------- Comment From s...@de.ibm.com 2019-05-13 07:27 EDT-------
Hi xnox,

this issue has nothing todo with an issue in s390x specific setjmp/longjmp 
implementation!
Setjmp/longjmp is just used for error handling inside bunzip2 implementation in 
busybox!
But due to an issue in busybox implementation, longjmp is called on s390x but 
not on e.g. x86.
Please report this bug to busybox with the detailed information below!

According to bunzip2.tests:
bunzip2: bunzip error -5 => PASS
bunzip2: bunzip error -3 => XFAIL

As side note:
Error -3 also occures on s390x Ubuntu 18.04.2 LTS!

According to archival/libarchive/decompress_bunzip2.c:
62#define RETVAL_UNEXPECTED_INPUT_EOF     (dbg("%d", __LINE__), -3)
64#define RETVAL_DATA_ERROR               (dbg("%d", __LINE__), -5)

RETVAL_UNEXPECTED_INPUT_EOF is used only in get_bits():
128                        bd->inbufCount = read(bd->in_fd, bd->inbuf, 
IOBUF_SIZE);
129                        if (bd->inbufCount <= 0)
130                                longjmp(*bd->jmpbuf, 
RETVAL_UNEXPECTED_INPUT_EOF);
If you start gdb and set a breakpoint there ...:
busybox-1.30.1/testsuite$ gdb ../busybox_unstripped
(gdb) b decompress_bunzip2.c:130
(gdb) run bunzip2 <bz2_issue_11.bz2 2>&1 >/dev/null
... it will be hit, bd->inbufCount will be zero and the longjmp jumps back to 
setjmp in unpack_bz2_stream().
i will be -3 and "bunzip error -3" will be reported.:
788                i = setjmp(jmpbuf);
789                if (i == 0)
790                        i = start_bunzip(&jmpbuf, &bd, xstate->src_fd, 
outbuf + 2, len);
791
792                if (i == 0) {
793                        while (1) { /* "Produce some output bytes" loop */
794                                i = read_bunzip(bd, outbuf, IOBUF_SIZE);
795                                if (i < 0) /* error? */
796                                        break;
...
808                if (i != RETVAL_LAST_BLOCK
809                /* Observed case when i == RETVAL_OK:
810                 * "bzcat z.bz2", where "z.bz2" is a bzipped zero-length file
811                 * (to be exact, z.bz2 is exactly these 14 bytes:
812                 * 42 5a 68 39 17 72 45 38 50 90 00 00 00 00).
813                 */
814                 && i != RETVAL_OK
815                ) {
816                        bb_error_msg("bunzip error %d", i);
817                        break;
818                }

The difference between reporting -5 or -3 depends on uninitialized values on 
the stack while calling read_bunzip()->get_next_block().
There you have the array mtfSymbol on stack:
156/* Unpacks the next block and sets up for the inverse Burrows-Wheeler step. 
*/
157static int get_next_block(bunzip_data *bd)
158{
159        int groupCount, selector,
160                i, j, symCount, symTotal, nSelectors, byteCount[256];
161        uint8_t uc, symToByte[256], mtfSymbol[256], *selectors;
...

The groupCount is read and values in mtfSymbol are initialized:
...
219        /* How many different Huffman coding groups does this block use? */
220        groupCount = get_bits(bd, 3);
221        if (groupCount < 2 || groupCount > MAX_GROUPS)
222                return RETVAL_DATA_ERROR;
...
228        for (i = 0; i < groupCount; i++)
229                mtfSymbol[i] = i;
...
=> In the relevant case, groupCount == 6 and mtfSymbol[0..5] are initialized to 
0..5.

For each selector, the group (see variable n) is determined
and tmp_byte is set to the value of mtfSymbol[n]:
233        for (i = 0; i < nSelectors; i++) {
234                uint8_t tmp_byte;
235                /* Get next value */
236                int n = 0;
237                while (get_bits(bd, 1)) {
=> For each "1" bit, n is incremented. Unfortunately the "too-large" check is 
done before incrementing n!!!
If the "n++" line is moved before the check, then the bz2_issue_11.bz2 testcase 
passes also on s390x!
238                        if (n >= groupCount)
239                                return RETVAL_DATA_ERROR;
240                        n++;
241                }
242                /* Decode MTF to get the next selector */
243                tmp_byte = mtfSymbol[n];
=> In this testcase, for selector i==395, n is 6 and the uninitialized value of 
mtfSymbol[6] is first stored to tmp_byte and afterwards to selectors[395] 
although groupCount == 6!
(Note: there is also an commented out check which would return -5!)
244                while (--n >= 0)
245                        mtfSymbol[n + 1] = mtfSymbol[n];
246//We catch it later, in the second loop where we use selectors[i].
247//Maybe this is a better place, though?
248//              if (tmp_byte >= groupCount) {
249//                      dbg("%d: selectors[%d]:%d groupCount:%d",
250//                                      __LINE__, i, tmp_byte, groupCount);
251//                      return RETVAL_DATA_ERROR;
252//              }
253                mtfSymbol[0] = selectors[i] = tmp_byte;
254        }
=> Note: on the s390x case, selectors[395] == 0 whereas on x86 it was 
selectors[395] == 20! This value depends on previous operations on the stack!

Afterwards each selector is processed:
382        for (;;) {
383                struct group_data *hufGroup;
384                int *base, *limit;
385                int nextSym;
386                uint8_t ngrp;
387
388                /* Fetch next Huffman coding group from list. */
389                symCount = GROUP_SIZE - 1;
390                if (selector >= nSelectors)
391                        return RETVAL_DATA_ERROR;
392                ngrp = selectors[selector++];
393                if (ngrp >= groupCount) {
394                        dbg("%d selectors[%d]:%d groupCount:%d",
395                                __LINE__, selector-1, ngrp, groupCount);
396                        return RETVAL_DATA_ERROR;
397                }
...
=> In the relevant case, groupCount == 6 and we look at selector == 395:
On x86, ngrp == 20 => RETVAL_DATA_ERROR (=-5) is returned.
On s390x, ngrp == 0 => No error is reported and processing continues
until the input stream comes to end of file and get_bits() is called which 
triggers the longjmp with value -3 (see above)!
418                                if (bd->inbufPos == bd->inbufCount) {
419                                        nextSym = get_bits(bd, 
hufGroup->maxLen);

Note: This bug is also observable with valgrind on s390x and x86:
busybox-1.30.1/testsuite$ valgrind ../busybox_unstripped bunzip2 
<bz2_issue_11.bz2 2>&1 >/dev/null
...
==58836== Conditional jump or move depends on uninitialised value(s)
==58836==    at 0x1C3D2C: get_next_block (decompress_bunzip2.c:393)
==58836==    by 0x1C3ED7: get_next_block (decompress_bunzip2.c:419)
==58836==  Uninitialised value was created by a stack allocation
==58836==    at 0x1C392A: get_next_block (decompress_bunzip2.c:158)

@xnox: As mentioned at the beginning: Please report this bug to busybox
and integrate the fix into the ubuntu busybox package!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828282

Title:
  busybox 1.30.1 crashes bzip2 test case with glibc 2.29, always

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1828282/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to