* btrfs-progs: minor buffer-overrun fixes (v3)
@ 2012-04-21 7:50 Jim Meyering
2012-04-21 7:50 ` [PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy sequence Jim Meyering
` (3 more replies)
0 siblings, 4 replies; 6+ messages in thread
From: Jim Meyering @ 2012-04-21 7:50 UTC (permalink / raw)
To: linux-btrfs
[I realized I'd need this v3 as I was falling asleep last night. ]
Same net effect as v2, but bisectable, now that the fix
- args.name[BTRFS_PATH_NAME_MAX-1] = 0;
+ args.name[BTRFS_SUBVOL_NAME_MAX-1] = 0;
is applied to 3/4, rather than to 4/4.
[PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy
[PATCHv3 2/4] restore: don't corrupt stack for a zero-length
[PATCHv3 3/4] avoid several strncpy-induced buffer overruns
[PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length
^ permalink raw reply [flat|nested] 6+ messages in thread
* [PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy sequence
2012-04-21 7:50 btrfs-progs: minor buffer-overrun fixes (v3) Jim Meyering
@ 2012-04-21 7:50 ` Jim Meyering
2012-04-21 7:50 ` [PATCHv3 2/4] restore: don't corrupt stack for a zero-length command-line argument Jim Meyering
` (2 subsequent siblings)
3 siblings, 0 replies; 6+ messages in thread
From: Jim Meyering @ 2012-04-21 7:50 UTC (permalink / raw)
To: linux-btrfs
From: Jim Meyering <meyering@redhat.com>
* mkfs.c (traverse_directory): No semantic change.
Reviewed-by: Josef Bacik <josef@redhat.com>
---
mkfs.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/mkfs.c b/mkfs.c
index c531ef2..03239fb 100644
--- a/mkfs.c
+++ b/mkfs.c
@@ -911,8 +911,7 @@ static int traverse_directory(struct btrfs_trans_handle *trans,
/* Add list for source directory */
dir_entry = malloc(sizeof(struct directory_name_entry));
dir_entry->dir_name = dir_name;
- dir_entry->path = malloc(strlen(dir_name) + 1);
- strcpy(dir_entry->path, dir_name);
+ dir_entry->path = strdup(dir_name);
parent_inum = highest_inum + BTRFS_FIRST_FREE_OBJECTID;
dir_entry->inum = parent_inum;
--
1.7.10.228.g81f95
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCHv3 2/4] restore: don't corrupt stack for a zero-length command-line argument
2012-04-21 7:50 btrfs-progs: minor buffer-overrun fixes (v3) Jim Meyering
2012-04-21 7:50 ` [PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy sequence Jim Meyering
@ 2012-04-21 7:50 ` Jim Meyering
2012-04-21 7:50 ` [PATCHv3 3/4] avoid several strncpy-induced buffer overruns Jim Meyering
2012-04-21 7:50 ` [PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length "size" arg Jim Meyering
3 siblings, 0 replies; 6+ messages in thread
From: Jim Meyering @ 2012-04-21 7:50 UTC (permalink / raw)
To: linux-btrfs
From: Jim Meyering <meyering@redhat.com>
Given a zero-length directory name, the trailing-slash removal
code would test dir_name[-1], and if it were found to be a slash,
would set it to '\0'.
Reviewed-by: Josef Bacik <josef@redhat.com>
---
restore.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git a/restore.c b/restore.c
index 250c9d3..2674832 100644
--- a/restore.c
+++ b/restore.c
@@ -849,11 +849,9 @@ int main(int argc, char **argv)
strncpy(dir_name, argv[optind + 1], 128);
/* Strip the trailing / on the dir name */
- while (1) {
- len = strlen(dir_name);
- if (dir_name[len - 1] != '/')
- break;
- dir_name[len - 1] = '\0';
+ len = strlen(dir_name);
+ while (len && dir_name[--len] == '/') {
+ dir_name[len] = '\0';
}
if (find_dir) {
--
1.7.10.228.g81f95
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCHv3 3/4] avoid several strncpy-induced buffer overruns
2012-04-21 7:50 btrfs-progs: minor buffer-overrun fixes (v3) Jim Meyering
2012-04-21 7:50 ` [PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy sequence Jim Meyering
2012-04-21 7:50 ` [PATCHv3 2/4] restore: don't corrupt stack for a zero-length command-line argument Jim Meyering
@ 2012-04-21 7:50 ` Jim Meyering
2012-04-21 7:50 ` [PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length "size" arg Jim Meyering
3 siblings, 0 replies; 6+ messages in thread
From: Jim Meyering @ 2012-04-21 7:50 UTC (permalink / raw)
To: linux-btrfs
From: Jim Meyering <meyering@redhat.com>
* restore.c (main): Ensure strncpy-copied dir_name is NUL-terminated.
* btrfsctl.c (main): Likewise, for a command-line argument.
* utils.c (multiple functions): Likewise.
* btrfs-list.c (add_root): Likewise.
* btrfslabel.c (change_label_unmounted): Likewise.
* cmds-device.c (cmd_add_dev, cmd_rm_dev, cmd_scan_dev): Likewise.
* cmds-filesystem.c (cmd_resize): Likewise.
* cmds-subvolume.c (cmd_subvol_create, cmd_subvol_delete, cmd_snapshot):
Likewise.
Reviewed-by: Josef Bacik <josef@redhat.com>
---
btrfs-list.c | 2 ++
btrfsctl.c | 5 +++--
btrfslabel.c | 1 +
cmds-device.c | 3 +++
cmds-filesystem.c | 1 +
cmds-subvolume.c | 3 +++
restore.c | 3 ++-
utils.c | 13 ++++++++++---
8 files changed, 25 insertions(+), 6 deletions(-)
diff --git a/btrfs-list.c b/btrfs-list.c
index 5f4a9be..35e6139 100644
--- a/btrfs-list.c
+++ b/btrfs-list.c
@@ -183,6 +183,8 @@ static int add_root(struct root_lookup *root_lookup,
ri->root_id = root_id;
ri->ref_tree = ref_tree;
strncpy(ri->name, name, name_len);
+ if (name_len > 0)
+ ri->name[name_len-1] = 0;
ret = tree_insert(&root_lookup->root, root_id, ref_tree, &ri->rb_node);
if (ret) {
diff --git a/btrfsctl.c b/btrfsctl.c
index d45e2a7..518684c 100644
--- a/btrfsctl.c
+++ b/btrfsctl.c
@@ -241,9 +241,10 @@ int main(int ac, char **av)
fd = open_file_or_dir(fname);
}
- if (name)
+ if (name) {
strncpy(args.name, name, BTRFS_PATH_NAME_MAX + 1);
- else
+ args.name[BTRFS_PATH_NAME_MAX] = 0;
+ } else
args.name[0] = '\0';
if (command == BTRFS_IOC_SNAP_CREATE) {
diff --git a/btrfslabel.c b/btrfslabel.c
index c9f4684..da694e1 100644
--- a/btrfslabel.c
+++ b/btrfslabel.c
@@ -58,6 +58,7 @@ static void change_label_unmounted(char *dev, char *nLabel)
trans = btrfs_start_transaction(root, 1);
strncpy(root->fs_info->super_copy.label, nLabel, BTRFS_LABEL_SIZE);
+ root->fs_info->super_copy.label[BTRFS_LABEL_SIZE-1] = 0;
btrfs_commit_transaction(trans, root);
/* Now we close it since we are done. */
diff --git a/cmds-device.c b/cmds-device.c
index db625a6..771856b 100644
--- a/cmds-device.c
+++ b/cmds-device.c
@@ -117,6 +117,7 @@ static int cmd_add_dev(int argc, char **argv)
close(devfd);
strncpy(ioctl_args.name, argv[i], BTRFS_PATH_NAME_MAX);
+ ioctl_args.name[BTRFS_PATH_NAME_MAX-1] = 0;
res = ioctl(fdmnt, BTRFS_IOC_ADD_DEV, &ioctl_args);
e = errno;
if(res<0){
@@ -161,6 +162,7 @@ static int cmd_rm_dev(int argc, char **argv)
int res;
strncpy(arg.name, argv[i], BTRFS_PATH_NAME_MAX);
+ arg.name[BTRFS_PATH_NAME_MAX-1] = 0;
res = ioctl(fdmnt, BTRFS_IOC_RM_DEV, &arg);
e = errno;
if(res<0){
@@ -226,6 +228,7 @@ static int cmd_scan_dev(int argc, char **argv)
printf("Scanning for Btrfs filesystems in '%s'\n", argv[i]);
strncpy(args.name, argv[i], BTRFS_PATH_NAME_MAX);
+ args.name[BTRFS_PATH_NAME_MAX-1] = 0;
/*
* FIXME: which are the error code returned by this ioctl ?
* it seems that is impossible to understand if there no is
diff --git a/cmds-filesystem.c b/cmds-filesystem.c
index 1f53d1c..ea9e788 100644
--- a/cmds-filesystem.c
+++ b/cmds-filesystem.c
@@ -489,6 +489,7 @@ static int cmd_resize(int argc, char **argv)
printf("Resize '%s' of '%s'\n", path, amount);
strncpy(args.name, amount, BTRFS_PATH_NAME_MAX);
+ args.name[BTRFS_PATH_NAME_MAX-1] = 0;
res = ioctl(fd, BTRFS_IOC_RESIZE, &args);
e = errno;
close(fd);
diff --git a/cmds-subvolume.c b/cmds-subvolume.c
index 950fa8f..a01c830 100644
--- a/cmds-subvolume.c
+++ b/cmds-subvolume.c
@@ -111,6 +111,7 @@ static int cmd_subvol_create(int argc, char **argv)
printf("Create subvolume '%s/%s'\n", dstdir, newname);
strncpy(args.name, newname, BTRFS_PATH_NAME_MAX);
+ args.name[BTRFS_PATH_NAME_MAX-1] = 0;
res = ioctl(fddst, BTRFS_IOC_SUBVOL_CREATE, &args);
e = errno;
@@ -202,6 +203,7 @@ static int cmd_subvol_delete(int argc, char **argv)
printf("Delete subvolume '%s/%s'\n", dname, vname);
strncpy(args.name, vname, BTRFS_PATH_NAME_MAX);
+ args.name[BTRFS_PATH_NAME_MAX-1] = 0;
res = ioctl(fd, BTRFS_IOC_SNAP_DESTROY, &args);
e = errno;
@@ -378,6 +380,7 @@ static int cmd_snapshot(int argc, char **argv)
args.fd = fd;
strncpy(args.name, newname, BTRFS_SUBVOL_NAME_MAX);
+ args.name[BTRFS_SUBVOL_NAME_MAX-1] = 0;
res = ioctl(fddst, BTRFS_IOC_SNAP_CREATE_V2, &args);
e = errno;
diff --git a/restore.c b/restore.c
index 2674832..d1ac542 100644
--- a/restore.c
+++ b/restore.c
@@ -846,7 +846,8 @@ int main(int argc, char **argv)
memset(path_name, 0, 4096);
- strncpy(dir_name, argv[optind + 1], 128);
+ strncpy(dir_name, argv[optind + 1], sizeof dir_name);
+ dir_name[sizeof dir_name - 1] = 0;
/* Strip the trailing / on the dir name */
len = strlen(dir_name);
diff --git a/utils.c b/utils.c
index ee7fa1b..5240c2c 100644
--- a/utils.c
+++ b/utils.c
@@ -657,9 +657,11 @@ int resolve_loop_device(const char* loop_dev, char* loop_file, int max_len)
ret_ioctl = ioctl(loop_fd, LOOP_GET_STATUS, &loopinfo);
close(loop_fd);
- if (ret_ioctl == 0)
+ if (ret_ioctl == 0) {
strncpy(loop_file, loopinfo.lo_name, max_len);
- else
+ if (max_len > 0)
+ loop_file[max_len-1] = 0;
+ } else
return -errno;
return 0;
@@ -860,8 +862,10 @@ int check_mounted_where(int fd, const char *file, char *where, int size,
}
/* Did we find an entry in mnt table? */
- if (mnt && size && where)
+ if (mnt && size && where) {
strncpy(where, mnt->mnt_dir, size);
+ where[size-1] = 0;
+ }
if (fs_dev_ret)
*fs_dev_ret = fs_devices_mnt;
@@ -893,6 +897,8 @@ int get_mountpt(char *dev, char *mntpt, size_t size)
if (strcmp(dev, mnt->mnt_fsname) == 0)
{
strncpy(mntpt, mnt->mnt_dir, size);
+ if (size)
+ mntpt[size-1] = 0;
