From patchwork Thu Sep 5 13:57:00 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luis Henriques X-Patchwork-Id: 13792392 Received: from out-181.mta0.migadu.com (out-181.mta0.migadu.com [91.218.175.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id F1C5419C573 for ; Thu, 5 Sep 2024 13:57:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.181 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725544636; cv=none; b=anOmntIb7bMTa2QRthFEM7j353RIg6xZLfWhzmslML9Hh9PFqi7OHCuo8m85yYljaLY1T0McDwrAX3+DchicI4nHp7ctp9y4uhIrFTwJypmhE0fsURGfMnl2YDECQItFEUJE5NYP9QHXEGoCb1+RPo+7k/qAs6Vo+Ffsf9Sh+yw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725544636; c=relaxed/simple; bh=FzYo35LLTxDc7Hwb6+woJCKFW+Ga1xZxvVSAbKrDsok=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=KlmSKTz8/Rgs2CYajxxdkulMyRA0qcOiiy9N7oW+rVyEBQJs9UyY1mJGKapPTyPzGSltmZgRKxB7XUrzx293sO7AUv5KKFeKoFaCbx6wmPcKFScoBu5G+7t6EA3Su8hpiwqJcFiZe02AW1A2ltE+VGGco6uN7+jEchJqdaSZEVI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=vstipNWd; arc=none smtp.client-ip=91.218.175.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="vstipNWd" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1725544633; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=FVuIJCT209bF1zsxBrnTXUH3tk328yVBQnxL1a5/8R4=; b=vstipNWdLUeNwVQwkw0gPA895/5S4s3GwtAwpaYXEYLahGKyqhB0s7ChxVJqd0dCGXtbGN FFPf5yGdHJmnkMoAMG3Q6Q/zLi84Ufikh+r0/TVPJhuVtu+AAgNoLuLzjwn0QwvrTBjP6M hdODbatqHnyJaZjkHvK9IL06wKcP9hc= From: "Luis Henriques (SUSE)" To: Xiubo Li , Ilya Dryomov Cc: ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org, "Luis Henriques (SUSE)" Subject: [RFC PATCH v2] ceph: ceph: fix out-of-bound array access when doing a file read Date: Thu, 5 Sep 2024 14:57:00 +0100 Message-ID: <20240905135700.16394-1-luis.henriques@linux.dev> Precedence: bulk X-Mailing-List: ceph-devel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Migadu-Flow: FLOW_OUT __ceph_sync_read() does not correctly handle reads when the inode size is zero. It is easy to hit a NULL pointer dereference by continuously reading a file while, on another client, we keep truncating and writing new data into it. The NULL pointer dereference happens when the inode size is zero but the read op returns some data (ceph_osdc_wait_request()). This will lead to 'left' being set to a huge value due to the overflow in: left = i_size - off; and, in the loop that follows, the pages[] array being accessed beyond num_pages. This patch fixes the issue simply by checking the inode size and returning if it is zero, even if there was data from the read op. Link: https://tracker.ceph.com/issues/67524 Fixes: 1065da21e5df ("ceph: stop copying to iter at EOF on sync reads") Signed-off-by: Luis Henriques (SUSE) --- fs/ceph/file.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/fs/ceph/file.c b/fs/ceph/file.c index 4b8d59ebda00..41d4eac128bb 100644 --- a/fs/ceph/file.c +++ b/fs/ceph/file.c @@ -1066,7 +1066,7 @@ ssize_t __ceph_sync_read(struct inode *inode, loff_t *ki_pos, if (ceph_inode_is_shutdown(inode)) return -EIO; - if (!len) + if (!len || !i_size) return 0; /* * flush any page cache pages in this range. this @@ -1154,6 +1154,9 @@ ssize_t __ceph_sync_read(struct inode *inode, loff_t *ki_pos, doutc(cl, "%llu~%llu got %zd i_size %llu%s\n", off, len, ret, i_size, (more ? " MORE" : "")); + if (i_size == 0) + ret = 0; + /* Fix it to go to end of extent map */ if (sparse && ret >= 0) ret = ceph_sparse_ext_map_end(op);