mirror of
git://github.com/lxc/lxc
synced 2025-08-31 06:59:37 +00:00
Merge pull request #3743 from brauner/2021-03-27/fixes_3
oss-fuzz: fixes
This commit is contained in:
@@ -7,6 +7,9 @@
|
||||
#define _GNU_SOURCE 1
|
||||
#endif
|
||||
|
||||
#include <stdbool.h>
|
||||
#include <linux/types.h>
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#ifndef thread_local
|
||||
@@ -25,6 +28,196 @@
|
||||
#define __fallthrough /* fall through */
|
||||
#endif
|
||||
|
||||
#if defined(__GNUC__) && !defined(__clang__)
|
||||
#if GCC_VERSION >= 50100
|
||||
#define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#define likely(x) __builtin_expect(!!(x), 1)
|
||||
#define unlikely(x) __builtin_expect(!!(x), 0)
|
||||
#define __must_check __attribute__((__warn_unused_result__))
|
||||
|
||||
static inline bool __must_check __must_check_overflow(bool overflow)
|
||||
{
|
||||
return unlikely(overflow);
|
||||
}
|
||||
|
||||
#define is_signed_type(type) (((type)(-1)) < (type)1)
|
||||
#define __type_half_max(type) ((type)1 << (8*sizeof(type) - 1 - is_signed_type(type)))
|
||||
#define type_max(T) ((T)((__type_half_max(T) - 1) + __type_half_max(T)))
|
||||
#define type_min(T) ((T)((T)-type_max(T)-(T)1))
|
||||
|
||||
/*
|
||||
* Avoids triggering -Wtype-limits compilation warning,
|
||||
* while using unsigned data types to check a < 0.
|
||||
*/
|
||||
#define is_non_negative(a) ((a) > 0 || (a) == 0)
|
||||
#define is_negative(a) (!(is_non_negative(a)))
|
||||
|
||||
#ifdef COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW
|
||||
/*
|
||||
* For simplicity and code hygiene, the fallback code below insists on
|
||||
* a, b and *d having the same type (similar to the min() and max()
|
||||
* macros), whereas gcc's type-generic overflow checkers accept
|
||||
* different types. Hence we don't just make check_add_overflow an
|
||||
* alias for __builtin_add_overflow, but add type checks similar to
|
||||
* below.
|
||||
*/
|
||||
#define check_add_overflow(a, b, d) __must_check_overflow(({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
__builtin_add_overflow(__a, __b, __d); \
|
||||
}))
|
||||
|
||||
#define check_sub_overflow(a, b, d) __must_check_overflow(({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
__builtin_sub_overflow(__a, __b, __d); \
|
||||
}))
|
||||
|
||||
#define check_mul_overflow(a, b, d) __must_check_overflow(({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
__builtin_mul_overflow(__a, __b, __d); \
|
||||
}))
|
||||
#else /* !COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW */
|
||||
|
||||
/* Checking for unsigned overflow is relatively easy without causing UB. */
|
||||
#define __unsigned_add_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = __a + __b; \
|
||||
*__d < __a; \
|
||||
})
|
||||
#define __unsigned_sub_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = __a - __b; \
|
||||
__a < __b; \
|
||||
})
|
||||
|
||||
/*
|
||||
* If one of a or b is a compile-time constant, this avoids a division.
|
||||
*/
|
||||
#define __unsigned_mul_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = __a * __b; \
|
||||
__builtin_constant_p(__b) ? \
|
||||
__b > 0 && __a > type_max(typeof(__a)) / __b : \
|
||||
__a > 0 && __b > type_max(typeof(__b)) / __a; \
|
||||
})
|
||||
|
||||
/*
|
||||
* For signed types, detecting overflow is much harder, especially if
|
||||
* we want to avoid UB. But the interface of these macros is such that
|
||||
* we must provide a result in *d, and in fact we must produce the
|
||||
* result promised by gcc's builtins, which is simply the possibly
|
||||
* wrapped-around value. Fortunately, we can just formally do the
|
||||
* operations in the widest relevant unsigned type (u64) and then
|
||||
* truncate the result - gcc is smart enough to generate the same code
|
||||
* with and without the (u64) casts.
|
||||
*/
|
||||
|
||||
/*
|
||||
* Adding two signed integers can overflow only if they have the same
|
||||
* sign, and overflow has happened iff the result has the opposite
|
||||
* sign.
|
||||
*/
|
||||
#define __signed_add_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = (__u64)__a + (__u64)__b; \
|
||||
(((~(__a ^ __b)) & (*__d ^ __a)) \
|
||||
& type_min(typeof(__a))) != 0; \
|
||||
})
|
||||
|
||||
/*
|
||||
* Subtraction is similar, except that overflow can now happen only
|
||||
* when the signs are opposite. In this case, overflow has happened if
|
||||
* the result has the opposite sign of a.
|
||||
*/
|
||||
#define __signed_sub_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = (__u64)__a - (__u64)__b; \
|
||||
((((__a ^ __b)) & (*__d ^ __a)) \
|
||||
& type_min(typeof(__a))) != 0; \
|
||||
})
|
||||
|
||||
/*
|
||||
* Signed multiplication is rather hard. gcc always follows C99, so
|
||||
* division is truncated towards 0. This means that we can write the
|
||||
* overflow check like this:
|
||||
*
|
||||
* (a > 0 && (b > MAX/a || b < MIN/a)) ||
|
||||
* (a < -1 && (b > MIN/a || b < MAX/a) ||
|
||||
* (a == -1 && b == MIN)
|
||||
*
|
||||
* The redundant casts of -1 are to silence an annoying -Wtype-limits
|
||||
* (included in -Wextra) warning: When the type is u8 or u16, the
|
||||
* __b_c_e in check_mul_overflow obviously selects
|
||||
* __unsigned_mul_overflow, but unfortunately gcc still parses this
|
||||
* code and warns about the limited range of __b.
|
||||
*/
|
||||
|
||||
#define __signed_mul_overflow(a, b, d) ({ \
|
||||
typeof(a) __a = (a); \
|
||||
typeof(b) __b = (b); \
|
||||
typeof(d) __d = (d); \
|
||||
typeof(a) __tmax = type_max(typeof(a)); \
|
||||
typeof(a) __tmin = type_min(typeof(a)); \
|
||||
(void) (&__a == &__b); \
|
||||
(void) (&__a == __d); \
|
||||
*__d = (__u64)__a * (__u64)__b; \
|
||||
(__b > 0 && (__a > __tmax/__b || __a < __tmin/__b)) || \
|
||||
(__b < (typeof(__b))-1 && (__a > __tmin/__b || __a < __tmax/__b)) || \
|
||||
(__b == (typeof(__b))-1 && __a == __tmin); \
|
||||
})
|
||||
|
||||
|
||||
#define check_add_overflow(a, b, d) __must_check_overflow( \
|
||||
__builtin_choose_expr(is_signed_type(typeof(a)), \
|
||||
__signed_add_overflow(a, b, d), \
|
||||
__unsigned_add_overflow(a, b, d)))
|
||||
|
||||
#define check_sub_overflow(a, b, d) __must_check_overflow( \
|
||||
__builtin_choose_expr(is_signed_type(typeof(a)), \
|
||||
__signed_sub_overflow(a, b, d), \
|
||||
__unsigned_sub_overflow(a, b, d)))
|
||||
|
||||
#define check_mul_overflow(a, b, d) __must_check_overflow( \
|
||||
__builtin_choose_expr(is_signed_type(typeof(a)), \
|
||||
__signed_mul_overflow(a, b, d), \
|
||||
__unsigned_mul_overflow(a, b, d)))
|
||||
|
||||
#endif /* COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW */
|
||||
|
||||
#ifndef __noreturn
|
||||
# if __STDC_VERSION__ >= 201112L
|
||||
# if !IS_BIONIC
|
||||
@@ -89,7 +282,4 @@
|
||||
#define __public __attribute__((visibility("default")))
|
||||
#endif
|
||||
|
||||
#define likely(x) __builtin_expect(!!(x), 1)
|
||||
#define unlikely(x) __builtin_expect(!!(x), 0)
|
||||
|
||||
#endif /* __LXC_COMPILER_H */
|
||||
|
@@ -760,6 +760,8 @@ static int set_config_net_ipv4_address(const char *key, const char *value,
|
||||
} else {
|
||||
inetdev->prefix = config_ip_prefix(&inetdev->addr);
|
||||
}
|
||||
if (inetdev->prefix > 32)
|
||||
return ret_errno(EINVAL);
|
||||
|
||||
/* If no broadcast address, let compute one from the
|
||||
* prefix and address.
|
||||
@@ -2278,7 +2280,10 @@ static int set_config_mount_auto(const char *key, const char *value,
|
||||
if(!container_path)
|
||||
return log_error_errno(-EINVAL, EINVAL, "Failed to copy shmounts container path");
|
||||
|
||||
free_disarm(lxc_conf->shmount.path_host);
|
||||
lxc_conf->shmount.path_host = move_ptr(host_path);
|
||||
|
||||
free_disarm(lxc_conf->shmount.path_cont);
|
||||
lxc_conf->shmount.path_cont = move_ptr(container_path);
|
||||
}
|
||||
}
|
||||
@@ -2416,7 +2421,7 @@ static int set_config_console_buffer_size(const char *key, const char *value,
|
||||
struct lxc_conf *lxc_conf, void *data)
|
||||
{
|
||||
int ret;
|
||||
int64_t size;
|
||||
long long int size;
|
||||
uint64_t buffer_size, pgsz;
|
||||
|
||||
if (lxc_config_value_empty(value)) {
|
||||
@@ -2440,7 +2445,7 @@ static int set_config_console_buffer_size(const char *key, const char *value,
|
||||
/* must be at least a page size */
|
||||
pgsz = lxc_getpagesize();
|
||||
if ((uint64_t)size < pgsz) {
|
||||
NOTICE("Requested ringbuffer size for the console is %" PRId64 " but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
|
||||
NOTICE("Requested ringbuffer size for the console is %lld but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
|
||||
size, pgsz, pgsz);
|
||||
size = pgsz;
|
||||
}
|
||||
@@ -2461,7 +2466,7 @@ static int set_config_console_size(const char *key, const char *value,
|
||||
struct lxc_conf *lxc_conf, void *data)
|
||||
{
|
||||
int ret;
|
||||
int64_t size;
|
||||
long long int size;
|
||||
uint64_t log_size, pgsz;
|
||||
|
||||
if (lxc_config_value_empty(value)) {
|
||||
@@ -2485,7 +2490,7 @@ static int set_config_console_size(const char *key, const char *value,
|
||||
/* must be at least a page size */
|
||||
pgsz = lxc_getpagesize();
|
||||
if ((uint64_t)size < pgsz) {
|
||||
NOTICE("Requested ringbuffer size for the console is %" PRId64 " but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
|
||||
NOTICE("Requested ringbuffer size for the console is %lld but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
|
||||
size, pgsz, pgsz);
|
||||
size = pgsz;
|
||||
}
|
||||
|
@@ -897,13 +897,12 @@ void *must_realloc(void *orig, size_t sz)
|
||||
return ret;
|
||||
}
|
||||
|
||||
int parse_byte_size_string(const char *s, int64_t *converted)
|
||||
int parse_byte_size_string(const char *s, long long int *converted)
|
||||
{
|
||||
int ret, suffix_len;
|
||||
long long int conv;
|
||||
int64_t mltpl, overflow;
|
||||
long long int conv, mltpl;
|
||||
char *end;
|
||||
char dup[INTTYPE_TO_STRLEN(int64_t)];
|
||||
char dup[INTTYPE_TO_STRLEN(long long int)];
|
||||
char suffix[3] = {0};
|
||||
|
||||
if (is_empty_string(s))
|
||||
@@ -960,11 +959,9 @@ int parse_byte_size_string(const char *s, int64_t *converted)
|
||||
else
|
||||
return ret_errno(EINVAL);
|
||||
|
||||
overflow = conv * mltpl;
|
||||
if (conv != 0 && (overflow / conv) != mltpl)
|
||||
if (check_mul_overflow(conv, mltpl, converted))
|
||||
return ret_errno(ERANGE);
|
||||
|
||||
*converted = overflow;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -81,7 +81,7 @@ __hidden extern int lxc_safe_uint64(const char *numstr, uint64_t *converted, int
|
||||
__hidden extern int lxc_safe_int64_residual(const char *numstr, int64_t *converted, int base,
|
||||
char *residual, size_t residual_len);
|
||||
/* Handles B, kb, MB, GB. Detects overflows and reports -ERANGE. */
|
||||
__hidden extern int parse_byte_size_string(const char *s, int64_t *converted);
|
||||
__hidden extern int parse_byte_size_string(const char *s, long long int *converted);
|
||||
|
||||
/*
|
||||
* Concatenate all passed-in strings into one path. Do not fail. If any piece
|
||||
|
@@ -403,7 +403,7 @@ void test_lxc_string_in_array(void)
|
||||
void test_parse_byte_size_string(void)
|
||||
{
|
||||
int ret;
|
||||
int64_t n;
|
||||
long long int n;
|
||||
|
||||
ret = parse_byte_size_string("0", &n);
|
||||
if (ret < 0) {
|
||||
|
Reference in New Issue
Block a user