* [patch] ocfs2: tighten up strlen() checking
@ 2010-07-10 14:33 Dan Carpenter
2010-07-12 11:30 ` Wengang Wang
` (2 more replies)
0 siblings, 3 replies; 7+ messages in thread
From: Dan Carpenter @ 2010-07-10 14:33 UTC (permalink / raw)
To: ocfs2-devel
This function is only called from one place and it's like this:
dlm_register_domain(conn->cc_name, dlm_key, &fs_version);
The "conn->cc_name" is 64 characters long. If strlen(conn->cc_name)
were equal to O2NM_MAX_NAME_LEN (64) that would be a bug because
strlen() doesn't count the NULL character.
In fact, if you look how O2NM_MAX_NAME_LEN is used, it mostly describes
64 character buffers. The only exception is nd_name from struct
o2nm_node.
Anyway I looked into it and in this case the domain string comes from
osb->uuid_str in ocfs2_setup_osb_uuid(). That's 32 characters and NULL
which easily fits into O2NM_MAX_NAME_LEN. This patch doesn't change how
the code works, but I think it makes the code a little cleaner.
Signed-off-by: Dan Carpenter <error27@gmail.com>
---
Or we could get rid of check entirely.
diff --git a/fs/ocfs2/dlm/dlmdomain.c b/fs/ocfs2/dlm/dlmdomain.c
index 6b5a492..084b051 100644
--- a/fs/ocfs2/dlm/dlmdomain.c
+++ b/fs/ocfs2/dlm/dlmdomain.c
@@ -1671,7 +1671,7 @@ struct dlm_ctxt * dlm_register_domain(const char *domain,
struct dlm_ctxt *dlm = NULL;
struct dlm_ctxt *new_ctxt = NULL;
- if (strlen(domain) > O2NM_MAX_NAME_LEN) {
+ if (strlen(domain) >= O2NM_MAX_NAME_LEN) {
ret = -ENAMETOOLONG;
mlog(ML_ERROR, "domain name length too long\n");
goto leave;
^ permalink raw reply related [flat|nested] 7+ messages in thread* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-10 14:33 [patch] ocfs2: tighten up strlen() checking Dan Carpenter @ 2010-07-12 11:30 ` Wengang Wang 2010-07-12 13:39 ` Dan Carpenter 2010-07-12 16:49 ` Sunil Mushran 2010-07-12 16:46 ` Sunil Mushran 2010-07-12 18:33 ` Joel Becker 2 siblings, 2 replies; 7+ messages in thread From: Wengang Wang @ 2010-07-12 11:30 UTC (permalink / raw) To: ocfs2-devel Hi Dan, I think O2NM_MAX_NAME_LEN is the max valid length of the domain name. Regarding your patch, it changed to be that a domain name with length O2NM_MAX_NAME_LEN (NULL character not included) is not permitted. Though that check seems useless for current calls, we'd better keep it. Checking the structure, 99 struct ocfs2_cluster_connection { 100 char cc_name[GROUP_NAME_MAX]; 101 int cc_namelen; cc_name is not a NULL tailed string. the cc_namelen specifies the length of it. There does is misuse of cc_name, such as 7 832 fs/ocfs2/stack_user.c <<user_cluster_connect>> rc = dlm_new_lockspace(conn->cc_name, strlen(conn->cc_name), 5 308 fs/ocfs2/stack_o2cb.c <<o2cb_cluster_connect>> dlm = dlm_register_domain(conn->cc_name, dlm_key, &fs_version); Also, the uuid shouldn't be treated as NULL tailed string. 142 struct ocfs2_control_message_down { 143 char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; 144 char space1; 145 char uuid[OCFS2_TEXT_UUID_LEN]; 146 char space2; thus, the calling of fs/ocfs2/stack_user.c:474: ocfs2_control_send_down(msg->uuid, nodenum); ->ocfs2_connection_find(uuid) ->size_t len = strlen(name); is suspectable. Could you please make patch for that instead? regards, wengang. On 10-07-10 16:33, Dan Carpenter wrote: > This function is only called from one place and it's like this: > dlm_register_domain(conn->cc_name, dlm_key, &fs_version); > > The "conn->cc_name" is 64 characters long. If strlen(conn->cc_name) > were equal to O2NM_MAX_NAME_LEN (64) that would be a bug because > strlen() doesn't count the NULL character. > > In fact, if you look how O2NM_MAX_NAME_LEN is used, it mostly describes > 64 character buffers. The only exception is nd_name from struct > o2nm_node. > > Anyway I looked into it and in this case the domain string comes from > osb->uuid_str in ocfs2_setup_osb_uuid(). That's 32 characters and NULL > which easily fits into O2NM_MAX_NAME_LEN. This patch doesn't change how > the code works, but I think it makes the code a little cleaner. > > Signed-off-by: Dan Carpenter <error27@gmail.com> > --- > Or we could get rid of check entirely. > > diff --git a/fs/ocfs2/dlm/dlmdomain.c b/fs/ocfs2/dlm/dlmdomain.c > index 6b5a492..084b051 100644 > --- a/fs/ocfs2/dlm/dlmdomain.c > +++ b/fs/ocfs2/dlm/dlmdomain.c > @@ -1671,7 +1671,7 @@ struct dlm_ctxt * dlm_register_domain(const char *domain, > struct dlm_ctxt *dlm = NULL; > struct dlm_ctxt *new_ctxt = NULL; > > - if (strlen(domain) > O2NM_MAX_NAME_LEN) { > + if (strlen(domain) >= O2NM_MAX_NAME_LEN) { > ret = -ENAMETOOLONG; > mlog(ML_ERROR, "domain name length too long\n"); > goto leave; ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-12 11:30 ` Wengang Wang @ 2010-07-12 13:39 ` Dan Carpenter 2010-07-12 14:31 ` Wengang Wang 2010-07-12 16:49 ` Sunil Mushran 1 sibling, 1 reply; 7+ messages in thread From: Dan Carpenter @ 2010-07-12 13:39 UTC (permalink / raw) To: ocfs2-devel On Mon, Jul 12, 2010 at 07:30:06PM +0800, Wengang Wang wrote: > Also, the uuid shouldn't be treated as NULL tailed string. > 142 struct ocfs2_control_message_down { > 143 char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; > 144 char space1; > 145 char uuid[OCFS2_TEXT_UUID_LEN]; > 146 char space2; The space1 and space2 characters are NULL terminators: From ocfs2_control_do_down_msg(): msg->space1 = msg->space2 = msg->newline = '\0'; I would have thought it had to be a "packed" struct, but it works because there are only chars in that struct. So that code is fine. regards, dan carpenter ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-12 13:39 ` Dan Carpenter @ 2010-07-12 14:31 ` Wengang Wang 0 siblings, 0 replies; 7+ messages in thread From: Wengang Wang @ 2010-07-12 14:31 UTC (permalink / raw) To: ocfs2-devel Hi Dan, On 10-07-12 15:39, Dan Carpenter wrote: > On Mon, Jul 12, 2010 at 07:30:06PM +0800, Wengang Wang wrote: > > Also, the uuid shouldn't be treated as NULL tailed string. > > 142 struct ocfs2_control_message_down { > > 143 char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; > > 144 char space1; > > 145 char uuid[OCFS2_TEXT_UUID_LEN]; > > 146 char space2; > > The space1 and space2 characters are NULL terminators: > > From ocfs2_control_do_down_msg(): > msg->space1 = msg->space2 = msg->newline = '\0'; > > I would have thought it had to be a "packed" struct, but it works > because there are only chars in that struct. So that code is fine. Yes, it is working fine. I would rather think that structure is misleading than smart :-D. I prefer this: struct ocfs2_control_message_down { char tag[OCFS2_CONTROL_MESSAGE_OP_LEN + 1]; #define space1 tag[OCFS2_CONTROL_MESSAGE_OP_LEN] char uuid[OCFS2_TEXT_UUID_LEN + 1]; #define space2 uuid[OCFS2_TEXT_UUID_LEN] .... regards, wengang. ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-12 11:30 ` Wengang Wang 2010-07-12 13:39 ` Dan Carpenter @ 2010-07-12 16:49 ` Sunil Mushran 1 sibling, 0 replies; 7+ messages in thread From: Sunil Mushran @ 2010-07-12 16:49 UTC (permalink / raw) To: ocfs2-devel So o2dlm expects a null terminated domain name. The original patch is good as it adds the check in o2dlm only. For userspace, we allow non-null terminating group (domain) name. That remains unchanged. On 07/12/2010 04:30 AM, Wengang Wang wrote: > Hi Dan, > > I think O2NM_MAX_NAME_LEN is the max valid length of the domain name. > Regarding your patch, it changed to be that a domain name with length > O2NM_MAX_NAME_LEN (NULL character not included) is not permitted. > > Though that check seems useless for current calls, we'd better keep it. > > Checking the structure, > > 99 struct ocfs2_cluster_connection { > 100 char cc_name[GROUP_NAME_MAX]; > 101 int cc_namelen; > > cc_name is not a NULL tailed string. the cc_namelen specifies the length of it. > There does is misuse of cc_name, such as > > > 7 832 fs/ocfs2/stack_user.c<<user_cluster_connect>> > rc = dlm_new_lockspace(conn->cc_name, strlen(conn->cc_name), > > 5 308 fs/ocfs2/stack_o2cb.c<<o2cb_cluster_connect>> > dlm = dlm_register_domain(conn->cc_name, dlm_key,&fs_version); > > Also, the uuid shouldn't be treated as NULL tailed string. > 142 struct ocfs2_control_message_down { > 143 char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; > 144 char space1; > 145 char uuid[OCFS2_TEXT_UUID_LEN]; > 146 char space2; > > thus, > the calling of > fs/ocfs2/stack_user.c:474: ocfs2_control_send_down(msg->uuid, nodenum); > ->ocfs2_connection_find(uuid) > ->size_t len = strlen(name); > > is suspectable. > > Could you please make patch for that instead? > > regards, > wengang. > > On 10-07-10 16:33, Dan Carpenter wrote: > >> This function is only called from one place and it's like this: >> dlm_register_domain(conn->cc_name, dlm_key,&fs_version); >> >> The "conn->cc_name" is 64 characters long. If strlen(conn->cc_name) >> were equal to O2NM_MAX_NAME_LEN (64) that would be a bug because >> strlen() doesn't count the NULL character. >> >> In fact, if you look how O2NM_MAX_NAME_LEN is used, it mostly describes >> 64 character buffers. The only exception is nd_name from struct >> o2nm_node. >> >> Anyway I looked into it and in this case the domain string comes from >> osb->uuid_str in ocfs2_setup_osb_uuid(). That's 32 characters and NULL >> which easily fits into O2NM_MAX_NAME_LEN. This patch doesn't change how >> the code works, but I think it makes the code a little cleaner. >> >> Signed-off-by: Dan Carpenter<error27@gmail.com> >> --- >> Or we could get rid of check entirely. >> >> diff --git a/fs/ocfs2/dlm/dlmdomain.c b/fs/ocfs2/dlm/dlmdomain.c >> index 6b5a492..084b051 100644 >> --- a/fs/ocfs2/dlm/dlmdomain.c >> +++ b/fs/ocfs2/dlm/dlmdomain.c >> @@ -1671,7 +1671,7 @@ struct dlm_ctxt * dlm_register_domain(const char *domain, >> struct dlm_ctxt *dlm = NULL; >> struct dlm_ctxt *new_ctxt = NULL; >> >> - if (strlen(domain)> O2NM_MAX_NAME_LEN) { >> + if (strlen(domain)>= O2NM_MAX_NAME_LEN) { >> ret = -ENAMETOOLONG; >> mlog(ML_ERROR, "domain name length too long\n"); >> goto leave; >> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-10 14:33 [patch] ocfs2: tighten up strlen() checking Dan Carpenter 2010-07-12 11:30 ` Wengang Wang @ 2010-07-12 16:46 ` Sunil Mushran 2010-07-12 18:33 ` Joel Becker 2 siblings, 0 replies; 7+ messages in thread From: Sunil Mushran @ 2010-07-12 16:46 UTC (permalink / raw) To: ocfs2-devel Acked-by: Sunil Mushran <sunil.mushran@oracle.com> On 07/10/2010 07:33 AM, Dan Carpenter wrote: > This function is only called from one place and it's like this: > dlm_register_domain(conn->cc_name, dlm_key,&fs_version); > > The "conn->cc_name" is 64 characters long. If strlen(conn->cc_name) > were equal to O2NM_MAX_NAME_LEN (64) that would be a bug because > strlen() doesn't count the NULL character. > > In fact, if you look how O2NM_MAX_NAME_LEN is used, it mostly describes > 64 character buffers. The only exception is nd_name from struct > o2nm_node. > > Anyway I looked into it and in this case the domain string comes from > osb->uuid_str in ocfs2_setup_osb_uuid(). That's 32 characters and NULL > which easily fits into O2NM_MAX_NAME_LEN. This patch doesn't change how > the code works, but I think it makes the code a little cleaner. > > Signed-off-by: Dan Carpenter<error27@gmail.com> > --- > Or we could get rid of check entirely. > > diff --git a/fs/ocfs2/dlm/dlmdomain.c b/fs/ocfs2/dlm/dlmdomain.c > index 6b5a492..084b051 100644 > --- a/fs/ocfs2/dlm/dlmdomain.c > +++ b/fs/ocfs2/dlm/dlmdomain.c > @@ -1671,7 +1671,7 @@ struct dlm_ctxt * dlm_register_domain(const char *domain, > struct dlm_ctxt *dlm = NULL; > struct dlm_ctxt *new_ctxt = NULL; > > - if (strlen(domain)> O2NM_MAX_NAME_LEN) { > + if (strlen(domain)>= O2NM_MAX_NAME_LEN) { > ret = -ENAMETOOLONG; > mlog(ML_ERROR, "domain name length too long\n"); > goto leave; > ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [patch] ocfs2: tighten up strlen() checking 2010-07-10 14:33 [patch] ocfs2: tighten up strlen() checking Dan Carpenter 2010-07-12 11:30 ` Wengang Wang 2010-07-12 16:46 ` Sunil Mushran @ 2010-07-12 18:33 ` Joel Becker 2 siblings, 0 replies; 7+ messages in thread From: Joel Becker @ 2010-07-12 18:33 UTC (permalink / raw) To: ocfs2-devel On Sat, Jul 10, 2010 at 04:33:36PM +0200, Dan Carpenter wrote: > This function is only called from one place and it's like this: > dlm_register_domain(conn->cc_name, dlm_key, &fs_version); > > The "conn->cc_name" is 64 characters long. If strlen(conn->cc_name) > were equal to O2NM_MAX_NAME_LEN (64) that would be a bug because > strlen() doesn't count the NULL character. > > In fact, if you look how O2NM_MAX_NAME_LEN is used, it mostly describes > 64 character buffers. The only exception is nd_name from struct > o2nm_node. > > Anyway I looked into it and in this case the domain string comes from > osb->uuid_str in ocfs2_setup_osb_uuid(). That's 32 characters and NULL > which easily fits into O2NM_MAX_NAME_LEN. This patch doesn't change how > the code works, but I think it makes the code a little cleaner. > > Signed-off-by: Dan Carpenter <error27@gmail.com> This patch is now in the fixes branch of ocfs2.git. Joel -- Viro's Razor: Any race condition, no matter how unlikely, will occur just often enough to bite you. Joel Becker Consulting Software Developer Oracle E-mail: joel.becker@oracle.com Phone: (650) 506-8127 ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2010-07-12 18:33 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2010-07-10 14:33 [patch] ocfs2: tighten up strlen() checking Dan Carpenter 2010-07-12 11:30 ` Wengang Wang 2010-07-12 13:39 ` Dan Carpenter 2010-07-12 14:31 ` Wengang Wang 2010-07-12 16:49 ` Sunil Mushran 2010-07-12 16:46 ` Sunil Mushran 2010-07-12 18:33 ` Joel Becker
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox