From: Claude Code Review Bot <claude-review@example.com>
To: dri-devel-reviews@example.com
Subject: Claude review: drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers
Date: Sat, 16 May 2026 16:05:48 +1000 [thread overview]
Message-ID: <review-patch1-20260510203128.2884846-1-ashutoshdesai993@gmail.com> (raw)
In-Reply-To: <20260510203128.2884846-1-ashutoshdesai993@gmail.com>
Patch Review
**The fix is correct.** Changing `idx > raw->curlen` to `idx + 2 > raw->curlen` before each 2-byte read properly ensures both `msg[idx]` and `msg[idx+1]` fall within the valid message data (indices 0..curlen-1). Since `idx + 2 > curlen` strictly subsumes `idx > curlen`, the v2 simplification (dropping the redundant separate check) is appropriate as Lyude requested.
**Removal of trailing checks is fine.** The deleted trailing `idx += 2; if (idx > raw->curlen) goto fail_len;` blocks only validated that the message had no excess bytes *after* the read had already happened. Since the data was already consumed and idx isn't used afterward, these checks served no safety purpose.
**Issue 1: Missed instance of the same bug.** The same vulnerable 2-byte read pattern exists in `drm_dp_sideband_parse_resource_status_notify()`:
```c
// line 1124-1127: same bug pattern, NOT fixed by this patch
if (idx > raw->curlen)
goto fail_len;
msg->u.resource_stat.available_pbn = (raw->msg[idx] << 8) | (raw->msg[idx + 1]);
```
This has the identical insufficient bounds check before a 2-byte read. The patch should either include this fix or the commit message should note it as a known remaining instance.
**Issue 2 (minor): Commit message overstates consequences.** The commit message claims the OOB read goes "into the following struct fields (curchunk_len, curchunk_idx, curlen)." Looking at the struct definition:
```c
struct drm_dp_sideband_msg_rx {
u8 chunk[48];
u8 msg[256];
u8 curchunk_len; // follows msg[]
...
};
```
Reading past `msg[]` into `curchunk_len` only happens when `idx+1 >= 256`, i.e., `curlen >= 255`. For these MST sideband reply messages, `idx` reaches at most ~6. The practical outcome is reading stale/uninitialized data *within* the `msg[256]` buffer, not leaking adjacent struct fields. The bug is still real (parsing corrupted data from unvalidated bytes), but the "reads into curchunk_len" framing is misleading.
**Issue 3 (observation): Adjacent pre-existing bug.** In the same `drm_dp_sideband_parse_resource_status_notify()` function, `import_guid()` at line 1122 reads 16 bytes from `&raw->msg[idx]` but the preceding check at line 1119 only validates a single byte (`idx > raw->curlen`). This is outside the scope of this patch but worth noting as a follow-up.
**Summary**: The code changes in the patch are correct and the approach is sound. The patch should be extended to also fix `drm_dp_sideband_parse_resource_status_notify()` (line 1124) which has the identical bug, and the commit message consequence description could be made more precise.
---
Generated by Claude Code Patch Reviewer
next prev parent reply other threads:[~2026-05-16 6:05 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-10 20:31 [PATCH v2] drm/dp/mst: fix OOB reads on 2-byte fields in sideband reply parsers Ashutosh Desai
2026-05-16 6:05 ` Claude review: " Claude Code Review Bot
2026-05-16 6:05 ` Claude Code Review Bot [this message]
-- strict thread matches above, loose matches on Subject: below --
2026-04-10 4:00 [PATCH] " Ashutosh Desai
2026-04-12 0:31 ` Claude review: " Claude Code Review Bot
2026-04-12 0:31 ` Claude Code Review Bot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=review-patch1-20260510203128.2884846-1-ashutoshdesai993@gmail.com \
--to=claude-review@example.com \
--cc=dri-devel-reviews@example.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox