Details

    • Bug
    • Resolution: Fixed
    • Critical
    • Lustre 2.13.0, Lustre 2.12.3
    • Lustre 2.13.0
    • None
    • 3
    • 9223372036854775807

    Description

      In the latest version of lustre file system, ptlrpc module has a buffer overflow bug due to the lack of validation for specific fields of packets sent by client.

      The kenrel panic:

      [  607.979453] Call Trace:
      [  607.981190]  [<ffffffffc0a76199>] ? +0xd19/0x2960 [ptlrpc]
      [  607.983385]  [<ffffffffc0b1f02a>] tgt_request_handle+0x67a/0x15c0 [ptlrpc]
      [  607.985484]  [<ffffffffc0710fa7>] ? libcfs_debug_msg+0x57/0x80 [libcfs]
      [  607.987581]  [<ffffffffc0ac288e>] ptlrpc_server_handle_request+0x24e/0xab0 [ptlrpc]
      [  607.989741]  [<ffffffffabacbadb>] ? __wake_up_common+0x5b/0x90
      [  607.991741]  [<ffffffffc0ac6384>] ptlrpc_main+0xbb4/0x20f0 [ptlrpc]
      [  607.993731]  [<ffffffffabad08c0>] ? finish_task_switch+0x50/0x1c0
      [  607.995760]  [<ffffffffc0ac57d0>] ? ptlrpc_register_service+0xfa0/0xfa0 [ptlrpc]
      [  607.997834]  [<ffffffffabac1c71>] kthread+0xd1/0xe0
      [  607.999655]  [<ffffffffabac1ba0>] ? insert_kthread_work+0x40/0x40
      [  608.001584]  [<ffffffffac175c1d>] ret_from_fork_nospec_begin+0x7/0x21
      [  608.003533]  [<ffffffffabac1ba0>] ? insert_kthread_work+0x40/0x40
      

      The function target_handle_connect() don't check the value of size when client connect to server. If size is -1, the min function will return -1. But the third parameter of memcpy is unsigned int, -1 will be parsed into 0xffffffff, causing a buffer overflow.

      size = req_capsule_get_size(&req->rq_pill, &RMF_CONNECT_DATA,
                                          RCL_CLIENT);
      memcpy(tmpdata, data, min(tmpsize, size));
      

       

       

      Attachments

        Issue Links

          Activity

            [LU-12605] Lustre target_handle_connect() bug

            Oleg Drokin (green@whamcloud.com) merged in patch https://review.whamcloud.com/35711/
            Subject: LU-12605 tgt: check client data size in target_handle_connect()
            Project: fs/lustre-release
            Branch: master
            Current Patch Set:
            Commit: 149f005a3199eee13fe6396671613a0f620ee0cc

            gerrit Gerrit Updater added a comment - Oleg Drokin (green@whamcloud.com) merged in patch https://review.whamcloud.com/35711/ Subject: LU-12605 tgt: check client data size in target_handle_connect() Project: fs/lustre-release Branch: master Current Patch Set: Commit: 149f005a3199eee13fe6396671613a0f620ee0cc

            Emoly Liu (emoly@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/35711
            Subject: LU-12605 tgt: check data size in target_handle_connect()
            Project: fs/lustre-release
            Branch: master
            Current Patch Set: 1
            Commit: ba4979f6b25e64576e7906ec6cd559f3499adba7

            gerrit Gerrit Updater added a comment - Emoly Liu (emoly@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/35711 Subject: LU-12605 tgt: check data size in target_handle_connect() Project: fs/lustre-release Branch: master Current Patch Set: 1 Commit: ba4979f6b25e64576e7906ec6cd559f3499adba7
            pjones Peter Jones added a comment -

            Yes - as you are not part of the Whamcloud team you will need an account based on an OpenID identity. These kinds of questions are probably best handled via direct email rather than in JIRA (where anyone can read them)

            pjones Peter Jones added a comment - Yes - as you are not part of the Whamcloud team you will need an account based on an OpenID identity. These kinds of questions are probably best handled via direct email rather than in JIRA (where anyone can read them)

