mirror of
https://github.com/torvalds/linux.git
synced 2025-12-07 20:06:24 +00:00
NFSD: Add array bounds-checking in nfsd_iter_read()
The *count parameter does not appear to be explicitly restricted to being smaller than rsize, so it might be possible to overrun the rq_bvec or rq_pages arrays. Rather than overrunning these arrays (damage done!) and then WARNING once, let's harden the loop so that it terminates before the end of the arrays are reached. This should result in a short read, which is OK -- clients recover by sending additional READ requests for the remaining unread bytes. Reported-by: NeilBrown <neil@brown.name> Reviewed-by: Jeff Layton <jlayton@kernel.org> Reviewed-by: Mike Snitzer <snitzer@kernel.org> Reviewed-by: NeilBrown <neil@brown.name> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
This commit is contained in:
@@ -1115,18 +1115,20 @@ __be32 nfsd_iter_read(struct svc_rqst *rqstp, struct svc_fh *fhp,
|
||||
|
||||
v = 0;
|
||||
total = *count;
|
||||
while (total) {
|
||||
while (total && v < rqstp->rq_maxpages &&
|
||||
rqstp->rq_next_page < rqstp->rq_page_end) {
|
||||
len = min_t(size_t, total, PAGE_SIZE - base);
|
||||
bvec_set_page(&rqstp->rq_bvec[v], *(rqstp->rq_next_page++),
|
||||
bvec_set_page(&rqstp->rq_bvec[v], *rqstp->rq_next_page,
|
||||
len, base);
|
||||
|
||||
total -= len;
|
||||
++rqstp->rq_next_page;
|
||||
++v;
|
||||
base = 0;
|
||||
}
|
||||
WARN_ON_ONCE(v > rqstp->rq_maxpages);
|
||||
|
||||
trace_nfsd_read_vector(rqstp, fhp, offset, *count);
|
||||
iov_iter_bvec(&iter, ITER_DEST, rqstp->rq_bvec, v, *count);
|
||||
trace_nfsd_read_vector(rqstp, fhp, offset, *count - total);
|
||||
iov_iter_bvec(&iter, ITER_DEST, rqstp->rq_bvec, v, *count - total);
|
||||
host_err = vfs_iocb_iter_read(file, &kiocb, &iter);
|
||||
return nfsd_finish_read(rqstp, fhp, file, offset, count, eof, host_err);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user