break;
}
}
@@ -925,6 +931,7 @@ void btrfs_register_one_device(char *fname)
return;
}
strncpy(args.name, fname, BTRFS_PATH_NAME_MAX);
+ args.name[BTRFS_PATH_NAME_MAX-1] = 0;
ret = ioctl(fd, BTRFS_IOC_SCAN_DEV, &args);
e = errno;
if(ret<0){
--
1.7.10.228.g81f95
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length "size" arg
2012-04-21 7:50 btrfs-progs: minor buffer-overrun fixes (v3) Jim Meyering
` (2 preceding siblings ...)
2012-04-21 7:50 ` [PATCHv3 3/4] avoid several strncpy-induced buffer overruns Jim Meyering
@ 2012-04-21 7:50 ` Jim Meyering
2012-04-21 10:14 ` Accidental use of mkfs.btrfs -L ... recoverable? Andreas Nyback
3 siblings, 1 reply; 6+ messages in thread
From: Jim Meyering @ 2012-04-21 7:50 UTC (permalink / raw)
To: linux-btrfs
From: Jim Meyering <meyering@redhat.com>
* mkfs.c (parse_size): ./mkfs.btrfs -A '' would read and possibly
write the byte before beginning of strdup'd heap buffer. All other
size-accepting options were similarly affected.
Reviewed-by: Josef Bacik <josef@redhat.com>
---
mkfs.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/mkfs.c b/mkfs.c
index 03239fb..4aff2fd 100644
--- a/mkfs.c
+++ b/mkfs.c
@@ -63,7 +63,7 @@ static u64 parse_size(char *s)
s = strdup(s);
- if (!isdigit(s[len - 1])) {
+ if (len && !isdigit(s[len - 1])) {
c = tolower(s[len - 1]);
switch (c) {
case 'g':
--
1.7.10.228.g81f95
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Accidental use of mkfs.btrfs -L ... recoverable?
2012-04-21 7:50 ` [PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length "size" arg Jim Meyering
@ 2012-04-21 10:14 ` Andreas Nyback
0 siblings, 0 replies; 6+ messages in thread
From: Andreas Nyback @ 2012-04-21 10:14 UTC (permalink / raw)
To: linux-btrfs
In all haste i accidentally used mkfs.btrfs -L to label a partition with
data on it.
Is there any way to recover the contents other then something like
testdisk to scan the whole drive?
brgds
Andreas
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2012-04-21 10:14 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-04-21 7:50 btrfs-progs: minor buffer-overrun fixes (v3) Jim Meyering
2012-04-21 7:50 ` [PATCHv3 1/4] mkfs: use strdup in place of strlen,malloc,strcpy sequence Jim Meyering
2012-04-21 7:50 ` [PATCHv3 2/4] restore: don't corrupt stack for a zero-length command-line argument Jim Meyering
2012-04-21 7:50 ` [PATCHv3 3/4] avoid several strncpy-induced buffer overruns Jim Meyering
2012-04-21 7:50 ` [PATCHv3 4/4] mkfs: avoid heap-buffer-read-underrun for zero-length "size" arg Jim Meyering
2012-04-21 10:14 ` Accidental use of mkfs.btrfs -L ... recoverable? Andreas Nyback
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.