public inbox for linux-scsi@vger.kernel.org
 help / color / mirror / Atom feed
* re: [SCSI] scsi_dh: Update EMC handler
@ 2015-07-11 22:14 Dan Carpenter
  2015-07-13 14:06 ` Hannes Reinecke
  0 siblings, 1 reply; 2+ messages in thread
From: Dan Carpenter @ 2015-07-11 22:14 UTC (permalink / raw)
  To: hare; +Cc: linux-scsi

Hello Hannes Reinecke,

The patch b6ff1b14cdf4: "[SCSI] scsi_dh: Update EMC handler" from Jul
17, 2008, leads to the following static checker warning:

	drivers/scsi/device_handler/scsi_dh_emc.c:252 parse_sp_model()
	warn: buffer overflow 'buffer' 252 <= 255

drivers/scsi/device_handler/scsi_dh_emc.c
   217  static char * parse_sp_model(struct scsi_device *sdev, unsigned char *buffer)
   218  {
   219          unsigned char len = buffer[4] + 5;

The warning is simply because Smatch assumes that "len" can be up to 255
since it is a u8.  That is likely not a real concern but I think there
are some off by one errors.

   220          char *sp_model = NULL;
   221          unsigned char sp_len, serial_len;
   222  
   223          if (len < 160) {

These conditions seem off by one to me.  If len == 160 then we can read
up to buffer[159]?  I think this should be:

		if (len < 161).

   224                  sdev_printk(KERN_WARNING, sdev,
   225                              "%s: Invalid information section length %d\n",
   226                              CLARIION_NAME, len);
   227                  /* Check for old FC arrays */
   228                  if (!strncmp(buffer + 8, "DGC", 3)) {
   229                          /* Old FC array, not supporting extended information */
   230                          sp_model = emc_default_str;
   231                  }
   232                  goto out;
   233          }
   234  
   235          /*
   236           * Parse extended information for SP model number
   237           */
   238          serial_len = buffer[160];
   239          if (serial_len == 0 || serial_len + 161 > len) {

Here the > should probably be >=.

   240                  sdev_printk(KERN_WARNING, sdev,
   241                              "%s: Invalid array serial number length %d\n",
   242                              CLARIION_NAME, serial_len);
   243                  goto out;
   244          }
   245          sp_len = buffer[99];
   246          if (sp_len == 0 || serial_len + sp_len + 161 > len) {

And here as well.

   247                  sdev_printk(KERN_WARNING, sdev,
   248                              "%s: Invalid model number length %d\n",
   249                              CLARIION_NAME, sp_len);
   250                  goto out;
   251          }
   252          sp_model = &buffer[serial_len + 161];


Otherwise we are potetially reading from &buffer[len] here which looks
off by one.

   253          /* Strip whitespace at the end */
   254          while (sp_len > 1 && sp_model[sp_len - 1] == ' ')
   255                  sp_len--;
   256  
   257          sp_model[sp_len] = '\0';
   258  
   259  out:
   260          return sp_model;
   261  }

regards,
dan carpenter

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [SCSI] scsi_dh: Update EMC handler
  2015-07-11 22:14 [SCSI] scsi_dh: Update EMC handler Dan Carpenter
@ 2015-07-13 14:06 ` Hannes Reinecke
  0 siblings, 0 replies; 2+ messages in thread
From: Hannes Reinecke @ 2015-07-13 14:06 UTC (permalink / raw)
  To: Dan Carpenter; +Cc: linux-scsi

On 07/12/2015 12:14 AM, Dan Carpenter wrote:
> Hello Hannes Reinecke,
> 
> The patch b6ff1b14cdf4: "[SCSI] scsi_dh: Update EMC handler" from Jul
> 17, 2008, leads to the following static checker warning:
> 
> 	drivers/scsi/device_handler/scsi_dh_emc.c:252 parse_sp_model()
> 	warn: buffer overflow 'buffer' 252 <= 255
> 
> drivers/scsi/device_handler/scsi_dh_emc.c
>    217  static char * parse_sp_model(struct scsi_device *sdev, unsigned char *buffer)
>    218  {
>    219          unsigned char len = buffer[4] + 5;
> 
> The warning is simply because Smatch assumes that "len" can be up to 255
> since it is a u8.  That is likely not a real concern but I think there
> are some off by one errors.
> 
>    220          char *sp_model = NULL;
>    221          unsigned char sp_len, serial_len;
>    222  
>    223          if (len < 160) {
> 
> These conditions seem off by one to me.  If len == 160 then we can read
> up to buffer[159]?  I think this should be:
> 
> 		if (len < 161).
> 
>    224                  sdev_printk(KERN_WARNING, sdev,
>    225                              "%s: Invalid information section length %d\n",
>    226                              CLARIION_NAME, len);
>    227                  /* Check for old FC arrays */
>    228                  if (!strncmp(buffer + 8, "DGC", 3)) {
>    229                          /* Old FC array, not supporting extended information */
>    230                          sp_model = emc_default_str;
>    231                  }
>    232                  goto out;
>    233          }
>    234  
>    235          /*
>    236           * Parse extended information for SP model number
>    237           */
>    238          serial_len = buffer[160];
>    239          if (serial_len == 0 || serial_len + 161 > len) {
> 
> Here the > should probably be >=.
> 
>    240                  sdev_printk(KERN_WARNING, sdev,
>    241                              "%s: Invalid array serial number length %d\n",
>    242                              CLARIION_NAME, serial_len);
>    243                  goto out;
>    244          }
>    245          sp_len = buffer[99];
>    246          if (sp_len == 0 || serial_len + sp_len + 161 > len) {
> 
> And here as well.
> 
>    247                  sdev_printk(KERN_WARNING, sdev,
>    248                              "%s: Invalid model number length %d\n",
>    249                              CLARIION_NAME, sp_len);
>    250                  goto out;
>    251          }
>    252          sp_model = &buffer[serial_len + 161];
> 
> 
> Otherwise we are potetially reading from &buffer[len] here which looks
> off by one.
> 
>    253          /* Strip whitespace at the end */
>    254          while (sp_len > 1 && sp_model[sp_len - 1] == ' ')
>    255                  sp_len--;
>    256  
>    257          sp_model[sp_len] = '\0';
>    258  
>    259  out:
>    260          return sp_model;
>    261  }
> 
Thanks, I'll be sending a patch for it.

Cheers,

Hannes
-- 
Dr. Hannes Reinecke		               zSeries & Storage
hare@suse.de			               +49 911 74053 688
SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nürnberg
GF: F. Imendörffer, J. Smithard, J. Guild, D. Upmanyu, G. Norton
HRB 21284 (AG Nürnberg)
--
To unsubscribe from this list: send the line "unsubscribe linux-scsi" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-07-13 14:06 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-07-11 22:14 [SCSI] scsi_dh: Update EMC handler Dan Carpenter
2015-07-13 14:06 ` Hannes Reinecke

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox