lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20120711200557.GB5838@thunk.org> Date: Wed, 11 Jul 2012 16:05:57 -0400 From: Theodore Ts'o <tytso@....edu> To: Eric Sandeen <sandeen@...hat.com> Cc: Gordan Bobic <gordan@...ich.net>, linux-ext4@...r.kernel.org Subject: Re: e2fsprogs alignment issues On Wed, Jul 11, 2012 at 10:04:51AM -0500, Eric Sandeen wrote: > On 7/11/12 8:20 AM, Gordan Bobic wrote: > > I would like to bring the following bug report to people's > > attention: > > > > https://bugzilla.redhat.com/show_bug.cgi?id=680090 > > > > The issue is that the code used in e2fsprogs WRT allocating unaligned > > buffers and then casting them into structs is non-portable and > > dangerous - eyewateringly dangerous in something like e2fsprogs where > > it can lead to thorough trashing of the file system. I think you're being a bit over-dramatic here; can you point out a place where this is actually going to lead to "trashing of the file system"? I will observe that being able to derefrence unaligned pointers is something that Linus has said any architecture which does *not* provide fixups is probably doomed to fail. There's an awful lot of userspace code out there which assumes this works. Doing a quick grep, I'm seeing code in the blkid library (which has now been moved into util-linux) which does this. I'm also seeing one case of it in the tdb library (which we imported from Samba). That being said, doing fixups is slow since it requires a kernel fault, and I have no problem with trying to avoid this practice. > > Can something be done to improve the portability of the userspace > > code? Yes, someone can send me patches. :-) Ranting and raving about how file systems are being trashed will be met with the observation that no one has actually reported this. And this won't be the only place where the Linux kernel code makes assumptions which are not guaranteed by the C standard, but the official position that Linus has taken is any architecture (or C compiler) is insane, and it's up to the architecture to provide workarounds. > Many of these are the result of things like: > > char buf[4096] = ""; > struct fiemap *fiemap = (struct fiemap *)buf; > > > Ted, is this construct just an attempt to avoid malloc/free for > simplicity of the code? Probably; it's the way Kalpak Shaw wrote the code when he submitted it. And while I do have higher standards of portability that the Linux kernel, this is not one of the things that I test for. Please do note that malloc() is guaranteed to return a block of memory which satisifies the worse case alignment requirements of the architecture, so there are plenty of places where we cast a buffer pointer to an int * or a struct * which are completely safe. It's only when someone is allocating space on the stack where this is potentially problematic. > I think Gordan suggested (if I understand it > right) that doing an array of ints might also solve the problem, since > ints should be on natural alignment. Or maybe in some cases malloc/free > would be more obvious, if handling errors isn't too tricky. In the specific case which Gordon has pointed out, the obvious thing to do is to just to set errno to ENOMEM, and return -1. since we already reflect an error code up to the caller if the FIEMAP ioctl() fails. If someone sends me the patch, I will happily apply it. > (IIRC "make gcc-wall" will also emit warnings for casts which change > natural alignment, among other things) I'd have to check to be sure, but I don't think so, since it would have way too many false positives. We *do* have code where we take char *'s and and then cast them to some other pointer type, and then dereference them. And we do currently assume that it is safe to do this for on-disk data structures which are 4 byte aligned, in the directory entry code, for example. I will *not* accept a patch which uses memcpy to copy each field in the on-disk superblock, or directory entry, into an int, just in case there is some insane architecture which requires that 4 byte integers be 32-byte aligned, or something else insane like that. What we are currently doing may not be 100% portable, but we're not going to penalize sane archiectures like x86 just because there might be some future insane architecture that requires 32-byte aligned ints! All the ranting in the world about how this could hypothetically cause file system corruption on said insane architecture will just cause me to laugh at you. But that being said, changing places where we allocate a char [] buffer on the stack and assuming that it is 4-byte aligned does seem reasonable. But I see this as an optimization issue more than I do a performance issue.... Regards, - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists