From: Dmitry Torokhov <dmitry.torokhov@gmail.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: Kyungtae Kim <kt0755@gmail.com>, Jiri Slaby <jslaby@suse.com>,
syzkaller <syzkaller@googlegroups.com>,
LKML <linux-kernel@vger.kernel.org>,
Dave Tian <dave.jing.tian@gmail.com>
Subject: Re: [PATCH v2] vt: keyboard: avoid integer overflow in k_ascii
Date: Mon, 25 May 2020 15:51:57 -0700 [thread overview]
Message-ID: <20200525225157.GF89269@dtor-ws> (raw)
In-Reply-To: <20200525071507.GA169307@kroah.com>
On Mon, May 25, 2020 at 09:15:07AM +0200, Greg KH wrote:
> On Sun, May 24, 2020 at 05:08:23PM -0700, Dmitry Torokhov wrote:
> > On Sat, May 23, 2020 at 11:09:35PM +0000, Kyungtae Kim wrote:
> > > @@ -884,8 +884,11 @@ static void k_ascii(struct vc_data *vc, unsigned char value, char up_flag)
> > >
> > > if (npadch == -1)
> > > npadch = value;
> > > + else if (!check_mul_overflow(npadch, base, &new_npadch) &&
> > > + !check_add_overflow(new_npadch, value, &new_npadch))
> > > + npadch = new_npadch;
> > > else
> > > - npadch = npadch * base + value;
> > > + return;
> > > }
> >
> > So thinking about it some more, if we use unsigned types, then there is
> > no issue with overflow UB, and thus maybe we should do something like
> > this:
> >
> > diff --git a/drivers/tty/vt/keyboard.c b/drivers/tty/vt/keyboard.c
> > index 15d33fa0c925..568b2171f335 100644
> > --- a/drivers/tty/vt/keyboard.c
> > +++ b/drivers/tty/vt/keyboard.c
> > @@ -127,7 +127,11 @@ static DEFINE_SPINLOCK(func_buf_lock); /* guard 'func_buf' and friends */
> > static unsigned long key_down[BITS_TO_LONGS(KEY_CNT)]; /* keyboard key bitmap */
> > static unsigned char shift_down[NR_SHIFT]; /* shift state counters.. */
> > static bool dead_key_next;
> > -static int npadch = -1; /* -1 or number assembled on pad */
> > +
> > +/* Handles a number being assembled on the number pad */
> > +static bool npadch_active;
>
> Much nicer, thanks for that, -1 is not a good thing to try to understand :)
>
> > +static unsigned int npadch_value;
>
> Nicer to just make this a u32 to be explicit about it?
I disagree, as this is simply an accumulator of an indeterminate size.
We are not talking to hardware here, so it does not have to be 32 bits,
just "large enough".
I'll resubmit with "unsigned int" and if you feel strongly about this
please tweak the patch to taste ;)
Thanks!
--
Dmitry
prev parent reply other threads:[~2020-05-25 22:52 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20200523230928.GA17074@pizza01>
2020-05-25 0:08 ` [PATCH v2] vt: keyboard: avoid integer overflow in k_ascii Dmitry Torokhov
2020-05-25 7:15 ` Greg KH
2020-05-25 22:51 ` Dmitry Torokhov [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200525225157.GF89269@dtor-ws \
--to=dmitry.torokhov@gmail.com \
--cc=dave.jing.tian@gmail.com \
--cc=gregkh@linuxfoundation.org \
--cc=jslaby@suse.com \
--cc=kt0755@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=syzkaller@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox