From: Brian Foster <bfoster@redhat.com>
To: Gao Xiang <hsiangkao@redhat.com>
Cc: linux-xfs@vger.kernel.org
Subject: Re: [PATCH v2] xfs: avoid LR buffer overrun due to crafted h_len
Date: Wed, 2 Sep 2020 13:38:59 -0400 [thread overview]
Message-ID: <20200902173859.GD289426@bfoster> (raw)
In-Reply-To: <20200902141923.26422-1-hsiangkao@redhat.com>
On Wed, Sep 02, 2020 at 10:19:23PM +0800, Gao Xiang wrote:
> Currently, crafted h_len has been blocked for the log
> header of the tail block in commit a70f9fe52daa ("xfs:
> detect and handle invalid iclog size set by mkfs").
>
Ok, so according to that commit log the original purpose of this code
was to work around a quirky mkfs condition where record length of an
unmount record was enlarged but the iclog buffer size remained at 32k.
The fix is to simply increase the size of iclog buf.
> However, each log record could still have crafted
> h_len and cause log record buffer overrun. So let's
> check h_len for each log record as well instead.
>
Is this something you've observed or attempted to reproduce, or is this
based on code inspection?
> Signed-off-by: Gao Xiang <hsiangkao@redhat.com>
> ---
> v2: fix a misjudgement "unlikely(hlen >= hsize)"
>
> fs/xfs/xfs_log_recover.c | 70 +++++++++++++++++++++-------------------
> 1 file changed, 37 insertions(+), 33 deletions(-)
>
> diff --git a/fs/xfs/xfs_log_recover.c b/fs/xfs/xfs_log_recover.c
> index e2ec91b2d0f4..2d9195fb9367 100644
> --- a/fs/xfs/xfs_log_recover.c
> +++ b/fs/xfs/xfs_log_recover.c
> @@ -2904,7 +2904,8 @@ STATIC int
> xlog_valid_rec_header(
> struct xlog *log,
> struct xlog_rec_header *rhead,
> - xfs_daddr_t blkno)
> + xfs_daddr_t blkno,
> + int hsize)
> {
> int hlen;
>
> @@ -2920,10 +2921,39 @@ xlog_valid_rec_header(
> return -EFSCORRUPTED;
> }
>
> - /* LR body must have data or it wouldn't have been written */
> + /*
> + * LR body must have data (or it wouldn't have been written) and
> + * h_len must not be greater than h_size with one exception.
> + *
> + * That is that xfsprogs has a bug where record length is based on
> + * lsunit but h_size (iclog size) is hardcoded to 32k. This means
> + * the log buffer allocated can be too small for the record to
> + * cause an overrun.
> + *
> + * Detect this condition here. Use lsunit for the buffer size as
> + * long as this looks like the mkfs case. Otherwise, return an
> + * error to avoid a buffer overrun.
> + */
> hlen = be32_to_cpu(rhead->h_len);
> - if (XFS_IS_CORRUPT(log->l_mp, hlen <= 0 || hlen > INT_MAX))
> + if (XFS_IS_CORRUPT(log->l_mp, hlen <= 0))
Why is the second part of the check removed?
> return -EFSCORRUPTED;
> +
> + if (hsize && XFS_IS_CORRUPT(log->l_mp,
> + hsize < be32_to_cpu(rhead->h_size)))
> + return -EFSCORRUPTED;
> + hsize = be32_to_cpu(rhead->h_size);
I'm a little confused why we take hsize as a parameter as well as read
it from the record header. If we're validating a particular record,
shouldn't we use the size as specified by that record?
Also FWIW I think pulling bits of logic out of the XFS_IS_CORRUPT()
check makes this a little harder to read than just putting the entire
logic statement within the macro.
> +
> + if (unlikely(hlen > hsize)) {
I think we've made a point to avoid the [un]likely() modifiers in XFS as
they don't usually have a noticeable impact. I certainly wouldn't expect
it to in log recovery.
> + if (XFS_IS_CORRUPT(log->l_mp, hlen > log->l_mp->m_logbsize ||
> + rhead->h_num_logops != cpu_to_be32(1)))
> + return -EFSCORRUPTED;
> +
> + xfs_warn(log->l_mp,
> + "invalid iclog size (%d bytes), using lsunit (%d bytes)",
> + hsize, log->l_mp->m_logbsize);
> + rhead->h_size = cpu_to_be32(log->l_mp->m_logbsize);
I also find updating the header structure as such down in a "validation
helper" a bit obscured.
> + }
> +
> if (XFS_IS_CORRUPT(log->l_mp,
> blkno > log->l_logBBsize || blkno > INT_MAX))
> return -EFSCORRUPTED;
...
> @@ -3096,7 +3100,7 @@ xlog_do_recovery_pass(
> }
> rhead = (xlog_rec_header_t *)offset;
> error = xlog_valid_rec_header(log, rhead,
> - split_hblks ? blk_no : 0);
> + split_hblks ? blk_no : 0, h_size);
> if (error)
> goto bread_err2;
>
> @@ -3177,7 +3181,7 @@ xlog_do_recovery_pass(
> goto bread_err2;
>
> rhead = (xlog_rec_header_t *)offset;
> - error = xlog_valid_rec_header(log, rhead, blk_no);
> + error = xlog_valid_rec_header(log, rhead, blk_no, h_size);
> if (error)
> goto bread_err2;
In these two cases we've already allocated the record header and data
buffers and we're walking through the log records doing recovery. Given
that, it seems like the purpose of the parameter is more to check the
subsequent records against the size of the current record buffer. That
seems like a reasonable check to incorporate, but I think the mkfs
workaround logic is misplaced in a generic record validation helper.
IIUC that is a very special case that should only apply to the first
record in the log and only impacts the size of the buffer we allocate to
read in the remaining records.
Can we rework this to leave the mkfs workaround logic as is and update
the validation helper to check that each record length fits in the size
of the buffer we've decided to allocate? I'd also suggest to rename the
new parameter to something like 'bufsize' instead of 'h_size' to clarify
what it actually means in the context of xlog_valid_rec_header().
Brian
>
> --
> 2.18.1
>
next prev parent reply other threads:[~2020-09-02 17:39 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-02 14:10 [PATCH] xfs: avoid LR buffer overrun due to crafted h_len Gao Xiang
2020-09-02 14:19 ` [PATCH v2] " Gao Xiang
2020-09-02 17:38 ` Brian Foster [this message]
2020-09-02 22:47 ` Gao Xiang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200902173859.GD289426@bfoster \
--to=bfoster@redhat.com \
--cc=hsiangkao@redhat.com \
--cc=linux-xfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox