Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4159730pxb; Mon, 27 Sep 2021 10:36:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzdl/rQJ6EaqX9cEH0xVdzZXeW+SM27lQXLXGsnn54fWvmNorNiWUC62cb/ZdaytqsWox5c X-Received: by 2002:a17:90a:b288:: with SMTP id c8mr295798pjr.67.1632764175414; Mon, 27 Sep 2021 10:36:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632764175; cv=none; d=google.com; s=arc-20160816; b=r+hnwq9AEanRgZBNX2lCup5QaaBCAWoJbPc6ajqa8HgILlKrk2rFrPtVxktUcfYNdy RcMNNMrI2ygm1ufuKVHXgadchp7l1ZMgT6r08ORF56JTD7M2rww6g6eoVgZeYL81YxeZ QCekHomttAWce2ywWwAPt3sBpYRWBrVVnEFLEngAbF2ttV+uOcxaDHzoU1wq2VCn54Xz 2bFsq8AaXDvSpRPQQ9yz8x7ref8CORH6lpsh5LoY3YiIQLd11pcg5N2gAV/7e6WqZ884 9qY5TUiUCyj7p+rG59q/JhTLY+zIsTO17lynmteLSRqQNRaRbohdTCTn9w9PuUXUp7NC TKkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=L6xjDVlGguElUm+oMnYcDB6U2QW7gk5Qe4IwGviAmxE=; b=pNVwEwzqCGHs7sK9HGnP+CgQEaQv3TNeXrsFaobHBxGEH07jhKM3Hpt1R7+cAlGfHf 4cnL89ed8sWtsFhUNSIM++TgM5uFqa3SFTmyUZhejiljvHu4dMOJC7iPTGKoxkDYhZ3a jwHF88dXKyDge78A0MNDHA+G27JJQq8PgYilSZbXHkDOTOFqF8jLW0iiEwgeZm45fKfk RwOUf5IrmTWYjfZTbsOtM0RrOlwkzznRQAyXRivolqBfiBOtilFhGZOW/I52hdkmJ+cp 2q5OyyqZp8YXs2CNyF1evP5j0eSwrSD3D5BjSZnL3Yy6tiIVKGZO+3vZoYtkHqZmO5+V OvKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JDk9FuUv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o19si26612913pgu.606.2021.09.27.10.35.58; Mon, 27 Sep 2021 10:36:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JDk9FuUv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236791AbhI0Rfe (ORCPT + 99 others); Mon, 27 Sep 2021 13:35:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:45988 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236523AbhI0RaN (ORCPT ); Mon, 27 Sep 2021 13:30:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4F69A6127A; Mon, 27 Sep 2021 17:18:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1632763096; bh=04kIWPn05Hq1DT9FgELgq24nOOVbuN6zG7jDb7g0c10=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JDk9FuUv1j5JjZIPWzU/dympazHHoGkQFEXG9E+VBYbkVKBeUgJdAdpwQsSmeyjfr P+1q1VbPmbF/h3b6midMMAxkzLD5pSMKapjXyH+fFsimF815l/WzPXjmiBDJkOGfb/ MXfCCwhNvjHC9OYu/kmpe7XDGA8qozHDusDtc3A4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Linus Torvalds , Arnd Bergmann Subject: [PATCH 5.14 159/162] qnx4: work around gcc false positive warning bug Date: Mon, 27 Sep 2021 19:03:25 +0200 Message-Id: <20210927170238.934031003@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210927170233.453060397@linuxfoundation.org> References: <20210927170233.453060397@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit d5f6545934c47e97c0b48a645418e877b452a992 upstream. In commit b7213ffa0e58 ("qnx4: avoid stringop-overread errors") I tried to teach gcc about how the directory entry structure can be two different things depending on a status flag. It made the code clearer, and it seemed to make gcc happy. However, Arnd points to a gcc bug, where despite using two different members of a union, gcc then gets confused, and uses the size of one of the members to decide if a string overrun happens. And not necessarily the rigth one. End result: with some configurations, gcc-11 will still complain about the source buffer size being overread: fs/qnx4/dir.c: In function 'qnx4_readdir': fs/qnx4/dir.c:76:32: error: 'strnlen' specified bound [16, 48] exceeds source size 1 [-Werror=stringop-overread] 76 | size = strnlen(name, size); | ^~~~~~~~~~~~~~~~~~~ fs/qnx4/dir.c:26:22: note: source object declared here 26 | char de_name; | ^~~~~~~ because gcc will get confused about which union member entry is actually getting accessed, even when the source code is very clear about it. Gcc internally will have combined two "redundant" pointers (pointing to different union elements that are at the same offset), and takes the size checking from one or the other - not necessarily the right one. This is clearly a gcc bug, but we can work around it fairly easily. The biggest thing here is the big honking comment about why we do what we do. Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 Reported-and-tested-by: Arnd Bergmann Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/qnx4/dir.c | 36 +++++++++++++++++++++++++++--------- 1 file changed, 27 insertions(+), 9 deletions(-) --- a/fs/qnx4/dir.c +++ b/fs/qnx4/dir.c @@ -20,12 +20,33 @@ * depending on the status field in the last byte. The * first byte is where the name start either way, and a * zero means it's empty. + * + * Also, due to a bug in gcc, we don't want to use the + * real (differently sized) name arrays in the inode and + * link entries, but always the 'de_name[]' one in the + * fake struct entry. + * + * See + * + * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 + * + * for details, but basically gcc will take the size of the + * 'name' array from one of the used union entries randomly. + * + * This use of 'de_name[]' (48 bytes) avoids the false positive + * warnings that would happen if gcc decides to use 'inode.di_name' + * (16 bytes) even when the pointer and size were to come from + * 'link.dl_name' (48 bytes). + * + * In all cases the actual name pointer itself is the same, it's + * only the gcc internal 'what is the size of this field' logic + * that can get confused. */ union qnx4_directory_entry { struct { - char de_name; - char de_pad[62]; - char de_status; + const char de_name[48]; + u8 de_pad[15]; + u8 de_status; }; struct qnx4_inode_entry inode; struct qnx4_link_info link; @@ -53,29 +74,26 @@ static int qnx4_readdir(struct file *fil ix = (ctx->pos >> QNX4_DIR_ENTRY_SIZE_BITS) % QNX4_INODES_PER_BLOCK; for (; ix < QNX4_INODES_PER_BLOCK; ix++, ctx->pos += QNX4_DIR_ENTRY_SIZE) { union qnx4_directory_entry *de; - const char *name; offset = ix * QNX4_DIR_ENTRY_SIZE; de = (union qnx4_directory_entry *) (bh->b_data + offset); - if (!de->de_name) + if (!de->de_name[0]) continue; if (!(de->de_status & (QNX4_FILE_USED|QNX4_FILE_LINK))) continue; if (!(de->de_status & QNX4_FILE_LINK)) { size = sizeof(de->inode.di_fname); - name = de->inode.di_fname; ino = blknum * QNX4_INODES_PER_BLOCK + ix - 1; } else { size = sizeof(de->link.dl_fname); - name = de->link.dl_fname; ino = ( le32_to_cpu(de->link.dl_inode_blk) - 1 ) * QNX4_INODES_PER_BLOCK + de->link.dl_inode_ndx; } - size = strnlen(name, size); + size = strnlen(de->de_name, size); QNX4DEBUG((KERN_INFO "qnx4_readdir:%.*s\n", size, name)); - if (!dir_emit(ctx, name, size, ino, DT_UNKNOWN)) { + if (!dir_emit(ctx, de->de_name, size, ino, DT_UNKNOWN)) { brelse(bh); return 0; }