Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4137568pxb; Mon, 27 Sep 2021 10:08:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxgb+qqhXY0QIQMsDzfChrNCArU62OpH1imnw8eaXqmfj/7v/gXXvprGDJvO8prThFe7IlO X-Received: by 2002:a17:90a:d3cb:: with SMTP id d11mr147279pjw.109.1632762537246; Mon, 27 Sep 2021 10:08:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632762537; cv=none; d=google.com; s=arc-20160816; b=N/xjlBQ3yrs0xRaYERKNjOvCGJXJ3Jt8ONXev/TP64EFEhBWy8nQXTlfho5sIO+TBe w8tyrosU93jOpMsowBq0Ua/f7Yy5cvNXg800WlcIxY5I4XVu8oqtRdaPbFIS5u5lGSj+ 7xmwAv/mOa3jKHtYmQGrZ6nuI8xgIHOjz6W/CxHMyT2/wGXK/k5DiGb4CRXURR4Pfous 1SHHbb6eYvOanN5JdLYydKx90QCEGNBV2eEPDbM3FRHKs4T3ziOv2GzG2YZVqHKIaFVO w09ktTQjt97QQmrunmeIgwVhQnbV/oo41sWo5AimDTp4HEDLa6iLKm9weAOWOTXHmiqR G7ZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=L6xjDVlGguElUm+oMnYcDB6U2QW7gk5Qe4IwGviAmxE=; b=zTm9MejqdpHwu8vAsESoydgJBqvS1rlNYdAopgYgYiy3XCRxkrXWZPD8BMax5jmBmy cBFmudcw99Hyhs+6H/edtdrHhp9UaNWnWh7YNYDP++x2kHB9Z++IaUnw2T+AXAF2ovmS qTgF+MNDLqyicHSNfQuN9pXjIVfRxFNBsF97J7ySpFoGZZzVvowcOQTLgOuo7Yo+S5dV KirDinPv53mUiLwTqUqZ2yabQ/03zebasmmC62YOsH/gRXT93KgHasZ5uPMttNA+dQ9Z BK8Pw8Cmzu4a2A6K9BN3CYI4Z44JJdA61JbfV/Nrb/FQXAjVCYPDSdzo+vP6sPEtJH8a QLPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="keU/sqqU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l184si22481447pfl.52.2021.09.27.10.08.44; Mon, 27 Sep 2021 10:08:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="keU/sqqU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236481AbhI0RJk (ORCPT + 99 others); Mon, 27 Sep 2021 13:09:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:47366 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236161AbhI0RIT (ORCPT ); Mon, 27 Sep 2021 13:08:19 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AA986611CE; Mon, 27 Sep 2021 17:06:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1632762396; bh=04kIWPn05Hq1DT9FgELgq24nOOVbuN6zG7jDb7g0c10=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=keU/sqqUh6+hkzYarQATnS+O8GVAf0eXksEiPxI6q3VdhrNZ5jQXCsab3R8WMBz4T dwJt+tng3FSCNRg1DpDjH/q1Qr4vGuEUffcLWL9AGtYt6VCJlNsFyK6kX84QgvNJKW 0X34V3wLcCqMXxMxITrSXihjnrDpj1r2z5q/GQqQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Linus Torvalds , Arnd Bergmann Subject: [PATCH 5.4 68/68] qnx4: work around gcc false positive warning bug Date: Mon, 27 Sep 2021 19:03:04 +0200 Message-Id: <20210927170222.317207591@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210927170219.901812470@linuxfoundation.org> References: <20210927170219.901812470@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit d5f6545934c47e97c0b48a645418e877b452a992 upstream. In commit b7213ffa0e58 ("qnx4: avoid stringop-overread errors") I tried to teach gcc about how the directory entry structure can be two different things depending on a status flag. It made the code clearer, and it seemed to make gcc happy. However, Arnd points to a gcc bug, where despite using two different members of a union, gcc then gets confused, and uses the size of one of the members to decide if a string overrun happens. And not necessarily the rigth one. End result: with some configurations, gcc-11 will still complain about the source buffer size being overread: fs/qnx4/dir.c: In function 'qnx4_readdir': fs/qnx4/dir.c:76:32: error: 'strnlen' specified bound [16, 48] exceeds source size 1 [-Werror=stringop-overread] 76 | size = strnlen(name, size); | ^~~~~~~~~~~~~~~~~~~ fs/qnx4/dir.c:26:22: note: source object declared here 26 | char de_name; | ^~~~~~~ because gcc will get confused about which union member entry is actually getting accessed, even when the source code is very clear about it. Gcc internally will have combined two "redundant" pointers (pointing to different union elements that are at the same offset), and takes the size checking from one or the other - not necessarily the right one. This is clearly a gcc bug, but we can work around it fairly easily. The biggest thing here is the big honking comment about why we do what we do. Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 Reported-and-tested-by: Arnd Bergmann Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/qnx4/dir.c | 36 +++++++++++++++++++++++++++--------- 1 file changed, 27 insertions(+), 9 deletions(-) --- a/fs/qnx4/dir.c +++ b/fs/qnx4/dir.c @@ -20,12 +20,33 @@ * depending on the status field in the last byte. The * first byte is where the name start either way, and a * zero means it's empty. + * + * Also, due to a bug in gcc, we don't want to use the + * real (differently sized) name arrays in the inode and + * link entries, but always the 'de_name[]' one in the + * fake struct entry. + * + * See + * + * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 + * + * for details, but basically gcc will take the size of the + * 'name' array from one of the used union entries randomly. + * + * This use of 'de_name[]' (48 bytes) avoids the false positive + * warnings that would happen if gcc decides to use 'inode.di_name' + * (16 bytes) even when the pointer and size were to come from + * 'link.dl_name' (48 bytes). + * + * In all cases the actual name pointer itself is the same, it's + * only the gcc internal 'what is the size of this field' logic + * that can get confused. */ union qnx4_directory_entry { struct { - char de_name; - char de_pad[62]; - char de_status; + const char de_name[48]; + u8 de_pad[15]; + u8 de_status; }; struct qnx4_inode_entry inode; struct qnx4_link_info link; @@ -53,29 +74,26 @@ static int qnx4_readdir(struct file *fil ix = (ctx->pos >> QNX4_DIR_ENTRY_SIZE_BITS) % QNX4_INODES_PER_BLOCK; for (; ix < QNX4_INODES_PER_BLOCK; ix++, ctx->pos += QNX4_DIR_ENTRY_SIZE) { union qnx4_directory_entry *de; - const char *name; offset = ix * QNX4_DIR_ENTRY_SIZE; de = (union qnx4_directory_entry *) (bh->b_data + offset); - if (!de->de_name) + if (!de->de_name[0]) continue; if (!(de->de_status & (QNX4_FILE_USED|QNX4_FILE_LINK))) continue; if (!(de->de_status & QNX4_FILE_LINK)) { size = sizeof(de->inode.di_fname); - name = de->inode.di_fname; ino = blknum * QNX4_INODES_PER_BLOCK + ix - 1; } else { size = sizeof(de->link.dl_fname); - name = de->link.dl_fname; ino = ( le32_to_cpu(de->link.dl_inode_blk) - 1 ) * QNX4_INODES_PER_BLOCK + de->link.dl_inode_ndx; } - size = strnlen(name, size); + size = strnlen(de->de_name, size); QNX4DEBUG((KERN_INFO "qnx4_readdir:%.*s\n", size, name)); - if (!dir_emit(ctx, name, size, ino, DT_UNKNOWN)) { + if (!dir_emit(ctx, de->de_name, size, ino, DT_UNKNOWN)) { brelse(bh); return 0; }