From: Claude Code Review Bot <claude-review@example.com>
To: dri-devel-reviews@example.com
Subject: Claude review: drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers
Date: Sun, 12 Apr 2026 10:31:51 +1000 [thread overview]
Message-ID: <review-patch1-20260410040026.2436280-1-ashutoshdesai993@gmail.com> (raw)
In-Reply-To: <20260410040026.2436280-1-ashutoshdesai993@gmail.com>
Patch Review
**Correctness: The fix is sound.** Each of the three functions now validates that 2 bytes are available before performing the 2-byte read. The removal of the post-read `idx += 2` and trailing bounds check on the last field in each function is correct — nothing uses `idx` afterward, and the pre-check is sufficient.
**Issue 1: Missing `Fixes:` tag and `Cc: stable`.**
This is a bug fix for an OOB read. It should identify the commit that introduced the vulnerable code and include:
```
Fixes: <sha> ("<original commit subject>")
Cc: stable@vger.kernel.org
```
The vulnerable pattern has existed since at least the original MST topology code introduction. A `Fixes:` tag is important for stable kernel backports.
**Issue 2: Redundant bounds checks in `enum_path_resources_ack` and `query_payload_ack`.**
In `drm_dp_sideband_parse_enum_path_resources_ack`, the patch produces:
```c
idx++;
if (idx > raw->curlen)
goto fail_len;
if (idx + 2 > raw->curlen)
goto fail_len;
```
The check `idx + 2 > raw->curlen` strictly subsumes `idx > raw->curlen` (if `idx > curlen`, then `idx + 2 > curlen` is trivially true). The first check is now redundant. The same pattern appears in `drm_dp_sideband_parse_query_payload_ack`.
In `drm_dp_sideband_parse_allocate_payload_ack`, the situation is slightly different — the `idx > raw->curlen` check validates the prior single-byte `vcpi` read, so it's arguably more defensible to keep, though it's still technically subsumed.
Consider collapsing the adjacent checks into a single `idx + 2 > raw->curlen` check in each function, or at minimum acknowledge this is intentional for readability.
**Issue 3: Commit message overstates the OOB consequence.**
The commit message states:
> raw->msg[idx+1] is one byte past the received message data, reading into the following struct fields (curchunk_len, curchunk_idx, curlen).
Since `msg` is a 256-byte array (`u8 msg[256]`) and `curlen` is `u8` (max 255), in the common case where `curlen < 255`, the OOB read stays within the `msg` array — it reads stale/uninitialized bytes from the buffer, not the subsequent struct fields. Reading into `curchunk_len` et al. would only happen in the edge case where `curlen == 255` and `idx+1 == 256`, which overruns the array. The commit message should say "reading past the valid message data" rather than implying it always reads into the struct fields that follow `msg[]`.
**Issue 4 (pre-existing, not introduced by this patch):** All three functions read `raw->msg[1]` at `idx = 1` before any bounds check. If `curlen < 2`, this is also an OOB read (within the buffer, reading stale data). This is a pre-existing issue and outside the scope of this patch, but worth noting for a follow-up.
**Summary:** The fix is correct and addresses a real problem. Please add `Fixes:`/`Cc: stable` tags and consider cleaning up the redundant adjacent checks before merging.
---
Generated by Claude Code Patch Reviewer
next prev parent reply other threads:[~2026-04-12 0:31 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-10 4:00 [PATCH] drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers Ashutosh Desai
2026-04-12 0:31 ` Claude Code Review Bot [this message]
2026-04-12 0:31 ` Claude review: " Claude Code Review Bot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=review-patch1-20260410040026.2436280-1-ashutoshdesai993@gmail.com \
--to=claude-review@example.com \
--cc=dri-devel-reviews@example.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox