* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-09 18:59 ` Philippe Mathieu-Daudé
@ 2019-04-09 18:59 ` Philippe Mathieu-Daudé
2019-04-10 0:29 ` David Gibson
2019-04-10 5:28 ` Markus Armbruster
2 siblings, 0 replies; 28+ messages in thread
From: Philippe Mathieu-Daudé @ 2019-04-09 18:59 UTC (permalink / raw)
To: Markus Armbruster, qemu-devel; +Cc: peter.maydell, alistair.francis, slp, david
On 4/9/19 7:40 PM, Markus Armbruster wrote:
> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
> computation of @dt_size overflows to a negative number, which then
> gets converted to a very large size_t for g_malloc0() and
> load_image_size(). In the (fortunately improbable) case g_malloc0()
> succeeds and load_image_size() survives, we'd assign the negative
> number to *sizep. What that would do to the callers I can't say, but
> it's unlikely to be good.
>
> Fix by rejecting images whose size would overflow.
>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---
> device_tree.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/device_tree.c b/device_tree.c
> index 296278e12a..f8b46b3c73 100644
> --- a/device_tree.c
> +++ b/device_tree.c
> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
> filename_path);
> goto fail;
> }
> + if (dt_size > INT_MAX / 2 - 10000) {
We should avoid magic number duplication.
That said, this patch looks safe.
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
BTW how did you figure that out?
> + error_report("Device tree file '%s' is too large", filename_path);
> + goto fail;
> + }
>
> /* Expand to 2x size to give enough room for manipulation. */
> dt_size += 10000;
>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-09 18:59 ` Philippe Mathieu-Daudé
2019-04-09 18:59 ` Philippe Mathieu-Daudé
@ 2019-04-10 0:29 ` David Gibson
2019-04-10 0:29 ` David Gibson
2019-04-10 5:28 ` Markus Armbruster
2 siblings, 1 reply; 28+ messages in thread
From: David Gibson @ 2019-04-10 0:29 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: Markus Armbruster, qemu-devel, peter.maydell, alistair.francis,
slp
[-- Attachment #1: Type: text/plain, Size: 1679 bytes --]
On Tue, Apr 09, 2019 at 08:59:55PM +0200, Philippe Mathieu-Daudé wrote:
> On 4/9/19 7:40 PM, Markus Armbruster wrote:
> > If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
> > computation of @dt_size overflows to a negative number, which then
> > gets converted to a very large size_t for g_malloc0() and
> > load_image_size(). In the (fortunately improbable) case g_malloc0()
> > succeeds and load_image_size() survives, we'd assign the negative
> > number to *sizep. What that would do to the callers I can't say, but
> > it's unlikely to be good.
> >
> > Fix by rejecting images whose size would overflow.
> >
> > Signed-off-by: Markus Armbruster <armbru@redhat.com>
> > ---
> > device_tree.c | 4 ++++
> > 1 file changed, 4 insertions(+)
> >
> > diff --git a/device_tree.c b/device_tree.c
> > index 296278e12a..f8b46b3c73 100644
> > --- a/device_tree.c
> > +++ b/device_tree.c
> > @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
> > filename_path);
> > goto fail;
> > }
> > + if (dt_size > INT_MAX / 2 - 10000) {
>
> We should avoid magic number duplication.
> That said, this patch looks safe.
>
> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
As Philippe says, the test condition is kinda ugly and I hope we can
refine it in future. But since it fixes a real problem for now,
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
--
David Gibson | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_
| _way_ _around_!
