Message ID | d094ecbe-8b14-45cc-8cd8-f70fdeca55d8@moroto.mountain (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | [net] ptp: fix integer overflow in max_vclocks_store | expand |
Le 14/06/2024 à 19:31, Dan Carpenter a écrit : > On 32bit systems, the "4 * max" multiply can overflow. Use size_mul() > to fix this. > > Fixes: 44c494c8e30e ("ptp: track available ptp vclocks information") > Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org> > --- > drivers/ptp/ptp_sysfs.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/ptp/ptp_sysfs.c b/drivers/ptp/ptp_sysfs.c > index a15460aaa03b..bc1562fcd6c9 100644 > --- a/drivers/ptp/ptp_sysfs.c > +++ b/drivers/ptp/ptp_sysfs.c > @@ -296,7 +296,7 @@ static ssize_t max_vclocks_store(struct device *dev, > if (max < ptp->n_vclocks) > goto out; > > - size = sizeof(int) * max; > + size = size_mul(sizeof(int), max); > vclock_index = kzalloc(size, GFP_KERNEL); kcalloc() maybe? > if (!vclock_index) { > err = -ENOMEM; Unrelated but, a few lines above, should the: if (max == ptp->max_vclocks) return count; be after: if (mutex_lock_interruptible(&ptp->n_vclocks_mux)) return -ERESTARTSYS; as done in n_vclocks_store()? CJ
On Sat, Jun 15, 2024 at 09:05:56AM +0200, Christophe JAILLET wrote: > Le 14/06/2024 à 19:31, Dan Carpenter a écrit : > > On 32bit systems, the "4 * max" multiply can overflow. Use size_mul() > > to fix this. > > > > Fixes: 44c494c8e30e ("ptp: track available ptp vclocks information") > > Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org> > > --- > > drivers/ptp/ptp_sysfs.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/drivers/ptp/ptp_sysfs.c b/drivers/ptp/ptp_sysfs.c > > index a15460aaa03b..bc1562fcd6c9 100644 > > --- a/drivers/ptp/ptp_sysfs.c > > +++ b/drivers/ptp/ptp_sysfs.c > > @@ -296,7 +296,7 @@ static ssize_t max_vclocks_store(struct device *dev, > > if (max < ptp->n_vclocks) > > goto out; > > - size = sizeof(int) * max; > > + size = size_mul(sizeof(int), max); > > vclock_index = kzalloc(size, GFP_KERNEL); > > kcalloc() maybe? > Fair enough. I'll resend. > > if (!vclock_index) { > > err = -ENOMEM; > > > Unrelated but, a few lines above, should the: > if (max == ptp->max_vclocks) > return count; > > be after: > if (mutex_lock_interruptible(&ptp->n_vclocks_mux)) > return -ERESTARTSYS; > > as done in n_vclocks_store()? The code is probably better as is. This is a short cut path. We sometimes see this pattern on fast paths where we test to see if we can skip everything, then we test again underlock if the test is really essential. Here if max == ptp->max_vclocks then the whole function is very complicated no-op so it's not necessary to retest under the lock. Meanwhile the essential "if (max < ptp->n_vclocks)" check is done under lock. So it works and it feels like someone put some thought into it. regards, dan carpenter
diff --git a/drivers/ptp/ptp_sysfs.c b/drivers/ptp/ptp_sysfs.c index a15460aaa03b..bc1562fcd6c9 100644 --- a/drivers/ptp/ptp_sysfs.c +++ b/drivers/ptp/ptp_sysfs.c @@ -296,7 +296,7 @@ static ssize_t max_vclocks_store(struct device *dev, if (max < ptp->n_vclocks) goto out; - size = sizeof(int) * max; + size = size_mul(sizeof(int), max); vclock_index = kzalloc(size, GFP_KERNEL); if (!vclock_index) { err = -ENOMEM;
On 32bit systems, the "4 * max" multiply can overflow. Use size_mul() to fix this. Fixes: 44c494c8e30e ("ptp: track available ptp vclocks information") Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org> --- drivers/ptp/ptp_sysfs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)