Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp494235ybt; Fri, 19 Jun 2020 06:50:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8Wgxzl2H6NBO5aFLVbw70evKRDwBo/L0wSLZy6P7m/jbZQhaRqqQQ+ltipUtzdjEvVmRp X-Received: by 2002:a17:906:480f:: with SMTP id w15mr3762055ejq.430.1592574646892; Fri, 19 Jun 2020 06:50:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592574646; cv=none; d=google.com; s=arc-20160816; b=s6sorQRRCC1yBqfzcqYojCxppU7FHfUTjPtKRzNSLMCxedK1ptENmw8fPCMhyiZDxE w53h2Z07DTKjon2y9iwSjsU3dpVZcVjICZG41h1TwfqGpJySWNpp2nO026Aag1LO36oj SXkzeDOVfgQNSEI8+QlV92eHZOeu/d2atU9N7wFvd7/uebFbfV4pIRtMNw3kIH/Uf/w3 9TnnhFMG6KASnrwCp06G0MnQ/jAYOZmQ/GDUmuIKL6TRUq18zWGDkm5GxxdludXQADnO 23GtIL2Bnt7/iapmBUrhGi4dJvvrhM1c1QYoxgBFh236RIulFxie8WtBmdJKw3yuo/0f /F9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=+DStQd2M4nkvpjOo2sjd9+T7hIeWtz85K6XI661TuCM=; b=C7CYNO1k+XROR+F33vgOhn5ILGV/OwYE8pXjF3RSEKYjt0koFBgJXMRt+t4cd5jG4W uiOVCURgjy3uSJswe7z1UGxyBTFC6QEkHNHtWGy6KjE+b2lbEA3pNeE5+1x8VMxL4zKB 3FNA4NWKLlmg0nv8kA+l4owhOM7VtSU9cLyrr3FDHaKsoymieTqd3cH66HYwxGlnRja2 gCfOKKyjK8IhlpLfJi8AG5AQUCCKV7KHrh7ni3zmW2emZOsUKjpC9tfc4791RpICi9H4 ATmhEv4+xpQ2DdCmWajMZRzppL76jq9m51+F4FqIPQJcvcIk0+v4t/D8GEvpRcGakrki H4FA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bXrB2F5l; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m17si3930273eji.138.2020.06.19.06.50.18; Fri, 19 Jun 2020 06:50:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bXrB2F5l; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732953AbgFSNte (ORCPT + 99 others); Fri, 19 Jun 2020 09:49:34 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:28936 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1732007AbgFSNtd (ORCPT ); Fri, 19 Jun 2020 09:49:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1592574571; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+DStQd2M4nkvpjOo2sjd9+T7hIeWtz85K6XI661TuCM=; b=bXrB2F5lAYt8NQbIAkZELjO7HncE3aQs4iHsIKvhdx90wnPuwEkIFsL6N3EVpBd8TZxGhk hkyop6KOvnC/IGD7mBJkaHqO6ghdlNusvtwAMRmn23ghc58yNdoG3TVin0Hhk+AXVfk5o/ xY2GHeZP6AhQSu/1/L23lYjH1Kf2sPo= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-485-PtZzNik5MiOkPQ_NODQFtA-1; Fri, 19 Jun 2020 09:49:25 -0400 X-MC-Unique: PtZzNik5MiOkPQ_NODQFtA-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 3D5E48015CB; Fri, 19 Jun 2020 13:49:24 +0000 (UTC) Received: from work (unknown [10.40.192.238]) by smtp.corp.redhat.com (Postfix) with ESMTPS id AA18319D7B; Fri, 19 Jun 2020 13:49:20 +0000 (UTC) Date: Fri, 19 Jun 2020 15:49:16 +0200 From: Lukas Czerner To: Eric Sandeen Cc: Eric Sandeen , "linux-ext4@vger.kernel.org" Subject: Re: [PATCH 1/1] ext4: fix potential negative array index in do_split() Message-ID: <20200619134916.sca323ib4y3e432o@work> References: <20200619064122.vj346xptid5viogv@work> <20200619070854.z3dslhh7yebainhd@work> <3a956d48-88b9-5c54-3d49-fc772db29258@sandeen.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3a956d48-88b9-5c54-3d49-fc772db29258@sandeen.net> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Fri, Jun 19, 2020 at 08:42:23AM -0500, Eric Sandeen wrote: > On 6/19/20 2:08 AM, Lukas Czerner wrote: > > On Fri, Jun 19, 2020 at 08:41:22AM +0200, Lukas Czerner wrote: > >> On Wed, Jun 17, 2020 at 02:19:04PM -0500, Eric Sandeen wrote: > >>> If for any reason a directory passed to do_split() does not have enough > >>> active entries to exceed half the size of the block, we can end up > >>> iterating over all "count" entries without finding a split point. > >>> > >>> In this case, count == move, and split will be zero, and we will > >>> attempt a negative index into map[]. > >>> > >>> Guard against this by detecting this case, and falling back to > >>> split-to-half-of-count instead; in this case we will still have > >>> plenty of space (> half blocksize) in each split block. > >>> > >>> Fixes: ef2b02d3e617 ("ext34: ensure do_split leaves enough free space in both blocks") > >>> Signed-off-by: Eric Sandeen > >>> --- > >>> > >>> diff --git a/fs/ext4/namei.c b/fs/ext4/namei.c > >>> index a8aca4772aaa..8b60881f07ee 100644 > >>> --- a/fs/ext4/namei.c > >>> +++ b/fs/ext4/namei.c > >>> @@ -1858,7 +1858,7 @@ static struct ext4_dir_entry_2 *do_split(handle_t *handle, struct inode *dir, > >>> blocksize, hinfo, map); > >>> map -= count; > >>> dx_sort_map(map, count); > >>> - /* Split the existing block in the middle, size-wise */ > >>> + /* Ensure that neither split block is over half full */ > >>> size = 0; > >>> move = 0; > >>> for (i = count-1; i >= 0; i--) { > >>> @@ -1868,8 +1868,18 @@ static struct ext4_dir_entry_2 *do_split(handle_t *handle, struct inode *dir, > >>> size += map[i].size; > >>> move++; > >>> } > >>> - /* map index at which we will split */ > >>> - split = count - move; > >>> + /* > >>> + * map index at which we will split > >>> + * > >>> + * If the sum of active entries didn't exceed half the block size, just > >>> + * split it in half by count; each resulting block will have at least > >>> + * half the space free. > >>> + */ > >>> + if (i > 0) > >>> + split = count - move; > >>> + else > >>> + split = count/2; > >> > >> Won't we have exactly the same problem as we did before your commit > >> ef2b02d3e617cb0400eedf2668f86215e1b0e6af ? Since we do not know how much > >> space we actually moved we might have not made enough space for the new > >> entry ? > >> > >> Also since we have the move == count when the problem appears then it's > >> clear that we never hit the condition > >> > >> 1865 → → /* is more than half of this entry in 2nd half of the block? */ > >> 1866 → → if (size + map[i].size/2 > blocksize/2) > >> 1867 → → → break; > >> > >> in the loop. This is surprising but it means the the entries must have > >> gaps between them that are small enough that we can't fit the entry > >> right in ? Should not we try to compact it before splitting, or is it > >> the case that this should have been done somewhere else ? > > > > The other possibility is that map[i].size is not right and indeed there > > seems to be a bug in dx_make_map() > > > > map_tail->size = le16_to_cpu(de->rec_len); > > > > should be > > > > map_tail->size = ext4_rec_len_from_disk(de->rec_len, blocksize)); > > > > right ? Otherwise with large enough records the size will be smaller > > than it really is. > > well, those are the same thing unless (PAGE_SIZE >= 65536) so I don't > think that's the issue here. > > static inline unsigned int > ext4_rec_len_from_disk(__le16 dlen, unsigned blocksize) > { > unsigned len = le16_to_cpu(dlen); > > #if (PAGE_SIZE >= 65536) > ... > #else > return len; > #endif > } Ah you're right. The reproducer for this is kind of unreliable as well so that's why it looked to be fxied with this I guess. > > Should be fixed for consistency, but seems to not be a root cause here. Agreed. -Lukas > > > A quick look at fs/ext4/namei.c reveals couple of places there rec_len > > is used without the conversion and we should check whether it needs > > fixing. > > ... >