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 0:29 ` David Gibson
@ 2019-04-10 0:29 ` David Gibson
0 siblings, 0 replies; 28+ messages in thread
From: David Gibson @ 2019-04-10 0:29 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: peter.maydell, alistair.francis, Markus Armbruster, slp,
qemu-devel
[-- Attachment #1: Type: text/plain, Size: 1679 bytes --]
On Tue, Apr 09, 2019 at 08:59:55PM +0200, Philippe Mathieu-Daudé wrote:
> On 4/9/19 7:40 PM, Markus Armbruster wrote:
> > If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
> > computation of @dt_size overflows to a negative number, which then
> > gets converted to a very large size_t for g_malloc0() and
> > load_image_size(). In the (fortunately improbable) case g_malloc0()
> > succeeds and load_image_size() survives, we'd assign the negative
> > number to *sizep. What that would do to the callers I can't say, but
> > it's unlikely to be good.
> >
> > Fix by rejecting images whose size would overflow.
> >
> > Signed-off-by: Markus Armbruster <armbru@redhat.com>
> > ---
> > device_tree.c | 4 ++++
> > 1 file changed, 4 insertions(+)
> >
> > diff --git a/device_tree.c b/device_tree.c
> > index 296278e12a..f8b46b3c73 100644
> > --- a/device_tree.c
> > +++ b/device_tree.c
> > @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
> > filename_path);
> > goto fail;
> > }
> > + if (dt_size > INT_MAX / 2 - 10000) {
>
> We should avoid magic number duplication.
> That said, this patch looks safe.
>
> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
As Philippe says, the test condition is kinda ugly and I hope we can
refine it in future. But since it fixes a real problem for now,
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
--
David Gibson | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_
| _way_ _around_!
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-09 18:59 ` Philippe Mathieu-Daudé
2019-04-09 18:59 ` Philippe Mathieu-Daudé
2019-04-10 0:29 ` David Gibson
@ 2019-04-10 5:28 ` Markus Armbruster
2019-04-10 5:28 ` Markus Armbruster
2019-04-10 5:44 ` Philippe Mathieu-Daudé
2 siblings, 2 replies; 28+ messages in thread
From: Markus Armbruster @ 2019-04-10 5:28 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: qemu-devel, peter.maydell, alistair.francis, slp, david
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>> computation of @dt_size overflows to a negative number, which then
>> gets converted to a very large size_t for g_malloc0() and
>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>> succeeds and load_image_size() survives, we'd assign the negative
>> number to *sizep. What that would do to the callers I can't say, but
>> it's unlikely to be good.
>>
>> Fix by rejecting images whose size would overflow.
>>
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>> ---
>> device_tree.c | 4 ++++
>> 1 file changed, 4 insertions(+)
>>
>> diff --git a/device_tree.c b/device_tree.c
>> index 296278e12a..f8b46b3c73 100644
>> --- a/device_tree.c
>> +++ b/device_tree.c
>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>> filename_path);
>> goto fail;
>> }
>> + if (dt_size > INT_MAX / 2 - 10000) {
>
> We should avoid magic number duplication.
> That said, this patch looks safe.
>
> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Thanks!
> BTW how did you figure that out?
Downstream handling of upstream commit da885fe1ee8 led me to the
function. I spotted dt_size = get_image_size(filename_path).
Experience has taught me to check the left hand side's type. Bad. Then
I saw how dt_size gets increased. Worse.
>> + error_report("Device tree file '%s' is too large", filename_path);
>> + goto fail;
>> + }
>>
>> /* Expand to 2x size to give enough room for manipulation. */
>> dt_size += 10000;
>>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:28 ` Markus Armbruster
@ 2019-04-10 5:28 ` Markus Armbruster
2019-04-10 5:44 ` Philippe Mathieu-Daudé
1 sibling, 0 replies; 28+ messages in thread
From: Markus Armbruster @ 2019-04-10 5:28 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: peter.maydell, alistair.francis, qemu-devel, slp, david
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>> computation of @dt_size overflows to a negative number, which then
>> gets converted to a very large size_t for g_malloc0() and
>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>> succeeds and load_image_size() survives, we'd assign the negative
>> number to *sizep. What that would do to the callers I can't say, but
>> it's unlikely to be good.
>>
>> Fix by rejecting images whose size would overflow.
>>
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>> ---
>> device_tree.c | 4 ++++
>> 1 file changed, 4 insertions(+)
>>
>> diff --git a/device_tree.c b/device_tree.c
>> index 296278e12a..f8b46b3c73 100644
>> --- a/device_tree.c
>> +++ b/device_tree.c
>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>> filename_path);
>> goto fail;
>> }
>> + if (dt_size > INT_MAX / 2 - 10000) {
>
> We should avoid magic number duplication.
> That said, this patch looks safe.
>
> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Thanks!
> BTW how did you figure that out?
Downstream handling of upstream commit da885fe1ee8 led me to the
function. I spotted dt_size = get_image_size(filename_path).
Experience has taught me to check the left hand side's type. Bad. Then
I saw how dt_size gets increased. Worse.
>> + error_report("Device tree file '%s' is too large", filename_path);
>> + goto fail;
>> + }
>>
>> /* Expand to 2x size to give enough room for manipulation. */
>> dt_size += 10000;
>>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:28 ` Markus Armbruster
2019-04-10 5:28 ` Markus Armbruster
@ 2019-04-10 5:44 ` Philippe Mathieu-Daudé
2019-04-10 5:44 ` Philippe Mathieu-Daudé
2019-04-10 5:59 ` Markus Armbruster
1 sibling, 2 replies; 28+ messages in thread
From: Philippe Mathieu-Daudé @ 2019-04-10 5:44 UTC (permalink / raw)
To: Markus Armbruster; +Cc: qemu-devel, peter.maydell, alistair.francis, slp, david
On 4/10/19 7:28 AM, Markus Armbruster wrote:
> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>> computation of @dt_size overflows to a negative number, which then
>>> gets converted to a very large size_t for g_malloc0() and
>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>> succeeds and load_image_size() survives, we'd assign the negative
>>> number to *sizep. What that would do to the callers I can't say, but
>>> it's unlikely to be good.
>>>
>>> Fix by rejecting images whose size would overflow.
>>>
>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>> ---
>>> device_tree.c | 4 ++++
>>> 1 file changed, 4 insertions(+)
>>>
>>> diff --git a/device_tree.c b/device_tree.c
>>> index 296278e12a..f8b46b3c73 100644
>>> --- a/device_tree.c
>>> +++ b/device_tree.c
>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>> filename_path);
>>> goto fail;
>>> }
>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>
>> We should avoid magic number duplication.
>> That said, this patch looks safe.
>>
>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>
> Thanks!
>
>> BTW how did you figure that out?
>
> Downstream handling of upstream commit da885fe1ee8 led me to the
> function. I spotted dt_size = get_image_size(filename_path).
> Experience has taught me to check the left hand side's type. Bad. Then
> I saw how dt_size gets increased. Worse.
So you genuinely neglected to mention Kurtis Miller then :)
>>> + error_report("Device tree file '%s' is too large", filename_path);
>>> + goto fail;
>>> + }
>>>
>>> /* Expand to 2x size to give enough room for manipulation. */
>>> dt_size += 10000;
>>>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:44 ` Philippe Mathieu-Daudé
@ 2019-04-10 5:44 ` Philippe Mathieu-Daudé
2019-04-10 5:59 ` Markus Armbruster
1 sibling, 0 replies; 28+ messages in thread
From: Philippe Mathieu-Daudé @ 2019-04-10 5:44 UTC (permalink / raw)
To: Markus Armbruster; +Cc: peter.maydell, alistair.francis, qemu-devel, slp, david
On 4/10/19 7:28 AM, Markus Armbruster wrote:
> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>> computation of @dt_size overflows to a negative number, which then
>>> gets converted to a very large size_t for g_malloc0() and
>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>> succeeds and load_image_size() survives, we'd assign the negative
>>> number to *sizep. What that would do to the callers I can't say, but
>>> it's unlikely to be good.
>>>
>>> Fix by rejecting images whose size would overflow.
>>>
>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>> ---
>>> device_tree.c | 4 ++++
>>> 1 file changed, 4 insertions(+)
>>>
>>> diff --git a/device_tree.c b/device_tree.c
>>> index 296278e12a..f8b46b3c73 100644
>>> --- a/device_tree.c
>>> +++ b/device_tree.c
>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>> filename_path);
>>> goto fail;
>>> }
>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>
>> We should avoid magic number duplication.
>> That said, this patch looks safe.
>>
>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>
> Thanks!
>
>> BTW how did you figure that out?
>
> Downstream handling of upstream commit da885fe1ee8 led me to the
> function. I spotted dt_size = get_image_size(filename_path).
> Experience has taught me to check the left hand side's type. Bad. Then
> I saw how dt_size gets increased. Worse.
So you genuinely neglected to mention Kurtis Miller then :)
>>> + error_report("Device tree file '%s' is too large", filename_path);
>>> + goto fail;
>>> + }
>>>
>>> /* Expand to 2x size to give enough room for manipulation. */
>>> dt_size += 10000;
>>>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:44 ` Philippe Mathieu-Daudé
2019-04-10 5:44 ` Philippe Mathieu-Daudé
@ 2019-04-10 5:59 ` Markus Armbruster
2019-04-10 5:59 ` Markus Armbruster
2019-04-10 6:34 ` Alistair Francis
1 sibling, 2 replies; 28+ messages in thread
From: Markus Armbruster @ 2019-04-10 5:59 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: peter.maydell, alistair.francis, qemu-devel, slp, david
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>>> computation of @dt_size overflows to a negative number, which then
>>>> gets converted to a very large size_t for g_malloc0() and
>>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>>> succeeds and load_image_size() survives, we'd assign the negative
>>>> number to *sizep. What that would do to the callers I can't say, but
>>>> it's unlikely to be good.
>>>>
>>>> Fix by rejecting images whose size would overflow.
>>>>
>>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>>> ---
>>>> device_tree.c | 4 ++++
>>>> 1 file changed, 4 insertions(+)
>>>>
>>>> diff --git a/device_tree.c b/device_tree.c
>>>> index 296278e12a..f8b46b3c73 100644
>>>> --- a/device_tree.c
>>>> +++ b/device_tree.c
>>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>>> filename_path);
>>>> goto fail;
>>>> }
>>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>>
>>> We should avoid magic number duplication.
>>> That said, this patch looks safe.
>>>
>>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>>
>> Thanks!
>>
>>> BTW how did you figure that out?
>>
>> Downstream handling of upstream commit da885fe1ee8 led me to the
>> function. I spotted dt_size = get_image_size(filename_path).
>> Experience has taught me to check the left hand side's type. Bad. Then
>> I saw how dt_size gets increased. Worse.
>
> So you genuinely neglected to mention Kurtis Miller then :)
Explanation, not excuse: the only occurence of the name in my downstream
reading was a two-liner BZ comment, which I totally missed in my haste
to give the fix a chance to make 4.0. I certainly didn't mean to
deprive him of credit!
[...]
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:59 ` Markus Armbruster
@ 2019-04-10 5:59 ` Markus Armbruster
2019-04-10 6:34 ` Alistair Francis
1 sibling, 0 replies; 28+ messages in thread
From: Markus Armbruster @ 2019-04-10 5:59 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: peter.maydell, alistair.francis, qemu-devel, slp, david
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>>> computation of @dt_size overflows to a negative number, which then
>>>> gets converted to a very large size_t for g_malloc0() and
>>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>>> succeeds and load_image_size() survives, we'd assign the negative
>>>> number to *sizep. What that would do to the callers I can't say, but
>>>> it's unlikely to be good.
>>>>
>>>> Fix by rejecting images whose size would overflow.
>>>>
>>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>>> ---
>>>> device_tree.c | 4 ++++
>>>> 1 file changed, 4 insertions(+)
>>>>
>>>> diff --git a/device_tree.c b/device_tree.c
>>>> index 296278e12a..f8b46b3c73 100644
>>>> --- a/device_tree.c
>>>> +++ b/device_tree.c
>>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>>> filename_path);
>>>> goto fail;
>>>> }
>>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>>
>>> We should avoid magic number duplication.
>>> That said, this patch looks safe.
>>>
>>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>>
>> Thanks!
>>
>>> BTW how did you figure that out?
>>
>> Downstream handling of upstream commit da885fe1ee8 led me to the
>> function. I spotted dt_size = get_image_size(filename_path).
>> Experience has taught me to check the left hand side's type. Bad. Then
>> I saw how dt_size gets increased. Worse.
>
> So you genuinely neglected to mention Kurtis Miller then :)
Explanation, not excuse: the only occurence of the name in my downstream
reading was a two-liner BZ comment, which I totally missed in my haste
to give the fix a chance to make 4.0. I certainly didn't mean to
deprive him of credit!
[...]
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 5:59 ` Markus Armbruster
2019-04-10 5:59 ` Markus Armbruster
@ 2019-04-10 6:34 ` Alistair Francis
2019-04-10 6:34 ` Alistair Francis
2019-04-10 15:47 ` Philippe Mathieu-Daudé
1 sibling, 2 replies; 28+ messages in thread
From: Alistair Francis @ 2019-04-10 6:34 UTC (permalink / raw)
To: Markus Armbruster
Cc: Philippe Mathieu-Daudé, Peter Maydell, Alistair Francis,
qemu-devel@nongnu.org Developers, Sergio Lopez, David Gibson
On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>
> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>
> > On 4/10/19 7:28 AM, Markus Armbruster wrote:
> >> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> >>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
> >>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
> >>>> computation of @dt_size overflows to a negative number, which then
> >>>> gets converted to a very large size_t for g_malloc0() and
> >>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
> >>>> succeeds and load_image_size() survives, we'd assign the negative
> >>>> number to *sizep. What that would do to the callers I can't say, but
> >>>> it's unlikely to be good.
> >>>>
> >>>> Fix by rejecting images whose size would overflow.
> >>>>
> >>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> >>>> ---
> >>>> device_tree.c | 4 ++++
> >>>> 1 file changed, 4 insertions(+)
> >>>>
> >>>> diff --git a/device_tree.c b/device_tree.c
> >>>> index 296278e12a..f8b46b3c73 100644
> >>>> --- a/device_tree.c
> >>>> +++ b/device_tree.c
> >>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
> >>>> filename_path);
> >>>> goto fail;
> >>>> }
> >>>> + if (dt_size > INT_MAX / 2 - 10000) {
> >>>
> >>> We should avoid magic number duplication.
> >>> That said, this patch looks safe.
> >>>
> >>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
> >>
> >> Thanks!
> >>
> >>> BTW how did you figure that out?
> >>
> >> Downstream handling of upstream commit da885fe1ee8 led me to the
> >> function. I spotted dt_size = get_image_size(filename_path).
> >> Experience has taught me to check the left hand side's type. Bad. Then
> >> I saw how dt_size gets increased. Worse.
> >
> > So you genuinely neglected to mention Kurtis Miller then :)
>
> Explanation, not excuse: the only occurence of the name in my downstream
> reading was a two-liner BZ comment, which I totally missed in my haste
> to give the fix a chance to make 4.0. I certainly didn't mean to
> deprive him of credit!
No worries. I have sent the pull request and it includes the reported by.
Alistair
>
> [...]
>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 6:34 ` Alistair Francis
@ 2019-04-10 6:34 ` Alistair Francis
2019-04-10 15:47 ` Philippe Mathieu-Daudé
1 sibling, 0 replies; 28+ messages in thread
From: Alistair Francis @ 2019-04-10 6:34 UTC (permalink / raw)
To: Markus Armbruster
Cc: Peter Maydell, Sergio Lopez, qemu-devel@nongnu.org Developers,
Alistair Francis, Philippe Mathieu-Daudé, David Gibson
On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>
> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>
> > On 4/10/19 7:28 AM, Markus Armbruster wrote:
> >> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> >>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
> >>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
> >>>> computation of @dt_size overflows to a negative number, which then
> >>>> gets converted to a very large size_t for g_malloc0() and
> >>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
> >>>> succeeds and load_image_size() survives, we'd assign the negative
> >>>> number to *sizep. What that would do to the callers I can't say, but
> >>>> it's unlikely to be good.
> >>>>
> >>>> Fix by rejecting images whose size would overflow.
> >>>>
> >>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> >>>> ---
> >>>> device_tree.c | 4 ++++
> >>>> 1 file changed, 4 insertions(+)
> >>>>
> >>>> diff --git a/device_tree.c b/device_tree.c
> >>>> index 296278e12a..f8b46b3c73 100644
> >>>> --- a/device_tree.c
> >>>> +++ b/device_tree.c
> >>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
> >>>> filename_path);
> >>>> goto fail;
> >>>> }
> >>>> + if (dt_size > INT_MAX / 2 - 10000) {
> >>>
> >>> We should avoid magic number duplication.
> >>> That said, this patch looks safe.
> >>>
> >>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
> >>
> >> Thanks!
> >>
> >>> BTW how did you figure that out?
> >>
> >> Downstream handling of upstream commit da885fe1ee8 led me to the
> >> function. I spotted dt_size = get_image_size(filename_path).
> >> Experience has taught me to check the left hand side's type. Bad. Then
> >> I saw how dt_size gets increased. Worse.
> >
> > So you genuinely neglected to mention Kurtis Miller then :)
>
> Explanation, not excuse: the only occurence of the name in my downstream
> reading was a two-liner BZ comment, which I totally missed in my haste
> to give the fix a chance to make 4.0. I certainly didn't mean to
> deprive him of credit!
No worries. I have sent the pull request and it includes the reported by.
Alistair
>
> [...]
>
^ permalink raw reply [flat|nested] 28+ messages in thread* [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 6:34 ` Alistair Francis
2019-04-10 6:34 ` Alistair Francis
@ 2019-04-10 15:47 ` Philippe Mathieu-Daudé
2019-04-10 15:47 ` Philippe Mathieu-Daudé
2019-04-11 4:31 ` Markus Armbruster
1 sibling, 2 replies; 28+ messages in thread
From: Philippe Mathieu-Daudé @ 2019-04-10 15:47 UTC (permalink / raw)
To: Alistair Francis, Markus Armbruster
Cc: Peter Maydell, Alistair Francis, qemu-devel@nongnu.org Developers,
Sergio Lopez, David Gibson
On 4/10/19 8:34 AM, Alistair Francis wrote:
> On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>>>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>>>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>>>>> computation of @dt_size overflows to a negative number, which then
>>>>>> gets converted to a very large size_t for g_malloc0() and
>>>>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>>>>> succeeds and load_image_size() survives, we'd assign the negative
>>>>>> number to *sizep. What that would do to the callers I can't say, but
>>>>>> it's unlikely to be good.
>>>>>>
>>>>>> Fix by rejecting images whose size would overflow.
>>>>>>
>>>>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>>>>> ---
>>>>>> device_tree.c | 4 ++++
>>>>>> 1 file changed, 4 insertions(+)
>>>>>>
>>>>>> diff --git a/device_tree.c b/device_tree.c
>>>>>> index 296278e12a..f8b46b3c73 100644
>>>>>> --- a/device_tree.c
>>>>>> +++ b/device_tree.c
>>>>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>>>>> filename_path);
>>>>>> goto fail;
>>>>>> }
>>>>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>>>>
>>>>> We should avoid magic number duplication.
>>>>> That said, this patch looks safe.
>>>>>
>>>>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>>>>
>>>> Thanks!
>>>>
>>>>> BTW how did you figure that out?
>>>>
>>>> Downstream handling of upstream commit da885fe1ee8 led me to the
>>>> function. I spotted dt_size = get_image_size(filename_path).
>>>> Experience has taught me to check the left hand side's type. Bad. Then
>>>> I saw how dt_size gets increased. Worse.
>>>
>>> So you genuinely neglected to mention Kurtis Miller then :)
>>
>> Explanation, not excuse: the only occurence of the name in my downstream
>> reading was a two-liner BZ comment, which I totally missed in my haste
>> to give the fix a chance to make 4.0. I certainly didn't mean to
>> deprive him of credit!
My English teacher explained me neglected sounds like a
reprimand/reproach (as in negligence), sorry I didn't mean to be rude
here, I wanted to say something like "Peter remarked you did gave
credits to the first one who reported this issue, but since you figured
this bug via your own way, the omission was not intentional then."
> No worries. I have sent the pull request and it includes the reported by.
>
> Alistair
>
>>
>> [...]
>>
^ permalink raw reply [flat|nested] 28+ messages in thread* [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 15:47 ` Philippe Mathieu-Daudé
@ 2019-04-10 15:47 ` Philippe Mathieu-Daudé
2019-04-11 4:31 ` Markus Armbruster
1 sibling, 0 replies; 28+ messages in thread
From: Philippe Mathieu-Daudé @ 2019-04-10 15:47 UTC (permalink / raw)
To: Alistair Francis, Markus Armbruster
Cc: Peter Maydell, Alistair Francis, qemu-devel@nongnu.org Developers,
Sergio Lopez, David Gibson
On 4/10/19 8:34 AM, Alistair Francis wrote:
> On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>>>> On 4/9/19 7:40 PM, Markus Armbruster wrote:
>>>>>> If the value of get_image_size() exceeds INT_MAX / 2 - 10000, the
>>>>>> computation of @dt_size overflows to a negative number, which then
>>>>>> gets converted to a very large size_t for g_malloc0() and
>>>>>> load_image_size(). In the (fortunately improbable) case g_malloc0()
>>>>>> succeeds and load_image_size() survives, we'd assign the negative
>>>>>> number to *sizep. What that would do to the callers I can't say, but
>>>>>> it's unlikely to be good.
>>>>>>
>>>>>> Fix by rejecting images whose size would overflow.
>>>>>>
>>>>>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>>>>>> ---
>>>>>> device_tree.c | 4 ++++
>>>>>> 1 file changed, 4 insertions(+)
>>>>>>
>>>>>> diff --git a/device_tree.c b/device_tree.c
>>>>>> index 296278e12a..f8b46b3c73 100644
>>>>>> --- a/device_tree.c
>>>>>> +++ b/device_tree.c
>>>>>> @@ -84,6 +84,10 @@ void *load_device_tree(const char *filename_path, int *sizep)
>>>>>> filename_path);
>>>>>> goto fail;
>>>>>> }
>>>>>> + if (dt_size > INT_MAX / 2 - 10000) {
>>>>>
>>>>> We should avoid magic number duplication.
>>>>> That said, this patch looks safe.
>>>>>
>>>>> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
>>>>
>>>> Thanks!
>>>>
>>>>> BTW how did you figure that out?
>>>>
>>>> Downstream handling of upstream commit da885fe1ee8 led me to the
>>>> function. I spotted dt_size = get_image_size(filename_path).
>>>> Experience has taught me to check the left hand side's type. Bad. Then
>>>> I saw how dt_size gets increased. Worse.
>>>
>>> So you genuinely neglected to mention Kurtis Miller then :)
>>
>> Explanation, not excuse: the only occurence of the name in my downstream
>> reading was a two-liner BZ comment, which I totally missed in my haste
>> to give the fix a chance to make 4.0. I certainly didn't mean to
>> deprive him of credit!
My English teacher explained me neglected sounds like a
reprimand/reproach (as in negligence), sorry I didn't mean to be rude
here, I wanted to say something like "Peter remarked you did gave
credits to the first one who reported this issue, but since you figured
this bug via your own way, the omission was not intentional then."
> No worries. I have sent the pull request and it includes the reported by.
>
> Alistair
>
>>
>> [...]
>>
^ permalink raw reply [flat|nested] 28+ messages in thread* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-10 15:47 ` Philippe Mathieu-Daudé
2019-04-10 15:47 ` Philippe Mathieu-Daudé
@ 2019-04-11 4:31 ` Markus Armbruster
2019-04-11 4:31 ` Markus Armbruster
1 sibling, 1 reply; 28+ messages in thread
From: Markus Armbruster @ 2019-04-11 4:31 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: Alistair Francis, Peter Maydell, Alistair Francis,
qemu-devel@nongnu.org Developers, Sergio Lopez, David Gibson
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/10/19 8:34 AM, Alistair Francis wrote:
>> On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>>> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>>>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
[...]
>>>>>> BTW how did you figure that out?
>>>>>
>>>>> Downstream handling of upstream commit da885fe1ee8 led me to the
>>>>> function. I spotted dt_size = get_image_size(filename_path).
>>>>> Experience has taught me to check the left hand side's type. Bad. Then
>>>>> I saw how dt_size gets increased. Worse.
>>>>
>>>> So you genuinely neglected to mention Kurtis Miller then :)
>>>
>>> Explanation, not excuse: the only occurence of the name in my downstream
>>> reading was a two-liner BZ comment, which I totally missed in my haste
>>> to give the fix a chance to make 4.0. I certainly didn't mean to
>>> deprive him of credit!
>
> My English teacher explained me neglected sounds like a
> reprimand/reproach (as in negligence), sorry I didn't mean to be rude
> here, I wanted to say something like "Peter remarked you did gave
> credits to the first one who reported this issue, but since you figured
> this bug via your own way, the omission was not intentional then."
Don't worry, my social interactions teacher taught me to assume good
intent ;)
[...]
^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Qemu-devel] [PATCH for-4.0-maybe] device_tree: Fix integer overflowing in load_device_tree()
2019-04-11 4:31 ` Markus Armbruster
@ 2019-04-11 4:31 ` Markus Armbruster
0 siblings, 0 replies; 28+ messages in thread
From: Markus Armbruster @ 2019-04-11 4:31 UTC (permalink / raw)
To: Philippe Mathieu-Daudé
Cc: Peter Maydell, Sergio Lopez, qemu-devel@nongnu.org Developers,
Alistair Francis, Alistair Francis, David Gibson
Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> On 4/10/19 8:34 AM, Alistair Francis wrote:
>> On Tue, Apr 9, 2019 at 10:59 PM Markus Armbruster <armbru@redhat.com> wrote:
>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>>>> On 4/10/19 7:28 AM, Markus Armbruster wrote:
>>>>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
[...]
>>>>>> BTW how did you figure that out?
>>>>>
>>>>> Downstream handling of upstream commit da885fe1ee8 led me to the
>>>>> function. I spotted dt_size = get_image_size(filename_path).
>>>>> Experience has taught me to check the left hand side's type. Bad. Then
>>>>> I saw how dt_size gets increased. Worse.
>>>>
>>>> So you genuinely neglected to mention Kurtis Miller then :)
>>>
>>> Explanation, not excuse: the only occurence of the name in my downstream
>>> reading was a two-liner BZ comment, which I totally missed in my haste
>>> to give the fix a chance to make 4.0. I certainly didn't mean to
>>> deprive him of credit!
>
> My English teacher explained me neglected sounds like a
> reprimand/reproach (as in negligence), sorry I didn't mean to be rude
> here, I wanted to say something like "Peter remarked you did gave
> credits to the first one who reported this issue, but since you figured
> this bug via your own way, the omission was not intentional then."
Don't worry, my social interactions teacher taught me to assume good
intent ;)
[...]
^ permalink raw reply [flat|nested] 28+ messages in thread