From: Ingo Molnar <mingo@elte.hu>
To: Li Zefan <lizf@cn.fujitsu.com>,
"Alan D. Brunelle" <alan.brunelle@hp.com>,
Steven Rostedt <rostedt@goodmis.org>
Cc: Jens Axboe <jens.axboe@oracle.com>,
Arnaldo Carvalho de Melo <acme@redhat.com>,
Steven Rostedt <rostedt@goodmis.org>,
Frederic Weisbecker <fweisbec@gmail.com>,
FUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>,
LKML <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] blktrace: fix pdu_len when tracing packet command requests
Date: Fri, 3 Apr 2009 15:57:36 +0200 [thread overview]
Message-ID: <20090403135736.GC8875@elte.hu> (raw)
In-Reply-To: <49D4507E.2060602@cn.fujitsu.com>
* Li Zefan <lizf@cn.fujitsu.com> wrote:
> Since commit d7e3c3249ef23b4617393c69fe464765b4ff1645 ("block: add
> large command support"), struct request->cmd has been changed from
> unsinged char cmd[BLK_MAX_CDB] to unsigned char *cmd.
>
> v1 -> v2:
> - make sure rq->cmd_len is always intialized, and then we can use
> rq->cmd_len instead of BLK_MAX_CDB.
Thanks. I've added a 'v2-by: FUJITA Tomonori' and the Ack from
Fujita-san as well to document the precise lineage of the fix.
Note: there's an important robustness and security issue to check
before we can apply this fully.
variable-size records are always tricky and need a full audit of the
software stack.
rq->cmd_len comes from sg device ioctls, and the sg command header
can have an arbitrary value for sg_io_v4::header_len. The only limit
in the block layer at the moment is that it must fit into a single
kmalloc() - and that - in theory - can be very large.
So:
1) the ftrace ring-buffer code has to be checked (does it work well
with larger than 4K records). Steve .. how well will it work?
2) and the user-space blktrace+blkparse code has to be checked for
overflows and static sizes as well. Jens, Alan?
I had a quick look at the user-space code. It seems mostly fine.
There appears to be one minor bug in blkrawverify.c:
pdu_buf = malloc(bit->pdu_len);
n = fread(pdu_buf, bit->pdu_len, 1, ifp);
if (n == 0) {
INC_BAD("bad pdu");
malloc() can return NULL under memory pressure - shouldnt we
check it for NULL instead of passing it to fread()?
Oh, there does seem to be a buffer-overflow problem in
blkparse_fmt.c:
static char *dump_pdu(unsigned char *pdu_buf, int pdu_len)
{
static char p[4096];
int i, len;
if (!pdu_buf || !pdu_len)
return NULL;
for (len = 0, i = 0; i < pdu_len; i++) {
if (i)
len += sprintf(p + len, " ");
len += sprintf(p + len, "%02x", pdu_buf[i]);
[...]
that p[4096] is a buffer-overflow if the pdu_len goes over 4096.
This is a small potential security issue if we apply this patch.
Should be changed to malloc(pdu_len) instead.
( Relatively small because SG_IO ioctls are not normally allowed
to unprivileged users so generating intentionally large packets
to exploit a sysadmin running blkparse seems like a stretch of
a threat model. )
Anyway, this needs to be fixed and fully audited, as we can
literally get a 128K packet traced here - even though the hardware
itself wont be able to do much with it - most packet commands are in
the few bytes range up to 16 bytes typically - but the blktrace
layer will forward it.
Please double-check that blkparse is not surprised by the
(now-again-) variable length packet command output either.
>From v2.6.26 on we only emitted the first 4/8 bytes depending on
bitness.
Thanks,
Ingo
next prev parent reply other threads:[~2009-04-03 13:58 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-04-02 2:17 [PATCH] blktrace: fix pdu_len when tracing packet command requests Li Zefan
2009-04-02 3:28 ` FUJITA Tomonori
2009-04-02 3:43 ` Li Zefan
2009-04-02 5:43 ` Li Zefan
2009-04-03 13:57 ` Ingo Molnar [this message]
2009-04-07 2:09 ` Li Zefan
2009-04-03 14:24 ` [tip:tracing/blktrace-v2] " Li Zefan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090403135736.GC8875@elte.hu \
--to=mingo@elte.hu \
--cc=acme@redhat.com \
--cc=alan.brunelle@hp.com \
--cc=fujita.tomonori@lab.ntt.co.jp \
--cc=fweisbec@gmail.com \
--cc=jens.axboe@oracle.com \
--cc=linux-kernel@vger.kernel.org \
--cc=lizf@cn.fujitsu.com \
--cc=rostedt@goodmis.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox