From: Alex Elder <aelder@sgi.com>
To: Ben Hutchings <ben@decadent.org.uk>
Cc: Carlos Maiolino <cmaiolino@redhat.com>, xfs@oss.sgi.com
Subject: Re: [PATCH] Fix possible memory corruption in xfs_readlink
Date: Wed, 2 Nov 2011 12:52:19 -0500 [thread overview]
Message-ID: <1320256339.3145.30.camel@doink> (raw)
In-Reply-To: <1320156842.30281.28.camel@deadeye>
I don't konw why, but I *think* the response I
thought I sent earlier didn't actually make it
out.
Just in case, I'm trying to recreate what I had
before, below. Sorry if something like this
shows up twice.
On Tue, 2011-11-01 at 14:14 +0000, Ben Hutchings wrote:
> On Tue, 2011-10-18 at 02:18 -0200, Carlos Maiolino wrote:
> > Fixes a possible memory corruption when the link is larger than
> > MAXPATHLEN and XFS_DEBUG is not enabled. This also remove the
> > S_ISLNK assert, since the inode mode is checked previously in
> > xfs_readlink_by_handle() and via VFS.
> >
> > Signed-off-by: Carlos Maiolino <cmaiolino@redhat.com>
> > ---
> > fs/xfs/xfs_vnodeops.c | 11 ++++++++---
> > 1 files changed, 8 insertions(+), 3 deletions(-)
A few comments inline below, followed by Ben's original
message and some explanation from me.
> > diff --git a/fs/xfs/xfs_vnodeops.c b/fs/xfs/xfs_vnodeops.c
> > index 51fc429..c3288be 100644
> > --- a/fs/xfs/xfs_vnodeops.c
> > +++ b/fs/xfs/xfs_vnodeops.c
> > @@ -123,13 +123,18 @@ xfs_readlink(
> >
> > xfs_ilock(ip, XFS_ILOCK_SHARED);
> >
> > - ASSERT(S_ISLNK(ip->i_d.di_mode));
> > - ASSERT(ip->i_d.di_size <= MAXPATHLEN);
> > -
> > pathlen = ip->i_d.di_size;
> pathlen is a signed int (32-bit) and di_size has signed 64-bit type.
I concur, di_size here is an xfs_fsize_t, which is defined
as __int64_t (a signed 64-bit integer). pathlen is defined
as a (signed) int.
> So, even if di_size was verified to be non-negative earlier (is it?)...
More on this question below.
> > if (!pathlen)
> > goto out;
> >
> > + if (pathlen > MAXPATHLEN) {
>
> ...pathlen may be negative here and will pass this check.
>
> Ben.
You are right to call attention to this. I think defining
pathlen to be an int here is a mistake in any case (the type
ought to match that of id.di_size), though in practice it
will not be a problem.
You mention two remaining issues:
- can a value held in ip->i_d.di_size result in a negative
value in pathlen as a result of the assignment?
- is ip->i_d.di_size guaranteed (verified) to be non-negative?
On the first question, the C standard says that the result of
the assignment--if id.di_size exceeds what can be represented
by pathlen--is implementation defined, therefore it is not
safe. So you're right, this needs to be fixed.
On the second question, ip->i_d.di_size is assigned
in a lot of places. I started looking at all the
places where this field gets assigned. In about half
of them I examined the assignment obviously left its
value non-negative, or only allowing a negative assignment
if the previous value was already negative.
But rather than complete this research task, I think
it will be better (for now) to simply check for a negative
ip->i_d.di_size, and if it's seen, either return
an error or initiate a forced shutdown (since it
represents corruption).
I'm interested in what others think.
-Alex
> > + xfs_alert(mp, "%s: inode (%llu) symlink length (%d) too long",
> > + __func__, (unsigned long long)ip->i_ino, pathlen);
> > + ASSERT(0);
> > + return XFS_ERROR(EFSCORRUPTED);
> > + }
> > +
> > +
> > if (ip->i_df.if_flags & XFS_IFINLINE) {
> > memcpy(link, ip->i_df.if_u1.if_data, pathlen);
> > link[pathlen] = '\0';
>
> _______________________________________________
> xfs mailing list
> xfs@oss.sgi.com
> http://oss.sgi.com/mailman/listinfo/xfs
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
next prev parent reply other threads:[~2011-11-02 17:52 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-11-01 14:14 [PATCH] Fix possible memory corruption in xfs_readlink Ben Hutchings
2011-11-02 17:52 ` Alex Elder [this message]
2011-11-02 19:45 ` Christoph Hellwig
2011-11-02 20:22 ` Alex Elder
2011-11-07 16:10 ` [PATCH, updated] xfs: " Alex Elder
2011-11-07 16:31 ` Carlos Maiolino
2011-11-08 14:38 ` Christoph Hellwig
-- strict thread matches above, loose matches on Subject: below --
2011-10-18 4:18 [PATCH] " Carlos Maiolino
2011-10-18 6:52 ` Christoph Hellwig
2011-10-18 13:59 ` Alex Elder
2011-10-18 14:25 ` Eric Sandeen
2011-10-17 21:05 Carlos Maiolino
2011-10-17 22:39 ` Alex Elder
2011-10-17 22:43 ` Dave Chinner
2011-10-18 1:28 ` Carlos Maiolino
2011-10-17 15:30 Carlos Maiolino
2011-10-17 14:00 ` Christoph Hellwig
2011-10-17 17:24 ` Eric Sandeen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1320256339.3145.30.camel@doink \
--to=aelder@sgi.com \
--cc=ben@decadent.org.uk \
--cc=cmaiolino@redhat.com \
--cc=xfs@oss.sgi.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox