Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp3922728pxb; Mon, 4 Oct 2021 12:43:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw2ktYGUW6C3w+ie7rb2G9a7i5X5x5+n8wDBYhI2tfmBAgLDrpk6XyIdeX2XjoSmOL2E3Wm X-Received: by 2002:a50:cd87:: with SMTP id p7mr20337107edi.294.1633376631961; Mon, 04 Oct 2021 12:43:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633376631; cv=none; d=google.com; s=arc-20160816; b=zn6F2IiCseQwOEylvk7niHkyiBrLHSh4j6F7IbAMrvytj4EcY9Ive3EOdJAjf31acz CBLE+Vodrf3WEWsH103NPcrk7i3MSVs04jmXN3uboh/8kxgeXsH2lT1tPGuEui3q1l2V o9UKhxRjGROIWe0J6A2FKbevU7vnHXNZ4t6eS8GBeIxY0eVq+GuAh9LBixHGb4zHmgGa +PLSyaFZMT1IoMExq5cVdRS5duUItNRlp9NFdf1ZVAN8BfuspEtp7ZsHbI6R/57OIZBs GTIc/AkfFwtrCATSXRsYPhRR9oK8QnE8RCKk2ShDmQMduAi97P7KoNEQeSTTwBfS4ZJd xUpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=L6xjDVlGguElUm+oMnYcDB6U2QW7gk5Qe4IwGviAmxE=; b=eaFWtxYFw8+55sPZmPFsXCmzQnFzVSQshcULM9FxccbPOyYycR2RmRFG0v/Nd7JDh/ 0lNwkMR+dNvyI9eL45lTUTfB2EFGwzpNaGgDfM8HJW44UuNM8vl+0swrx3vcNBs2PNLc 9nFv/NfGYfCoc5Glk8Zeh+CdpxdWm2A1zhCbuNvh/4uYnHdUM2uCYYKur0C3Uo/JmmkM Uxa7vQf7anX8IIVh+3Ia4lvz4bpEmywGvc+uaePPK7nnT1G5Y2rpxeDjXQS/BxEkSwY8 cBLOh74nUvJDk4KuzFsMupttGCnl/SIfgc2Z6XKTvF5IUb8cyN6yhn1KR7qYzfQiYFRy 0BCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=iwUSC76L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z20si6736678edi.541.2021.10.04.12.43.25; Mon, 04 Oct 2021 12:43:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=iwUSC76L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235214AbhJDNH5 (ORCPT + 99 others); Mon, 4 Oct 2021 09:07:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:38546 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235235AbhJDNF6 (ORCPT ); Mon, 4 Oct 2021 09:05:58 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4247961A4F; Mon, 4 Oct 2021 13:01:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633352467; bh=04kIWPn05Hq1DT9FgELgq24nOOVbuN6zG7jDb7g0c10=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iwUSC76L/IuEd+gS6cp0k6MXHaY4sf7y5fcJHU3Kqjtg3KprXydA00MSgQ03dUsHT ekUL4jCkwuY4ffWem2dcNS4/Ggre0Q+icqRt53mIwyxlbCjPsrPmQ/ohBgM3LKnlIp tkh3Lea5Re0aZwZW0AF0dKLY2PO1u1kohF3CsaYk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Linus Torvalds , Arnd Bergmann Subject: [PATCH 4.14 41/75] qnx4: work around gcc false positive warning bug Date: Mon, 4 Oct 2021 14:52:16 +0200 Message-Id: <20211004125032.891042855@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211004125031.530773667@linuxfoundation.org> References: <20211004125031.530773667@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit d5f6545934c47e97c0b48a645418e877b452a992 upstream. In commit b7213ffa0e58 ("qnx4: avoid stringop-overread errors") I tried to teach gcc about how the directory entry structure can be two different things depending on a status flag. It made the code clearer, and it seemed to make gcc happy. However, Arnd points to a gcc bug, where despite using two different members of a union, gcc then gets confused, and uses the size of one of the members to decide if a string overrun happens. And not necessarily the rigth one. End result: with some configurations, gcc-11 will still complain about the source buffer size being overread: fs/qnx4/dir.c: In function 'qnx4_readdir': fs/qnx4/dir.c:76:32: error: 'strnlen' specified bound [16, 48] exceeds source size 1 [-Werror=stringop-overread] 76 | size = strnlen(name, size); | ^~~~~~~~~~~~~~~~~~~ fs/qnx4/dir.c:26:22: note: source object declared here 26 | char de_name; | ^~~~~~~ because gcc will get confused about which union member entry is actually getting accessed, even when the source code is very clear about it. Gcc internally will have combined two "redundant" pointers (pointing to different union elements that are at the same offset), and takes the size checking from one or the other - not necessarily the right one. This is clearly a gcc bug, but we can work around it fairly easily. The biggest thing here is the big honking comment about why we do what we do. Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 Reported-and-tested-by: Arnd Bergmann Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/qnx4/dir.c | 36 +++++++++++++++++++++++++++--------- 1 file changed, 27 insertions(+), 9 deletions(-) --- a/fs/qnx4/dir.c +++ b/fs/qnx4/dir.c @@ -20,12 +20,33 @@ * depending on the status field in the last byte. The * first byte is where the name start either way, and a * zero means it's empty. + * + * Also, due to a bug in gcc, we don't want to use the + * real (differently sized) name arrays in the inode and + * link entries, but always the 'de_name[]' one in the + * fake struct entry. + * + * See + * + * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99578#c6 + * + * for details, but basically gcc will take the size of the + * 'name' array from one of the used union entries randomly. + * + * This use of 'de_name[]' (48 bytes) avoids the false positive + * warnings that would happen if gcc decides to use 'inode.di_name' + * (16 bytes) even when the pointer and size were to come from + * 'link.dl_name' (48 bytes). + * + * In all cases the actual name pointer itself is the same, it's + * only the gcc internal 'what is the size of this field' logic + * that can get confused. */ union qnx4_directory_entry { struct { - char de_name; - char de_pad[62]; - char de_status; + const char de_name[48]; + u8 de_pad[15]; + u8 de_status; }; struct qnx4_inode_entry inode; struct qnx4_link_info link; @@ -53,29 +74,26 @@ static int qnx4_readdir(struct file *fil ix = (ctx->pos >> QNX4_DIR_ENTRY_SIZE_BITS) % QNX4_INODES_PER_BLOCK; for (; ix < QNX4_INODES_PER_BLOCK; ix++, ctx->pos += QNX4_DIR_ENTRY_SIZE) { union qnx4_directory_entry *de; - const char *name; offset = ix * QNX4_DIR_ENTRY_SIZE; de = (union qnx4_directory_entry *) (bh->b_data + offset); - if (!de->de_name) + if (!de->de_name[0]) continue; if (!(de->de_status & (QNX4_FILE_USED|QNX4_FILE_LINK))) continue; if (!(de->de_status & QNX4_FILE_LINK)) { size = sizeof(de->inode.di_fname); - name = de->inode.di_fname; ino = blknum * QNX4_INODES_PER_BLOCK + ix - 1; } else { size = sizeof(de->link.dl_fname); - name = de->link.dl_fname; ino = ( le32_to_cpu(de->link.dl_inode_blk) - 1 ) * QNX4_INODES_PER_BLOCK + de->link.dl_inode_ndx; } - size = strnlen(name, size); + size = strnlen(de->de_name, size); QNX4DEBUG((KERN_INFO "qnx4_readdir:%.*s\n", size, name)); - if (!dir_emit(ctx, name, size, ino, DT_UNKNOWN)) { + if (!dir_emit(ctx, de->de_name, size, ino, DT_UNKNOWN)) { brelse(bh); return 0; }