public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] RDMA/srpt: fix integer overflow in immediate data length check
@ 2026-05-04  8:00 Sara Venkatesh
  2026-05-04  8:17 ` Bart Van Assche
  2026-05-05  8:19 ` Bart Van Assche
  0 siblings, 2 replies; 4+ messages in thread
From: Sara Venkatesh @ 2026-05-04  8:00 UTC (permalink / raw)
  To: bvanassche, jgg
  Cc: leon, dledford, linux-rdma, target-devel, linux-kernel,
	carlos.bilbao, Sara Venkatesh

imm_buf->len is a user-controlled uint32_t received from the network.
Adding it to imm_data_offset without overflow checking allows a
malicious initiator to send len=0xFFFFFFFF, causing req_size to wrap
around to a small value, bypassing the bounds check, and subsequently
passing a ~4GB length to sg_init_one().

Use check_add_overflow() to detect wrapping before the comparison.

Fixes: 5dabcd0456d7 ("RDMA/srpt: Add support for immediate data")
Reported-by: Carlos Bilbao (Lambda) <carlos.bilbao@kernel.org>
Signed-off-by: Sara Venkatesh <sarajvenkatesh@gmail.com>
Reviewed-by: Carlos Bilbao (Lambda) <carlos.bilbao@kernel.org>
---
 drivers/infiniband/ulp/srpt/ib_srpt.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/drivers/infiniband/ulp/srpt/ib_srpt.c b/drivers/infiniband/ulp/srpt/ib_srpt.c
index 9aec5d80117f..f66cfd70c263 100644
--- a/drivers/infiniband/ulp/srpt/ib_srpt.c
+++ b/drivers/infiniband/ulp/srpt/ib_srpt.c
@@ -1129,9 +1129,10 @@ static int srpt_get_desc_tbl(struct srpt_recv_ioctx *recv_ioctx,
 		struct srp_imm_buf *imm_buf = srpt_get_desc_buf(srp_cmd);
 		void *data = (void *)srp_cmd + imm_data_offset;
 		uint32_t len = be32_to_cpu(imm_buf->len);
-		uint32_t req_size = imm_data_offset + len;
+		uint32_t req_size;
 
-		if (req_size > srp_max_req_size) {
+		if (check_add_overflow((uint32_t)imm_data_offset, len, &req_size) ||
+		    req_size > srp_max_req_size) {
 			pr_err("Immediate data (length %d + %d) exceeds request size %d\n",
 			       imm_data_offset, len, srp_max_req_size);
 			return -EINVAL;
-- 
2.43.0


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] RDMA/srpt: fix integer overflow in immediate data length check
  2026-05-04  8:00 [PATCH] RDMA/srpt: fix integer overflow in immediate data length check Sara Venkatesh
@ 2026-05-04  8:17 ` Bart Van Assche
  2026-05-05  0:11   ` Sara Venkatesh
  2026-05-05  8:19 ` Bart Van Assche
  1 sibling, 1 reply; 4+ messages in thread
From: Bart Van Assche @ 2026-05-04  8:17 UTC (permalink / raw)
  To: Sara Venkatesh, jgg
  Cc: leon, dledford, linux-rdma, target-devel, linux-kernel,
	carlos.bilbao

On 5/4/26 10:00 AM, Sara Venkatesh wrote:
> diff --git a/drivers/infiniband/ulp/srpt/ib_srpt.c b/drivers/infiniband/ulp/srpt/ib_srpt.c
> index 9aec5d80117f..f66cfd70c263 100644
> --- a/drivers/infiniband/ulp/srpt/ib_srpt.c
> +++ b/drivers/infiniband/ulp/srpt/ib_srpt.c
> @@ -1129,9 +1129,10 @@ static int srpt_get_desc_tbl(struct srpt_recv_ioctx *recv_ioctx,
>   		struct srp_imm_buf *imm_buf = srpt_get_desc_buf(srp_cmd);
>   		void *data = (void *)srp_cmd + imm_data_offset;
>   		uint32_t len = be32_to_cpu(imm_buf->len);
> -		uint32_t req_size = imm_data_offset + len;
> +		uint32_t req_size;
>   
> -		if (req_size > srp_max_req_size) {
> +		if (check_add_overflow((uint32_t)imm_data_offset, len, &req_size) ||
> +		    req_size > srp_max_req_size) {
>   			pr_err("Immediate data (length %d + %d) exceeds request size %d\n",
>   			       imm_data_offset, len, srp_max_req_size);
>   			return -EINVAL;

Do the srp tests from https://github.com/linux-blktests/blktests/ still
pass with this patch applied?

Thanks,

Bart.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] RDMA/srpt: fix integer overflow in immediate data length check
  2026-05-04  8:17 ` Bart Van Assche
@ 2026-05-05  0:11   ` Sara Venkatesh
  0 siblings, 0 replies; 4+ messages in thread
From: Sara Venkatesh @ 2026-05-05  0:11 UTC (permalink / raw)
  To: Bart Van Assche, jgg
  Cc: leon, dledford, linux-rdma, target-devel, linux-kernel,
	carlos.bilbao

Hi Bart,

Yes, tested with blktests srp suite against this patch on 7.1.0-rc2:

srp/001 ... [passed]
srp/002 ... [passed]
srp/005 ... [passed]
srp/006 ... [passed]
srp/007 ... [passed]
srp/008 ... [passed]
srp/009 ... [passed]
srp/010 ... [passed]
srp/011 ... [passed]
srp/012 ... [passed]
srp/013 ... [passed]
srp/014 ... [passed]
srp/016 ... [passed]

srp/003 and srp/004 are [not run] (legacy device mapper support missing).

Thanks,
Sara

On 5/4/26 01:17, Bart Van Assche wrote:
> On 5/4/26 10:00 AM, Sara Venkatesh wrote:
>> diff --git a/drivers/infiniband/ulp/srpt/ib_srpt.c 
>> b/drivers/infiniband/ulp/srpt/ib_srpt.c
>> index 9aec5d80117f..f66cfd70c263 100644
>> --- a/drivers/infiniband/ulp/srpt/ib_srpt.c
>> +++ b/drivers/infiniband/ulp/srpt/ib_srpt.c
>> @@ -1129,9 +1129,10 @@ static int srpt_get_desc_tbl(struct 
>> srpt_recv_ioctx *recv_ioctx,
>>           struct srp_imm_buf *imm_buf = srpt_get_desc_buf(srp_cmd);
>>           void *data = (void *)srp_cmd + imm_data_offset;
>>           uint32_t len = be32_to_cpu(imm_buf->len);
>> -        uint32_t req_size = imm_data_offset + len;
>> +        uint32_t req_size;
>>   -        if (req_size > srp_max_req_size) {
>> +        if (check_add_overflow((uint32_t)imm_data_offset, len, 
>> &req_size) ||
>> +            req_size > srp_max_req_size) {
>>               pr_err("Immediate data (length %d + %d) exceeds request 
>> size %d\n",
>>                      imm_data_offset, len, srp_max_req_size);
>>               return -EINVAL;
>
> Do the srp tests from https://github.com/linux-blktests/blktests/ still
> pass with this patch applied?
>
> Thanks,
>
> Bart.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] RDMA/srpt: fix integer overflow in immediate data length check
  2026-05-04  8:00 [PATCH] RDMA/srpt: fix integer overflow in immediate data length check Sara Venkatesh
  2026-05-04  8:17 ` Bart Van Assche
@ 2026-05-05  8:19 ` Bart Van Assche
  1 sibling, 0 replies; 4+ messages in thread
From: Bart Van Assche @ 2026-05-05  8:19 UTC (permalink / raw)
  To: Sara Venkatesh, jgg
  Cc: leon, dledford, linux-rdma, target-devel, linux-kernel,
	carlos.bilbao

On 5/4/26 10:00 AM, Sara Venkatesh wrote:
> imm_buf->len is a user-controlled uint32_t received from the network.
> Adding it to imm_data_offset without overflow checking allows a
> malicious initiator to send len=0xFFFFFFFF, causing req_size to wrap
> around to a small value, bypassing the bounds check, and subsequently
> passing a ~4GB length to sg_init_one().
> 
> Use check_add_overflow() to detect wrapping before the comparison.
Reviewed-by: Bart Van Assche <bvanassche@acm.org>

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2026-05-05  8:20 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-04  8:00 [PATCH] RDMA/srpt: fix integer overflow in immediate data length check Sara Venkatesh
2026-05-04  8:17 ` Bart Van Assche
2026-05-05  0:11   ` Sara Venkatesh
2026-05-05  8:19 ` Bart Van Assche

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox