mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2026-05-22 10:37:35 +03:00
OpenZFS 6876 - Stack corruption after importing a pool with a too-long name
Reviewed by: Prakash Surya <prakash.surya@delphix.com> Reviewed by: Dan Kimmel <dan.kimmel@delphix.com> Reviewed by: George Wilson <george.wilson@delphix.com> Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com> Ported-by: Brian Behlendorf <behlendorf1@llnl.gov> Calling dsl_dataset_name on a dataset with a 256 byte buffer is asking for trouble. We should check every dataset on import, using a 1024 byte buffer and checking each time to see if the dataset's new name is longer than 256 bytes. OpenZFS-issue: https://www.illumos.org/issues/6876 OpenZFS-commit: https://github.com/openzfs/openzfs/commit/ca8674e
This commit is contained in:
committed by
Brian Behlendorf
parent
eca7b76001
commit
d1d19c7854
@@ -2016,6 +2016,16 @@ spa_load_verify_cb(spa_t *spa, zilog_t *zilog, const blkptr_t *bp,
|
||||
return (0);
|
||||
}
|
||||
|
||||
/* ARGSUSED */
|
||||
int
|
||||
verify_dataset_name_len(dsl_pool_t *dp, dsl_dataset_t *ds, void *arg)
|
||||
{
|
||||
if (dsl_dataset_namelen(ds) >= ZFS_MAX_DATASET_NAME_LEN)
|
||||
return (SET_ERROR(ENAMETOOLONG));
|
||||
|
||||
return (0);
|
||||
}
|
||||
|
||||
static int
|
||||
spa_load_verify(spa_t *spa)
|
||||
{
|
||||
@@ -2030,6 +2040,14 @@ spa_load_verify(spa_t *spa)
|
||||
if (policy.zrp_request & ZPOOL_NEVER_REWIND)
|
||||
return (0);
|
||||
|
||||
dsl_pool_config_enter(spa->spa_dsl_pool, FTAG);
|
||||
error = dmu_objset_find_dp(spa->spa_dsl_pool,
|
||||
spa->spa_dsl_pool->dp_root_dir_obj, verify_dataset_name_len, NULL,
|
||||
DS_FIND_CHILDREN);
|
||||
dsl_pool_config_exit(spa->spa_dsl_pool, FTAG);
|
||||
if (error != 0)
|
||||
return (error);
|
||||
|
||||
rio = zio_root(spa, NULL, &sle,
|
||||
ZIO_FLAG_CANFAIL | ZIO_FLAG_SPECULATIVE);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user