The Linux Kernel Mailing List
 help / color / mirror / Atom feed
From: Wolfram Sang <wsa+renesas@sang-engineering.com>
To: Weiming Shi <bestswngs@gmail.com>
Cc: linux-i2c@vger.kernel.org, linux-kernel@vger.kernel.org,
	Xiang Mei <xmei5@asu.edu>
Subject: Re: [PATCH v3] i2c: smbus: reject oversized block transfers in the common path
Date: Thu, 7 May 2026 11:02:46 +0200	[thread overview]
Message-ID: <afxVNh1wopdfZdy1@ninjato> (raw)
In-Reply-To: <20260505175510.1403736-2-bestswngs@gmail.com>

[-- Attachment #1: Type: text/plain, Size: 3027 bytes --]

On Wed, May 06, 2026 at 01:55:11AM +0800, Weiming Shi wrote:
> The SMBus block transfer length data->block[0] is validated in
> i2c_smbus_xfer_emulated() but that check runs too late for tracepoints
> and is skipped entirely when the adapter provides a native smbus_xfer
> implementation. This allows user-controlled oversized block lengths to
> reach tracepoint memcpy calls and driver callbacks unchecked.
> 
> Add an early validation in __i2c_smbus_xfer() that rejects block
> transfers whose caller-supplied length is zero or exceeds
> I2C_SMBUS_BLOCK_MAX before any tracepoint fires or driver callback
> runs. data->block[0] is filled in by the device on SMBus block reads,
> so the check is scoped to operations where the length is actually
> supplied by the caller. This is consistent with the existing -EINVAL
> convention in the emulated path and protects all downstream consumers
> at once: the smbus_write tracepoint, all native smbus_xfer driver
> implementations, and the emulated path.
> 
> Two distinct bugs are fixed by this change:
> 
> Bug 1: smbus_write tracepoint OOB (include/trace/events/smbus.h)
>   trace_smbus_write() fires before any validation and copies
>   data->block[0]+1 bytes into a 34-byte event buffer. With
>   block[0]=0xfe the tracepoint copies 255 bytes, overflowing by 221.
> 
>  BUG: KASAN: stack-out-of-bounds in trace_event_raw_event_smbus_write+0x27c/0x530
>  Read of size 255 at addr ffff88800d98fcf8 by task poc_smbus/91
>  Call Trace:
>   <TASK>
>   __asan_memcpy+0x23/0x80
>   trace_event_raw_event_smbus_write+0x27c/0x530
>   __i2c_smbus_xfer+0x43a/0xa40
>   i2c_smbus_xfer+0x19e/0x340
>   i2cdev_ioctl_smbus+0x38f/0x7f0
>   i2cdev_ioctl+0x35e/0x680
>   __x64_sys_ioctl+0x147/0x1e0
>   do_syscall_64+0xcf/0x15a0
>   entry_SYSCALL_64_after_hwframe+0x76/0x7e
>   </TASK>
> 
> Bug 2: i2c-stub I2C_SMBUS_I2C_BLOCK_DATA OOB (drivers/i2c/i2c-stub.c)
>   stub_xfer() implements .smbus_xfer directly and only clamps
>   block[0] against 256-command, not I2C_SMBUS_BLOCK_MAX. With
>   block[0]=0xff and command=0 the loop accesses block[1+i] for
>   i up to 254, far past the 34-byte union.
> 
>  UBSAN: array-index-out-of-bounds in drivers/i2c/i2c-stub.c:223:44
>  index 34 is out of range for type '__u8 [34]'
>  Call Trace:
>   <TASK>
>   __ubsan_handle_out_of_bounds+0xd7/0x120
>   stub_xfer+0x1971/0x198f [i2c_stub]
>   __i2c_smbus_xfer+0x306/0xa40
>   i2c_smbus_xfer+0x19e/0x340
>   i2cdev_ioctl_smbus+0x38f/0x7f0
>   i2cdev_ioctl+0x35e/0x680
>   __x64_sys_ioctl+0x147/0x1e0
>   do_syscall_64+0xcf/0x15a0
>   entry_SYSCALL_64_after_hwframe+0x76/0x7e
>   </TASK>
> 
> Both traces reproduced on v7.0-rc6+i2c/for-current with KASAN+UBSAN.
> 
> Fixes: 8a325997d95d ("i2c: Add message transfer tracepoints for SMBUS [ver #2]")
> Fixes: 4710317891e4 ("i2c-stub: Implement I2C block support")
> Reported-by: Xiang Mei <xmei5@asu.edu>
> Signed-off-by: Weiming Shi <bestswngs@gmail.com>

Applied to for-current, thanks!


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

      reply	other threads:[~2026-05-07  9:02 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-05 17:55 [PATCH v3] i2c: smbus: reject oversized block transfers in the common path Weiming Shi
2026-05-07  9:02 ` Wolfram Sang [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=afxVNh1wopdfZdy1@ninjato \
    --to=wsa+renesas@sang-engineering.com \
    --cc=bestswngs@gmail.com \
    --cc=linux-i2c@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=xmei5@asu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox