Received: by 2002:a19:f614:0:0:0:0:0 with SMTP id x20csp34135lfe; Fri, 15 Apr 2022 18:08:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPtVVpvKwhAGI8F7Aj3Pos1C3LrhaYNRycDKloBbZ+p9hqWWAI21A2++dsbChNujwYZ4Su X-Received: by 2002:a17:90a:6389:b0:1c9:ee11:6c2c with SMTP id f9-20020a17090a638900b001c9ee116c2cmr7027914pjj.107.1650071284109; Fri, 15 Apr 2022 18:08:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650071284; cv=none; d=google.com; s=arc-20160816; b=gJK1lVTYvkn/zswNMh9HNoUJayw8C7p68mhBgYMaK0MKt+TbTvtyjMmH5FNtej1mDl hwWNcKCeNbtSTx7T8yG+Wk9jbz5aXOiN5DC5m8dJCcbIiutlfxKVM/t3q807o3dALc91 txVkiZn5YmW5428imHrUOiFqnu5QdR8QDT/Q3Pis4N+LBV2a5cOUXenTyXpiBWmT0jMr Ev2MDMIYBAz7RbAZ4Qg3OPY1mtnCHG8Co3yf4rWPmkwpS1Hov1BM0nNP66ngF0IEegX9 MOKMpfGiNFToGNnhVS9CM+SzaYvoHuBy+nHjSZfoXm1/D2p2a4E8MzwzJvcRjq9kRRDj w4Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=++mKS/ZR21og5IMOCD07o+xLUgjJGPi2StptPN4Vqec=; b=BpE0BuBfBDmQFpLaayg6vs+CftuSICEXpETt7EmSI6xwy2mY3MAxzE6Lp6pv8Hj/lR /BD/vkAcftQwbCwe3sTIblK0iaiS7FCoIOEMk/VkrD1w9msKO4caH7K003JG1IrstQhk hnlkoL5ghCyMN602VwXq0fomOFCXIEa327hPgr5Xrr5LzolYb2qAYs6ThVZP7zqX95of cJ6yaEpTSwEjkBt7bPxRNigSlWo8i/u51EVRQJTF7NV/myIVDbKmT0YN4Pu2VKUgN0VG zueSJ2RNzqG7Njkid5odMQZ4LycGEODBygpdyshFmCAMjhdE4XIfgLry3RrqldJKZolU V6Cg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id f193-20020a636aca000000b003a283acb91fsi2833980pgc.436.2022.04.15.18.08.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 18:08:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C98DB10077C; Fri, 15 Apr 2022 17:48:22 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349067AbiDODZq (ORCPT + 99 others); Thu, 14 Apr 2022 23:25:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349043AbiDODZo (ORCPT ); Thu, 14 Apr 2022 23:25:44 -0400 Received: from out30-133.freemail.mail.aliyun.com (out30-133.freemail.mail.aliyun.com [115.124.30.133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B0779D4F0; Thu, 14 Apr 2022 20:23:17 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R881e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04426;MF=dtcccc@linux.alibaba.com;NM=1;PH=DS;RN=4;SR=0;TI=SMTPD_---0VA5Gud0_1649992993; Received: from localhost.localdomain(mailfrom:dtcccc@linux.alibaba.com fp:SMTPD_---0VA5Gud0_1649992993) by smtp.aliyun-inc.com(127.0.0.1); Fri, 15 Apr 2022 11:23:14 +0800 From: Tianchen Ding To: "James E.J. Bottomley" , "Martin K. Petersen" Cc: linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH] scsi: ses: Fix out-of-bound write at ses_enclosure_data_process() Date: Fri, 15 Apr 2022 11:23:13 +0800 Message-Id: <20220415032313.94991-1-dtcccc@linux.alibaba.com> X-Mailer: git-send-email 2.30.1 (Apple Git-130) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,HK_RANDOM_FROM,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Our modified KFENCE reported a memory corruption: [   52.584914] BUG: KFENCE: memory corruption in ses_enclosure_data_process+0x24b/0x310 [ses] [   52.584917] Corrupted memory at 0xffff88982de06ff0 [ 0x00 . . . . . . . . . . . . . . . ] (in kfence-#1624698): [   52.607212]  ses_enclosure_data_process+0x24b/0x310 [ses] [   52.607215]  ses_intf_add+0x444/0x542 [ses] [   52.621369]  class_interface_register+0x110/0x120 [   52.621373]  ses_init+0x13/0x1000 [ses] [   52.621377]  do_one_initcall+0x41/0x1c0 [   52.621380]  do_init_module+0x5c/0x260 [   52.621382]  __do_sys_finit_module+0xb1/0x110 [   52.621386]  do_syscall_64+0x2d/0x40 [   52.621388]  entry_SYSCALL_64_after_hwframe+0x44/0xa9 [   52.621393] kfence-#1624698 [0xffff88982de06fc0-0xffff88982de06fe0, size=33, cache=kmalloc-64] allocated by task 1033: [   52.670344]  ses_enclosure_data_process+0x2ae/0x310 [ses] [   52.670347]  ses_intf_add+0x444/0x542 [ses] [   52.670353]  class_interface_register+0x110/0x120 [   52.688165]  ses_init+0x13/0x1000 [ses] [   52.688169]  do_one_initcall+0x41/0x1c0 [   52.688172]  do_init_module+0x5c/0x260 [   52.688174]  __do_sys_finit_module+0xb1/0x110 [   52.688177]  do_syscall_64+0x2d/0x40 [   52.688179]  entry_SYSCALL_64_after_hwframe+0x44/0xa9 This is because we check desc_ptr >= buf + page7_len first but then write '\0' to desc_ptr[len+4], while this address may be out of bound. Fixes: 21fab1d0595e ("[SCSI] ses: update enclosure data on hot add") Signed-off-by: Tianchen Ding --- drivers/scsi/ses.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/scsi/ses.c b/drivers/scsi/ses.c index 0a1734f34587..06b991e27c84 100644 --- a/drivers/scsi/ses.c +++ b/drivers/scsi/ses.c @@ -559,11 +559,11 @@ static void ses_enclosure_data_process(struct enclosure_device *edev, struct enclosure_component *ecomp; if (desc_ptr) { - if (desc_ptr >= buf + page7_len) { + len = (desc_ptr[2] << 8) + desc_ptr[3]; + desc_ptr += 4; + if (desc_ptr + len > buf + page7_len) { desc_ptr = NULL; } else { - len = (desc_ptr[2] << 8) + desc_ptr[3]; - desc_ptr += 4; /* Add trailing zero - pushes into * reserved space */ desc_ptr[len] = '\0'; -- 2.33.0