Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp812888rwd; Thu, 8 Jun 2023 08:05:42 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6tIM/2I9woyKBQ7S+uFdHtXE9ws2FXgIlOIpGDGAgfFDkV2ohhxEWCghvFsMsc2xP3OGa3 X-Received: by 2002:a05:6a00:3a26:b0:64c:4f2f:a235 with SMTP id fj38-20020a056a003a2600b0064c4f2fa235mr10068775pfb.30.1686236742431; Thu, 08 Jun 2023 08:05:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686236742; cv=none; d=google.com; s=arc-20160816; b=SSyomqPDUy8+e5tsD+S8jIEbCblSmYWvwCHrYrtageQJqHfK++ur06nsZNcDD2PuNl ytZssKvuLDl7GBsUtOtdP3TF8JyrLHxiXefYM8dirNQIZYVv4h53Fp3da1Imji7k7bH2 PyLo7XM8G24PxSsg7XGtfr/pSkk2QJGwWo5XgEC9p/HU04+HZeYRLUoSX75jp7iFb4TG ti1iGTMhkDtXTg7fLXF32b/I1Tci4PZ5VeZviMI3Zxp3SrG8B7kqiD/Ld8q1NcXlHFVx W3iXKh8GZ9LSyhgLo75IigiEOu+EwoNrWsHitfPLGbjYltr5mL2c8gfM+bLjVuJbVip4 jVBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=0Aw7Wu2OLqavL3wXWB1x4KR35PGUFeViDqCX1MiSG20=; b=N+PKLYXaTbftZSqBKig+Gk55r2Xysrym3rIwtihffFBMSaxn6px3dqZ5G3F/hlmG2M 8MJ8Lr7KL11MLQp6XoztZgEBddx2/8SEtWOkDdNAvHGTjcDp8gW9quHRUA/QDPI6lNfy R2hfgmDiY8XFQYt7keu07P1KEO0sJfwnEo7pAjVn01pRJIHxlbpzJxnazPe7Za67ZP8I 5iyqXZCeh3VhN4rxj/MaUqMjgXa4pxFFNEirkHbjSRnmCLSl7Ub5UG0fb0BJbseZrF4Y x917n6LmO558TaRwjlw0LDJieoljXsrxbeOWRX2HjPi6pbLVld1ADHLS/XVCTLYgfE2y 2MHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=faAx3kZe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v123-20020a626181000000b0064d6a514682si891203pfb.366.2023.06.08.08.05.28; Thu, 08 Jun 2023 08:05:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=faAx3kZe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236589AbjFHOe0 (ORCPT + 99 others); Thu, 8 Jun 2023 10:34:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34364 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236514AbjFHOeY (ORCPT ); Thu, 8 Jun 2023 10:34:24 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CAFE02D53; Thu, 8 Jun 2023 07:34:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686234860; x=1717770860; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=XxmivJGLgaCaH1WntFP9Euy9AMy9td0vUpD6mlwrIWU=; b=faAx3kZeM7Bc1PN1Gd3r1wwaWOutMgRsQkiczA6kkEcAs9HYVKLZ1Q1u WXy/J69GpJ5WUQBsxzVwpXxa/1K1WjjCj2vQcNoMVTIbN9R0NkQ1vDK8I q3w1PiIiC2b8z+w6EqN+nMlxpbIv5dc4YYiZThZoZRow721xKF7xAuF5S weSLDD5lDHlUYKzxDUrC7nub83RWBpsaHTRVl8+YFz4zCL2u4uBM1yYzo EdVN1DGx6t9jhUkRm3496vYX6eT1vWBqvn25ThSCYJ3SXN784nByY39Rg L3DiJkALF4/65gPdnpeZNfZV0S8rXRJcLDDIEXPpohFxnGPYHIboenLAT Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10735"; a="423188590" X-IronPort-AV: E=Sophos;i="6.00,227,1681196400"; d="scan'208";a="423188590" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jun 2023 07:27:58 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10735"; a="1040125134" X-IronPort-AV: E=Sophos;i="6.00,227,1681196400"; d="scan'208";a="1040125134" Received: from smile.fi.intel.com ([10.237.72.54]) by fmsmga005.fm.intel.com with ESMTP; 08 Jun 2023 07:27:52 -0700 Received: from andy by smile.fi.intel.com with local (Exim 4.96) (envelope-from ) id 1q7GcA-002BKI-0n; Thu, 08 Jun 2023 17:27:50 +0300 Date: Thu, 8 Jun 2023 17:27:50 +0300 From: Andy Shevchenko To: Richard Weinberger Cc: linux-hardening@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, keescook@chromium.org, Petr Mladek , Steven Rostedt , Sergey Senozhatsky , Rasmus Villemoes , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?iso-8859-1?Q?Bj=F6rn?= Roy Baron , Benno Lossin , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend Subject: Re: [RFC PATCH 1/1] vsprintf: Warn on integer scanning overflows Message-ID: References: <20230607223755.1610-1-richard@nod.at> <20230607223755.1610-2-richard@nod.at> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230607223755.1610-2-richard@nod.at> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 08, 2023 at 12:37:55AM +0200, Richard Weinberger wrote: > The scanf function family has no way to indicate overflows > while scanning. As consequence users of these function have to make > sure their input cannot cause an overflow. > Since this is not always the case add WARN_ON_ONCE() guards to > trigger a warning upon an overflow. ... > if (prefix_chars < max_chars) { > rv = _parse_integer_limit(cp, base, &result, max_chars - prefix_chars); > + WARN_ON_ONCE(rv & KSTRTOX_OVERFLOW); This seems incorrect. simple_strto*() are okay to overflow. It's by design. > /* FIXME */ ...and that's why this one is here. > cp += (rv & ~KSTRTOX_OVERFLOW); > } else { -- With Best Regards, Andy Shevchenko