On Thu, Jan 05, 2017 at 05:45:29PM -0800, Jarno Rajahalme wrote:
> 
> > On Jan 5, 2017, at 4:48 PM, Ben Pfaff <b...@ovn.org> wrote:
> > 
> > On Thu, Jan 05, 2017 at 04:03:17PM -0800, Jarno Rajahalme wrote:
> >> 
> >>> On Jan 4, 2017, at 11:03 PM, Ben Pfaff <b...@ovn.org> wrote:
> >>> 
> >>> On Wed, Jan 04, 2017 at 07:21:44PM -0800, Jarno Rajahalme wrote:
> >>>> 
> >>>>> On Dec 21, 2016, at 2:36 PM, Ben Pfaff <b...@ovn.org> wrote:
> >>>>> 
> >>>>> On Wed, Dec 07, 2016 at 04:49:00PM -0800, Jarno Rajahalme wrote:
> >>>>> I'd be more comfortable if nx_stack_pop() had assertions to check for
> >>>>> underflow.
> >>>> 
> >>>> I don’t think OVS should assert fail if controller issues one pop
> >>>> too many? Do you mean that current users of nx_stack_pop() do not
> >>>> check for NULL return? I had a look and think that setting “*bytes”
> >>>> to zero when returning NULL should be enough for all users.
> >>> 
> >>> It appears to me that if stack->size is greater than 0 but less than the
> >>> number of bytes indicated by its last byte, then it will corrupt the
> >>> ofpbuf size and that this will later cause some kind of failure that
> >>> will be harder to debug than an assertion failure. 
> >>> 
> >> 
> >> OK, now i got it.  This is just to guard against (future) bugs in OVS 
> >> itself.
> > 
> > Yes.
> > 
> >>>>> In ofputil_decode_packet_in_private(), it's probably worth checking the
> >>>>> format of the stack we pull from the payload, since a badly formatted
> >>>>> stack can segfault us (if we leave out assertions) or assert-fail us (if
> >>>>> we include them).
> >>>>> 
> >>>> 
> >>>> What do you mean with badly formatted stack? Zero-sized property? IMO
> >>>> even that would be properly pushed and popped from the stack, storing
> >>>> only the length (of zero) in the stack.
> >>> 
> >>> I mean that if the property contains, for example, a single byte with
> >>> value 0xff, then it's badly formatted because we can pop off a length
> >>> (255) but then popping off that number of bytes will underflow.
> >> 
> >> I did not change the encoding of the stack as properties, so each
> >> value in the stack is still encoded as a separate property, where the
> >> (aligned) value length is used as the property length. 
> > 
> > I guess I forgot that.
> > 
> > Thanks, that's fine then.
> > 
> >> ofpprop_pull() does the length checking for the properties and the
> >> current code in ofputil_decode_packet_in_private() assert fails on any
> >> error, which is not good, as a controller bug would crash OVS?
> > 
> > That's bad.  Maybe the fix is as simple as this, though.
> > 
> > diff --git a/lib/ofp-util.c b/lib/ofp-util.c
> > index 156d8d2..421b9d7 100644
> > --- a/lib/ofp-util.c
> > +++ b/lib/ofp-util.c
> > @@ -1,5 +1,5 @@
> > /*
> > - * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016 
> > Nicira, Inc.
> > + * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 
> > 2017 Nicira, Inc.
> >  *
> >  * Licensed under the Apache License, Version 2.0 (the "License");
> >  * you may not use this file except in compliance with the License.
> > @@ -4061,7 +4061,9 @@ ofputil_decode_packet_in_private(const struct 
> > ofp_header *oh, bool loose,
> >         uint64_t type;
> > 
> >         error = ofpprop_pull(&continuation, &payload, &type);
> > -        ovs_assert(!error);
> > +        if (error) {
> > +            break;
> > +        }
> > 
> >         switch (type) {
> >         case NXCPT_BRIDGE:
> > @@ -4124,7 +4126,7 @@ ofputil_decode_packet_in_private(const struct 
> > ofp_header *oh, bool loose,
> >         ofputil_packet_in_private_destroy(pin);
> >     }
> > 
> > -    return 0;
> > +    return error;
> > }
> > 
> > /* Frees data in 'pin' that is dynamically allocated by
> > 
> 
> I folded this in to v3.

This bug is in 2.6, isn't it?  If so then we should fix it in a separate
patch, for backporting purposes.
_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to