From: Jaegeuk Kim <jaegeuk@kernel.org>
To: Chao Yu <chao2.yu@samsung.com>
Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-f2fs-devel@lists.sourceforge.net
Subject: Re: [PATCH 1/2] f2fs: check name_len of dir entry to prevent from deadloop
Date: Mon, 7 Jul 2014 22:56:13 -0700 [thread overview]
Message-ID: <20140708055613.GA37622@jmac.local> (raw)
In-Reply-To: <005f01cf9982$4b8920f0$e29b62d0$@samsung.com>
On Mon, Jul 07, 2014 at 09:24:05AM +0800, Chao Yu wrote:
> Hi Jaegeuk,
>
> > -----Original Message-----
> > From: Jaegeuk Kim [mailto:jaegeuk@kernel.org]
> > Sent: Saturday, July 05, 2014 2:43 PM
> > To: Chao Yu
> > Cc: Changman Lee; linux-f2fs-devel@lists.sourceforge.net; linux-fsdevel@vger.kernel.org;
> > linux-kernel@vger.kernel.org
> > Subject: Re: [f2fs-dev][PATCH 1/2] f2fs: check name_len of dir entry to prevent from deadloop
> >
> > Hi Chao,
> >
> > On Wed, Jul 02, 2014 at 01:23:47PM +0800, Chao Yu wrote:
> > > We assume that modification of some special application could result in zeroed
> > > name_len, or it is consciously made by somebody. We will deadloop in
> > > find_in_block when name_len of dir entry is zero.
> >
> > Could you explain this a little bit more?
> > I'm not sure how it can happen.
>
> IMO,
> On one hand, programs like mkfs/fsck/img2simg and f2fs could directly operate
> the raw device, so bugs of these software may be triggered to generate the
> corrupt data such as zeroed name_len.
Well...
If such the programs try to corrupt the f2fs image crucially, the bug should be
fixed inside the programs, not from the workaround through f2fs.
As I mentioned, even though f2fs avoids such the dead loop whatever at that
moment, it will be operating with inconsistent file system status, resulting
in system crash in the near furture finally.
Why should we avoid this specific case only?
It seems that it is a kinda intentional user-made case.
Is it really normal?
> On the other hand, it' could be treated as a potential security problem, because
> user could crafted such a malicious image include zeroed name_len for hacking purpose.
If user can try to do something like that, why do they write zeroed name_len only?
To crash the system, they can do everything.
Thanks,
> Once such special image is being mounted, deadloop could be triggered, finally will
> result in effecting on linux system's running.
>
> Thanks,
> Yu
>
> > I think the zeroed name_len would cause some problems in f2fs_add_link.
> >
> > Thanks,
> >
> > >
> > > This patch is added for preventing deadloop in above scenario.
> > >
> > > Signed-off-by: Chao Yu <chao2.yu@samsung.com>
> > > ---
> > > fs/f2fs/dir.c | 10 ++++++++++
> > > 1 file changed, 10 insertions(+)
> > >
> > > diff --git a/fs/f2fs/dir.c b/fs/f2fs/dir.c
> > > index be8c7af..4316ec5 100644
> > > --- a/fs/f2fs/dir.c
> > > +++ b/fs/f2fs/dir.c
> > > @@ -121,6 +121,16 @@ static struct f2fs_dir_entry *find_in_block(struct page *dentry_page,
> > > }
> > > }
> > >
> > > + /* check name_len to prevent from deadloop here */
> > > + if (unlikely(de->name_len == 0)) {
> > > + struct inode *inode = dentry_page->mapping->host;
> > > +
> > > + f2fs_msg(inode->i_sb, KERN_ERR,
> > > + "zero-length dir entry, ino = %lu, name = %s",
> > > + (unsigned long)inode->i_ino, name->name);
> > > + break;
> > > + }
> > > +
> > > bit_start = bit_pos
> > > + GET_DENTRY_SLOTS(le16_to_cpu(de->name_len));
> > > }
> > > --
> > > 1.7.9.5
> >
> > --
> > Jaegeuk Kim
--
Jaegeuk Kim
------------------------------------------------------------------------------
Open source business process management suite built on Java and Eclipse
Turn processes into business applications with Bonita BPM Community Edition
Quickly connect people, data, and systems into organized workflows
Winner of BOSSIE, CODIE, OW2 and Gartner awards
http://p.sf.net/sfu/Bonitasoft
next prev parent reply other threads:[~2014-07-08 5:56 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-07-02 5:23 [f2fs-dev][PATCH 1/2] f2fs: check name_len of dir entry to prevent from deadloop Chao Yu
2014-07-05 6:43 ` Jaegeuk Kim
2014-07-07 1:24 ` [PATCH " Chao Yu
2014-07-08 5:56 ` Jaegeuk Kim [this message]
2014-07-09 2:57 ` Chao Yu
2014-07-09 13:47 ` [f2fs-dev][PATCH " Jaegeuk Kim
2014-07-10 4:18 ` [PATCH " Chao Yu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140708055613.GA37622@jmac.local \
--to=jaegeuk@kernel.org \
--cc=chao2.yu@samsung.com \
--cc=linux-f2fs-devel@lists.sourceforge.net \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).