nfsd: Fix sanity check for NFSv4.2 Allocate operations
The NFSv4.2 Allocate operation sanity checks the aa_offset and aa_length arguments. Since they are assigned to variables of type off_t (signed) it was possible for them to be negative. It was also possible for aa_offset+aa_length to exceed OFF_MAX when stored in lo_end, which is uint64_t. This patch adds checks for these cases to the sanity check. Reviewed by: kib MFC after: 2 weeks Differential Revision: https://reviews.freebsd.org/D31511
This commit is contained in:
parent
5ff5d1177b
commit
06afb53bcd
@ -5347,12 +5347,18 @@ nfsrvd_allocate(struct nfsrv_descript *nd, __unused int isdgram,
|
||||
off = fxdr_hyper(tl); tl += 2;
|
||||
lop->lo_first = off;
|
||||
len = fxdr_hyper(tl);
|
||||
lop->lo_end = off + len;
|
||||
lop->lo_end = lop->lo_first + len;
|
||||
/*
|
||||
* Paranoia, just in case it wraps around, which shouldn't
|
||||
* ever happen anyhow.
|
||||
* Sanity check the offset and length.
|
||||
* off and len are off_t (signed int64_t) whereas
|
||||
* lo_first and lo_end are uint64_t and, as such,
|
||||
* if off >= 0 && len > 0, lo_end cannot overflow
|
||||
* unless off_t is changed to something other than
|
||||
* int64_t. Check lo_end < lo_first in case that
|
||||
* is someday the case.
|
||||
*/
|
||||
if (nd->nd_repstat == 0 && (lop->lo_end < lop->lo_first || len <= 0))
|
||||
if (nd->nd_repstat == 0 && (len <= 0 || off < 0 || lop->lo_end >
|
||||
OFF_MAX || lop->lo_end < lop->lo_first))
|
||||
nd->nd_repstat = NFSERR_INVAL;
|
||||
|
||||
if (nd->nd_repstat == 0 && vnode_vtype(vp) != VREG)
|
||||
|
Loading…
x
Reference in New Issue
Block a user