public inbox for drm-ai-reviews@public-inbox.freedesktop.org
 help / color / mirror / Atom feed
From: Claude Code Review Bot <claude-review@example.com>
To: dri-devel-reviews@example.com
Subject: Claude review: drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers
Date: Sun, 12 Apr 2026 10:31:51 +1000	[thread overview]
Message-ID: <review-patch1-20260410040026.2436280-1-ashutoshdesai993@gmail.com> (raw)
In-Reply-To: <20260410040026.2436280-1-ashutoshdesai993@gmail.com>

Patch Review

**Correctness: The fix is sound.** Each of the three functions now validates that 2 bytes are available before performing the 2-byte read. The removal of the post-read `idx += 2` and trailing bounds check on the last field in each function is correct — nothing uses `idx` afterward, and the pre-check is sufficient.

**Issue 1: Missing `Fixes:` tag and `Cc: stable`.**
This is a bug fix for an OOB read. It should identify the commit that introduced the vulnerable code and include:
```
Fixes: <sha> ("<original commit subject>")
Cc: stable@vger.kernel.org
```
The vulnerable pattern has existed since at least the original MST topology code introduction. A `Fixes:` tag is important for stable kernel backports.

**Issue 2: Redundant bounds checks in `enum_path_resources_ack` and `query_payload_ack`.**

In `drm_dp_sideband_parse_enum_path_resources_ack`, the patch produces:
```c
idx++;
if (idx > raw->curlen)
    goto fail_len;
if (idx + 2 > raw->curlen)
    goto fail_len;
```
The check `idx + 2 > raw->curlen` strictly subsumes `idx > raw->curlen` (if `idx > curlen`, then `idx + 2 > curlen` is trivially true). The first check is now redundant. The same pattern appears in `drm_dp_sideband_parse_query_payload_ack`.

In `drm_dp_sideband_parse_allocate_payload_ack`, the situation is slightly different — the `idx > raw->curlen` check validates the prior single-byte `vcpi` read, so it's arguably more defensible to keep, though it's still technically subsumed.

Consider collapsing the adjacent checks into a single `idx + 2 > raw->curlen` check in each function, or at minimum acknowledge this is intentional for readability.

**Issue 3: Commit message overstates the OOB consequence.**

The commit message states:
> raw->msg[idx+1] is one byte past the received message data, reading into the following struct fields (curchunk_len, curchunk_idx, curlen).

Since `msg` is a 256-byte array (`u8 msg[256]`) and `curlen` is `u8` (max 255), in the common case where `curlen < 255`, the OOB read stays within the `msg` array — it reads stale/uninitialized bytes from the buffer, not the subsequent struct fields. Reading into `curchunk_len` et al. would only happen in the edge case where `curlen == 255` and `idx+1 == 256`, which overruns the array. The commit message should say "reading past the valid message data" rather than implying it always reads into the struct fields that follow `msg[]`.

**Issue 4 (pre-existing, not introduced by this patch):** All three functions read `raw->msg[1]` at `idx = 1` before any bounds check. If `curlen < 2`, this is also an OOB read (within the buffer, reading stale data). This is a pre-existing issue and outside the scope of this patch, but worth noting for a follow-up.

**Summary:** The fix is correct and addresses a real problem. Please add `Fixes:`/`Cc: stable` tags and consider cleaning up the redundant adjacent checks before merging.

---
Generated by Claude Code Patch Reviewer

  reply	other threads:[~2026-04-12  0:31 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-10  4:00 [PATCH] drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers Ashutosh Desai
2026-04-12  0:31 ` Claude Code Review Bot [this message]
2026-04-12  0:31 ` Claude review: " Claude Code Review Bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=review-patch1-20260410040026.2436280-1-ashutoshdesai993@gmail.com \
    --to=claude-review@example.com \
    --cc=dri-devel-reviews@example.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox