From: Michael Chang <mchang@suse.com>
To: The development of GNU GRUB <grub-devel@gnu.org>
Cc: "Daniel Kiper" <dkiper@net-space.pl>,
"Vladimir 'φ-coder/phcoder' Serbinenko" <phcoder@gmail.com>,
"dann frazier" <dann.frazier@canonical.com>
Subject: Re: [PATCH v2] grub-file: fix segmentation fault
Date: Wed, 23 Nov 2016 14:44:29 +0800 [thread overview]
Message-ID: <20161123064429.GA18160@linux-9gqx.suse.de> (raw)
In-Reply-To: <aaf00290-52fa-d646-4bd6-34a6620d1e13@gmail.com>
On Tue, Nov 22, 2016 at 09:39:43PM +0300, Andrei Borzenkov wrote:
> 22.11.2016 10:10, Michael Chang пишет:
>
> What about attached patch? It does not increase size of kernel.
Just some nitpicks in comments and a potential leak in fail path (See below),
otherwise LGTM.
>
> I am not thrilled as it does require more discipline from filter author.
> OTOH we may find some way to consolidate boilerplate later.
Yes, that's also why I tend to not touch the filter but trying to paper over it
on the parent's side, to be less frustrated to the filter authors.
>
> @Dann, this also solves your concerns about layering violation in
> progress module as side effect. Could you test this patch? Thank you!
I think this may deserve a separate patch (in file.c and progress.c) as it did
not fixed by the segfault problem here. But that's all up to you, as
consolidating all file->name related fix in one patch is nothing wrong.
> From: Andrei Borzenkov <arvidjaar@gmail.com>
> Subject: [PATCH] file: make sure file name is set when filters are used
>
> In grub_file_open the file handle returned by file filters has no file->name
> set which leads to segmentation fault later referenced by grub_elf_file. This
> patch tries to fix the problem.
>
> gdb --args ./grub-file --is-x86_64-xen-domu /boot/vmlinux-4.1.12-1-default.gz
>
> (gdb) bt
> #0 0x000000000047597e in grub_strlen (s=0x0) at ../grub-core/kern/misc.c:558
> #1 0x00000000004757e2 in grub_strdup (s=0x0) at ../grub-core/kern/misc.c:463
> #2 0x0000000000406418 in grub_elf_file (file=0x6dfb50, filename=0x0) at ../grub-core/kern/elf.c:89
> #3 0x00000000004043b3 in grub_xen_file (file=0x6dfb50) at ../grub-core/loader/i386/xen_file.c:29
> #4 0x0000000000403930 in grub_cmd_file (ctxt=0x7fffffffe120, argc=1, args=0x6dfa00) at ../grub-core/commands/file.c:425
> #5 0x000000000047e178 in grub_extcmd_dispatcher (cmd=0x6df730, argc=2, args=0x6ddfb0, script=0x0) at ../grub-core/commands/extcmd.c:54
> #6 0x000000000047e1d7 in grub_extcmd_dispatch (cmd=0x6df730, argc=2, args=0x6ddfb0) at ../grub-core/commands/extcmd.c:67
> #7 0x0000000000402945 in main (argc=3, argv=0x7fffffffe2e8) at ../util/grub-file.c:102
> (gdb) frame 3
> #3 0x00000000004043b3 in grub_xen_file (file=0x6dfb50) at ../grub-core/loader/i386/xen_file.c:29
> 29 elf = grub_elf_file (file, file->name);
>
> Initialize file->name early and make sure it is set in file structure returned
> by each filter. Note that each filter must set it to NULL in its ->close method
> to avoid double free.
>
> It also makes redundant special case for net in progress module, because now file
> name is set also for net files.
>
> Reported by: Michael Chang <mchang@suse.com>
>
> ---
> grub-core/commands/verify.c | 1 +
> grub-core/io/bufio.c | 3 +++
> grub-core/io/gzio.c | 2 ++
> grub-core/io/lzopio.c | 2 ++
> grub-core/io/offset.c | 3 +++
> grub-core/io/xzio.c | 2 ++
> grub-core/kern/file.c | 5 ++---
> grub-core/lib/progress.c | 7 +------
> 8 files changed, 16 insertions(+), 9 deletions(-)
>
> diff --git a/grub-core/commands/verify.c b/grub-core/commands/verify.c
> index 67cb1c7..a959929 100644
> --- a/grub-core/commands/verify.c
> +++ b/grub-core/commands/verify.c
> @@ -845,6 +845,7 @@ verified_close (struct grub_file *file)
>
> /* device and name are freed by parent */
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
As long as the comment is intended to make things more obvious, I'd suggest to
address again it's for "parent's" grub_file_close and be more in line with
previous comment has claimed.
Same applies for all similar comments below.
> file->name = 0;
>
> return grub_errno;
> diff --git a/grub-core/io/bufio.c b/grub-core/io/bufio.c
> index 2243827..3a8a53c 100644
> --- a/grub-core/io/bufio.c
> +++ b/grub-core/io/bufio.c
> @@ -72,6 +72,7 @@ grub_bufio_open (grub_file_t io, int size)
> bufio->block_size = size;
>
> file->device = io->device;
> + file->name = io->name;
> file->size = io->size;
> file->data = bufio;
> file->fs = &grub_bufio_fs;
> @@ -191,6 +192,8 @@ grub_bufio_close (grub_file_t file)
> grub_free (bufio);
>
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
> + file->name = 0;
>
> return grub_errno;
> }
> diff --git a/grub-core/io/gzio.c b/grub-core/io/gzio.c
> index 0f2ea6b..17dcbe3 100644
> --- a/grub-core/io/gzio.c
> +++ b/grub-core/io/gzio.c
> @@ -1144,6 +1144,7 @@ grub_gzio_open (grub_file_t io, const char *name __attribute__ ((unused)))
> gzio->file = io;
>
> file->device = io->device;
> + file->name = io->name;
> file->data = gzio;
> file->fs = &grub_gzio_fs;
> file->not_easily_seekable = 1;
> @@ -1291,6 +1292,7 @@ grub_gzio_close (grub_file_t file)
>
> /* No need to close the same device twice. */
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
> file->name = 0;
>
> return grub_errno;
> diff --git a/grub-core/io/lzopio.c b/grub-core/io/lzopio.c
> index 7559c6c..52acde4 100644
> --- a/grub-core/io/lzopio.c
> +++ b/grub-core/io/lzopio.c
> @@ -427,6 +427,7 @@ grub_lzopio_open (grub_file_t io,
> lzopio->file = io;
>
> file->device = io->device;
> + file->name = io->name;
> file->data = lzopio;
> file->fs = &grub_lzopio_fs;
> file->size = GRUB_FILE_SIZE_UNKNOWN;
> @@ -523,6 +524,7 @@ grub_lzopio_close (grub_file_t file)
>
> /* Device must not be closed twice. */
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
> file->name = 0;
> return grub_errno;
> }
> diff --git a/grub-core/io/offset.c b/grub-core/io/offset.c
> index ebed0eb..1de192e 100644
> --- a/grub-core/io/offset.c
> +++ b/grub-core/io/offset.c
> @@ -46,6 +46,8 @@ grub_offset_close (grub_file_t file)
>
> /* No need to close the same device twice. */
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
> + file->name = 0;
>
> return 0;
> }
> @@ -88,6 +90,7 @@ grub_file_offset_open (grub_file_t parent, grub_off_t start, grub_off_t size)
> off_data->parent = parent;
>
> off_file->device = parent->device;
> + off_file->name = parent->name;
> off_file->data = off_data;
> off_file->fs = &grub_offset_fs;
> off_file->size = size;
> diff --git a/grub-core/io/xzio.c b/grub-core/io/xzio.c
> index a3536ad..cdf6cef 100644
> --- a/grub-core/io/xzio.c
> +++ b/grub-core/io/xzio.c
> @@ -189,6 +189,7 @@ grub_xzio_open (grub_file_t io,
> xzio->file = io;
>
> file->device = io->device;
> + file->name = io->name;
> file->data = xzio;
> file->fs = &grub_xzio_fs;
> file->size = GRUB_FILE_SIZE_UNKNOWN;
> @@ -319,6 +320,7 @@ grub_xzio_close (grub_file_t file)
>
> /* Device must not be closed twice. */
> file->device = 0;
> + /* Must set to NULL to prevent double free in grub_file_close */
> file->name = 0;
> return grub_errno;
> }
> diff --git a/grub-core/kern/file.c b/grub-core/kern/file.c
> index 668f893..dd6c28a 100644
> --- a/grub-core/kern/file.c
> +++ b/grub-core/kern/file.c
> @@ -88,6 +88,8 @@ grub_file_open (const char *name)
> goto fail;
>
> file->device = device;
> + file->name = grub_strdup (name);
> + grub_errno = GRUB_ERR_NONE;
>
> /* In case of relative pathnames and non-Unix systems (like Windows)
> * name of host files may not start with `/'. Blocklists for host files
> @@ -111,9 +113,6 @@ grub_file_open (const char *name)
> if ((file->fs->open) (file, file_name) != GRUB_ERR_NONE)
> goto fail;
>
> - file->name = grub_strdup (name);
> - grub_errno = GRUB_ERR_NONE;
> -
Well.. I think file->name now has to be free also in the "goto fail" path.
Thanks,
Michael
> for (filter = 0; file && filter < ARRAY_SIZE (grub_file_filters_enabled);
> filter++)
> if (grub_file_filters_enabled[filter])
> diff --git a/grub-core/lib/progress.c b/grub-core/lib/progress.c
> index 4b7cbbc..c8efdb1 100644
> --- a/grub-core/lib/progress.c
> +++ b/grub-core/lib/progress.c
> @@ -77,12 +77,7 @@ grub_file_progress_hook_real (grub_disk_addr_t sector __attribute__ ((unused)),
> percent = grub_divmod64 (100 * file->progress_offset,
> file->size, 0);
>
> - /* grub_net_fs_open() saves off partial file structure before name is initialized.
> - It already saves passed file name in net structure so just use it in this case.
> - */
> - if (file->device->net)
> - partial_file_name = grub_strrchr (file->device->net->name, '/');
> - else if (file->name) /* grub_file_open() may leave it as NULL */
> + if (file->name) /* grub_file_open() may leave it as NULL */
> partial_file_name = grub_strrchr (file->name, '/');
> else
> partial_file_name = NULL;
> --
> tg: (c9a8d03..) u/file-filter-filename (depends on: master)
> _______________________________________________
> Grub-devel mailing list
> Grub-devel@gnu.org
> https://lists.gnu.org/mailman/listinfo/grub-devel
prev parent reply other threads:[~2016-11-23 6:45 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-04-12 6:24 [PATCH v2] grub-file: fix segmentation fault Michael Chang
2016-11-17 19:08 ` Daniel Kiper
2016-11-18 8:50 ` Andrei Borzenkov
2016-11-22 7:10 ` Michael Chang
2016-11-22 7:33 ` Michael Chang
2016-11-22 18:39 ` Andrei Borzenkov
2016-11-23 6:44 ` Michael Chang [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161123064429.GA18160@linux-9gqx.suse.de \
--to=mchang@suse.com \
--cc=dann.frazier@canonical.com \
--cc=dkiper@net-space.pl \
--cc=grub-devel@gnu.org \
--cc=phcoder@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.