Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp3123666rwb; Mon, 15 Aug 2022 18:42:49 -0700 (PDT) X-Google-Smtp-Source: AA6agR4cfHfpvjc7BuYRxw3aS1Hv9coHRPoE6DbIiGdPEyBRpVcBQf0DIzvLYFgr/FzQzUcyhfnB X-Received: by 2002:a17:907:7256:b0:730:f074:963c with SMTP id ds22-20020a170907725600b00730f074963cmr12258134ejc.201.1660614169673; Mon, 15 Aug 2022 18:42:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660614169; cv=none; d=google.com; s=arc-20160816; b=mW26mauMwn5pBQ6lo/8IoKFAjU24KcewrDHnQ2wSer+L6Nogh3LVYQznrHjl0kAGHw UN80qfSV2TqYudfn844Q6rj+Cmg06nJ89PLlfLiXItlPzlJjbvc9NFaG4q/LBneeJrbu AjCkD8pRKV2mD6kq2PemErJSnnTxVXuGoRYaaKERq+Dqo/Ws8NTqyXBe67MVppnCRmKJ RJqWHjh03xdVWQSp8UECehiqeMNHLyXR09WC27OTelwuwNWQ8x6+a9aZs0cOdlULmug9 XCDM2ejNs25NYauB7dU56VFcWrGQLEYbB2gcA5XS1Y2fCvbN6g+hIhO5L4U7/wNXRZgq AGhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=40abvZKNPDLnKMaYsCIsbJHc45StNMBQlXWvEsuNbls=; b=B11fP/QejESYHuuuXyILlwUJvyMRzUPl3GarxQhQXxF26phWDmboXnj2jLLSadmi92 KJp70ujXrkLM9dtvLf8UlfoFEuqc0wJqceg1XJKz5OH2lQC/D/brMDoZ7hw01Sc96IXB 8aibfpO3Y6qAG+07s4HPXhu/laERwAnsvQbIYpNT7T38MHH+AYrVw59HJhLXoT/f4Hvv eA88z+vEK7PTqFAsIwCxEvJDiDP/SaBCWbnxXKOnZIAb4Z9RHXOM4bHKjDCJ1mdr4Ve4 ATly13tCZLEbCGnfDKGRF8LdbtGs2Q9mHxNr/W95Cdd0R6NSCAeZMMEB4vsjw3I8Yv1a MGzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1owQmaQ0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h4-20020a056402280400b0043d100bcf3bsi10623486ede.538.2022.08.15.18.42.23; Mon, 15 Aug 2022 18:42:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1owQmaQ0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244155AbiHPBDm (ORCPT + 99 others); Mon, 15 Aug 2022 21:03:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348489AbiHPA5l (ORCPT ); Mon, 15 Aug 2022 20:57:41 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6DBBEDAEE3; Mon, 15 Aug 2022 13:48:53 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4EE3D6126B; Mon, 15 Aug 2022 20:48:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3B22AC433C1; Mon, 15 Aug 2022 20:48:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660596531; bh=tgdmrLTdQe9hBmm6vZyxh3Cm1CaEASKqr81F1Z/8h5I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1owQmaQ0RpEgV4xxZIT+OSfLFRmkRG8z/V+gJWY8/K2F7XPvxI3M/KhCA8zkMCWNn 6pFRjvpZQ5z8QM7hoIGNtMvFG1xpbtM9Eeg1QeW4JRcFehN8c9u/kKfJX3wzCuY+cg kFTNibeNL1Aak+ilewGPEL69p1fdzOOzwEWBZwXA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mikulas Patocka , Mike Snitzer , Sasha Levin Subject: [PATCH 5.19 1109/1157] dm raid: fix address sanitizer warning in raid_status Date: Mon, 15 Aug 2022 20:07:45 +0200 Message-Id: <20220815180524.658664582@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220815180439.416659447@linuxfoundation.org> References: <20220815180439.416659447@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mikulas Patocka [ Upstream commit 1fbeea217d8f297fe0e0956a1516d14ba97d0396 ] There is this warning when using a kernel with the address sanitizer and running this testsuite: https://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid ================================================================== BUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid] Read of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319 CPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3. #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: dump_stack_lvl+0x6a/0x9c print_address_description.constprop.0+0x1f/0x1e0 print_report.cold+0x55/0x244 kasan_report+0xc9/0x100 raid_status+0x1747/0x2820 [dm_raid] dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod] table_load+0x35c/0x630 [dm_mod] ctl_ioctl+0x411/0x630 [dm_mod] dm_ctl_ioctl+0xa/0x10 [dm_mod] __x64_sys_ioctl+0x12a/0x1a0 do_syscall_64+0x5b/0x80 The warning is caused by reading conf->max_nr_stripes in raid_status. The code in raid_status reads mddev->private, casts it to struct r5conf and reads the entry max_nr_stripes. However, if we have different raid type than 4/5/6, mddev->private doesn't point to struct r5conf; it may point to struct r0conf, struct r1conf, struct r10conf or struct mpconf. If we cast a pointer to one of these structs to struct r5conf, we will be reading invalid memory and KASAN warns about it. Fix this bug by reading struct r5conf only if raid type is 4, 5 or 6. Cc: stable@vger.kernel.org Signed-off-by: Mikulas Patocka Signed-off-by: Mike Snitzer Signed-off-by: Sasha Levin --- drivers/md/dm-raid.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/md/dm-raid.c b/drivers/md/dm-raid.c index 80c9f7134e9b..4e7f870b2277 100644 --- a/drivers/md/dm-raid.c +++ b/drivers/md/dm-raid.c @@ -3509,7 +3509,7 @@ static void raid_status(struct dm_target *ti, status_type_t type, { struct raid_set *rs = ti->private; struct mddev *mddev = &rs->md; - struct r5conf *conf = mddev->private; + struct r5conf *conf = rs_is_raid456(rs) ? mddev->private : NULL; int i, max_nr_stripes = conf ? conf->max_nr_stripes : 0; unsigned long recovery; unsigned int raid_param_cnt = 1; /* at least 1 for chunksize */ -- 2.35.1