            Hi Andreas,
            I tried to register in the https://review.whamcloud.com/ but failed. The register site ( https://review.whamcloud.com/login/%23%2Fregister%2Fq%2Fstatus%3Aopen) shows that I can log in with my whamcloud account, but it seems failed. The wrong message is 'Invalid authentication'. Do I have to register for an OpenID account? Thank you.

            yunye.ry Alibaba Cloud (Inactive) added a comment - Hi Andreas, I tried to register in the https://review.whamcloud.com/ but failed. The register site ( https://review.whamcloud.com/login/%23%2Fregister%2Fq%2Fstatus%3Aopen ) shows that I can log in with my whamcloud account, but it seems failed. The wrong message is 'Invalid authentication'. Do I have to register for an OpenID account? Thank you.

            Ok, I will do it, thank you

            yunye.ry Alibaba Cloud (Inactive) added a comment - Ok, I will do it, thank you

            Hello yunye.ry,

            please register for an account on Gerrit https://review.whamcloud.com/ so that you can be added as a reviewer for the patches that are being developed for the various issues that you have filed.  Then you can verify that they are fixing the reported problems by adding your +1 to the patch (assuming it is correct).  This will result in a "Reviewed-by: Your Name <your_email>" label on the final patch, and Alibaba will also be listed in the Lustre contribution statistics in Lustre presentations.

            adilger Andreas Dilger added a comment - Hello yunye.ry , please register for an account on Gerrit https://review.whamcloud.com/ so that you can be added as a reviewer for the patches that are being developed for the various issues that you have filed.  Then you can verify that they are fixing the reported problems by adding your +1 to the patch (assuming it is correct).  This will result in a " Reviewed-by: Your Name <your_email> " label on the final patch, and Alibaba will also be listed in the Lustre contribution statistics in Lustre presentations .
            pjones Peter Jones added a comment -

            Emoly

            Actually can you please work on this one

            Thanks

            Peter

            pjones Peter Jones added a comment - Emoly Actually can you please work on this one Thanks Peter
            adilger Andreas Dilger added a comment - - edited

            lustre_unpack_msg_v2() is what is touching the message buffer first, and is the right place to do sanity checking of the message buffers. While lustre_msg_buf_v2() is used in a lot of places to access various buffers internally, we don't necessarily want to do validity checking for every access throughout the code. Having a high-level scrub once at message receipt makes the most sense, and then the internal accessors can assume it is valid.

            Checks that should be added:

            1. validate that the number of buffers is not too large (there a limit of 32 buffers per message based on sizeof(req->rq_req_swab_mask)*8, but there is no check of lm_bufcount before it is used.
            2. validate that individual buffer lengths and the total message lengths are not insane (i.e. integers < INT_MAX/MAX_BUFFER_COUNT so that they are not treated as negative int values)
            3. validate that the individual buffer lengths are less than the total message length to avoid overflow when added
            4. validate that the provided lengths are not larger than the total message size
            adilger Andreas Dilger added a comment - - edited lustre_unpack_msg_v2() is what is touching the message buffer first, and is the right place to do sanity checking of the message buffers. While lustre_msg_buf_v2() is used in a lot of places to access various buffers internally, we don't necessarily want to do validity checking for every access throughout the code. Having a high-level scrub once at message receipt makes the most sense, and then the internal accessors can assume it is valid. Checks that should be added: validate that the number of buffers is not too large (there a limit of 32 buffers per message based on sizeof(req->rq_req_swab_mask)*8 , but there is no check of lm_bufcount before it is used. validate that individual buffer lengths and the total message lengths are not insane (i.e. integers < INT_MAX/MAX_BUFFER_COUNT so that they are not treated as negative int values) validate that the individual buffer lengths are less than the total message length to avoid overflow when added validate that the provided lengths are not larger than the total message size
            pjones Peter Jones added a comment -

            Sébastien

            Could you please investigate

            Peter

            pjones Peter Jones added a comment - Sébastien Could you please investigate Peter

            People

              emoly.liu Emoly Liu
              yunye.ry Alibaba Cloud (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: