Re: [PATCH v3 3/4] bisect--helper: reimplement `bisect_run` shell function in C

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 11/04/2021 11:55, Miriam Rubio wrote:
From: Tanushree Tumane <tanushreetumane@xxxxxxxxx>

Reimplement the `bisect_run()` shell function
in C and also add `--bisect-run` subcommand to
`git bisect--helper` to call it from git-bisect.sh.

Mentored-by: Christian Couder <chriscool@xxxxxxxxxxxxx>
Signed-off-by: Tanushree Tumane <tanushreetumane@xxxxxxxxx>
Signed-off-by: Miriam Rubio <mirucam@xxxxxxxxx>
---
  builtin/bisect--helper.c | 83 ++++++++++++++++++++++++++++++++++++++++
  git-bisect.sh            | 62 +-----------------------------
  2 files changed, 84 insertions(+), 61 deletions(-)

diff --git a/builtin/bisect--helper.c b/builtin/bisect--helper.c
index 71963979b1..dc87fc7dd0 100644
--- a/builtin/bisect--helper.c
+++ b/builtin/bisect--helper.c
@@ -18,6 +18,7 @@ static GIT_PATH_FUNC(git_path_bisect_log, "BISECT_LOG")
  static GIT_PATH_FUNC(git_path_head_name, "head-name")
  static GIT_PATH_FUNC(git_path_bisect_names, "BISECT_NAMES")
  static GIT_PATH_FUNC(git_path_bisect_first_parent, "BISECT_FIRST_PARENT")
+static GIT_PATH_FUNC(git_path_bisect_run, "BISECT_RUN")
static const char * const git_bisect_helper_usage[] = {
  	N_("git bisect--helper --bisect-reset [<commit>]"),
@@ -31,6 +32,7 @@ static const char * const git_bisect_helper_usage[] = {
  	N_("git bisect--helper --bisect-replay <filename>"),
  	N_("git bisect--helper --bisect-skip [(<rev>|<range>)...]"),
  	N_("git bisect--helper --bisect-visualize"),
+	N_("git bisect--helper --bisect-run <cmd>..."),
  	NULL
  };
@@ -1073,6 +1075,78 @@ static int bisect_visualize(struct bisect_terms *terms, const char **argv, int a
  	return res;
  }
+static int bisect_run(struct bisect_terms *terms, const char **argv, int argc)
+{
+	int res = BISECT_OK;
+	struct strbuf command = STRBUF_INIT;
+	struct strvec args = STRVEC_INIT;
+	struct strvec run_args = STRVEC_INIT;
+	int exit = 0;
+	int temporary_stdout_fd, saved_stdout;
+
+	if (bisect_next_check(terms, NULL))
+		return BISECT_FAILED;
+
+	if (argc)
+		sq_quote_argv(&command, argv);
+	else
+		return BISECT_FAILED;
+
+	run_args.v[0] = xstrdup(command.buf);
+	run_args.nr = 1;

AFAIUI manipulating the strvec directly like this means that we will violate the promise that strvec.v is always NULL-terminated. It's probably safer to call 'strvec_push(run_args, command.buf)' instead of manipulating v and nr?

Violating the NULL-termination promise a problem because... (continued below)

+
+	while (1) {
+		strvec_clear(&args);
+		exit = 1;
+
+		printf(_("running %s"), command.buf);
+		res = run_command_v_opt(run_args.v, RUN_USING_SHELL);

run_command_v_opt() implicitly expects a NULL-terminated list of strings. It's not documented in run_command_v_opt()'s comments, however run_command_v_opt() does explain that it's a wrapper around start_command(), which uses child_process, and child_process.argv is documented to require a NULL-terminated list.

If argv is not NULL-terminated, we hit a buffer overflow read in prepare_shell_cmd(), which can be reproduced by running something like:

make CC=clang-11 SANITIZE=address COPTS="-Og -g" GIT_TEST_OPTS=-v T=t6030-bisect-porcelain.sh test

which results in ASAN reporting this error:

==2116==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000001a51e28 at pc 0x0000009c6c1f bp 0x7ffcf0f60670 sp 0x7ffcf0f60668
READ of size 8 at 0x000001a51e28 thread T0
    #0 0x9c6c1e in prepare_shell_cmd run-command.c:284:8
    #1 0x9c6c1e in prepare_cmd run-command.c:419:3
    #2 0x9c6c1e in start_command run-command.c:753:6
    #3 0x9c7d35 in run_command run-command.c:1015:9
    #4 0x9c800c in run_command_v_opt_cd_env_tr2 run-command.c:1051:9
    #5 0x9c800c in run_command_v_opt_cd_env run-command.c:1033:9
    #6 0x9c800c in run_command_v_opt run-command.c:1023:9
    #7 0x4e5b60 in bisect_run builtin/bisect--helper.c:1102:9
    #8 0x4e5b60 in cmd_bisect__helper builtin/bisect--helper.c:1252:9
    #9 0x4ce8fe in run_builtin git.c:461:11
    #10 0x4ccbc8 in handle_builtin git.c:718:3
    #11 0x4cb0cc in run_argv git.c:785:4
    #12 0x4cb0cc in cmd_main git.c:916:19
    #13 0x6beded in main common-main.c:52:11
    #14 0x7f28636f7349 in __libc_start_main (/lib64/libc.so.6+0x24349)
    #15 0x420769 in _start ../sysdeps/x86_64/start.S:120

0x000001a51e28 is located 56 bytes to the left of global variable 'config_update_recurse_submodules' defined in 'submodule.c:26:12' (0x1a51e60) of size 4 0x000001a51e28 is located 0 bytes to the right of global variable 'empty_strvec' defined in 'strvec.c:5:13' (0x1a51e20) of size 8 SUMMARY: AddressSanitizer: global-buffer-overflow run-command.c:284:8 in prepare_shell_cmd


[... snip the rest ...]



[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux