+tMdio vbH/VHY4ZY7SRm9dnctPnl/6T3FiWZhFtE7roXuM82WDxxj6G5jql9Pd4FI2TbUsR9LO ShXQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=cZF9Y6I+Qx6Gr1wByV30zO6gwQTmqMIjVaDGJsLh6xY=; b=Fzv6pCmXxKBd35tzWGi0V2YKdIXDeJwuwn15RRDqn9DcYd/EELGaY0lc13eW8APD3f 2wAnXbGEn3ye5gcJeMORKcg2UO7TJeGQ9J+9vUkD4DCun8OvGOuhnPBECFkW7Q9uwX0m eMSYc0rfqKrHjJl/vcJ0rRzuQYlQ44te2pRKdv6yBQ/z/evTiDgkD7yDM3isVdNegH6U Wv5u8FhrGpVx3pCP74lrodF3b24042mAyYOyckLM2FONxQMy4IhsvfvHIfbo5hfT9tzv 1wx8J4wWD+34qmPzG3bAQeT37RexCxyn8IFkXRxCpWNe/uIVBoOQFCY0u53B8He6ViN+ 4xWg== X-Gm-Message-State: AOAM530fxKSbw1SmsZ8oanbSjog83Fe5r6UMaUJgyvPtyVPeDLVo4Xne DBy6bP5CVHtu2TUJNXrfGz2BRA== X-Received: by 2002:a17:90a:d3d2:: with SMTP id d18mr8775350pjw.102.1627743467767; Sat, 31 Jul 2021 07:57:47 -0700 (PDT) Received: from [192.168.1.116] ([198.8.77.61]) by smtp.gmail.com with ESMTPSA id s31sm6998392pgm.27.2021.07.31.07.57.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 31 Jul 2021 07:57:47 -0700 (PDT) Subject: Re: [PATCH -next] nbd: add the check to prevent overflow in __nbd_ioctl() To: Baokun Li , josef@toxicpanda.com, linux-block@vger.kernel.org, nbd@other.debian.org, linux-kernel@vger.kernel.org Cc: patchwork@huawei.com, Hulk Robot References: <20210731014854.3953274-1-libaokun1@huawei.com> From: Jens Axboe Message-ID: Date: Sat, 31 Jul 2021 08:57:44 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210731014854.3953274-1-libaokun1@huawei.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/30/21 7:48 PM, Baokun Li wrote: > If user specify a large enough value of NBD blocks option, it may trigger > signed integer overflow which may lead to nbd->config->bytesize becomes a > large or small value, zero in particular. > > UBSAN: Undefined behaviour in drivers/block/nbd.c:325:31 > signed integer overflow: > 1024 * 4611686155866341414 cannot be represented in type 'long long int' > [...] > Call trace: > [...] > handle_overflow+0x188/0x1dc lib/ubsan.c:192 > __ubsan_handle_mul_overflow+0x34/0x44 lib/ubsan.c:213 > nbd_size_set drivers/block/nbd.c:325 [inline] > __nbd_ioctl drivers/block/nbd.c:1342 [inline] > nbd_ioctl+0x998/0xa10 drivers/block/nbd.c:1395 > __blkdev_driver_ioctl block/ioctl.c:311 [inline] > [...] > > Although it is not a big deal, still silence the UBSAN by limit > the input value. > > Reported-by: Hulk Robot > Signed-off-by: Baokun Li > --- > drivers/block/nbd.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/block/nbd.c b/drivers/block/nbd.c > index c38317979f74..7c838bf8cc31 100644 > --- a/drivers/block/nbd.c > +++ b/drivers/block/nbd.c > @@ -1398,6 +1398,8 @@ static int __nbd_ioctl(struct block_device *bdev, struct nbd_device *nbd, > case NBD_SET_SIZE: > return nbd_set_size(nbd, arg, config->blksize); > case NBD_SET_SIZE_BLOCKS: > + if (arg && (LLONG_MAX / arg <= config->blksize)) > + return -EINVAL; Use check_mul_overflow() instead? -- Jens Axboe