Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4972290imu; Mon, 12 Nov 2018 22:03:54 -0800 (PST) X-Google-Smtp-Source: AJdET5fjlr6mbbjLwrQp8q951CCdNnqO0xznsJ1gdqI8VVagJrIKDdVms7gC6CFsfQJxzLT9eugL X-Received: by 2002:a62:8c93:: with SMTP id m141-v6mr3769452pfd.239.1542089033992; Mon, 12 Nov 2018 22:03:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542089033; cv=none; d=google.com; s=arc-20160816; b=WuTh6p/qRIKK5ObThGrE7AOfOyea1OGKzKqWTrY8N++Ycue15QQ412H1YPJLys2t9H r/6hwMlsXihtoZdQ2gh813S8y/yRc1glOJ9jzju4Y1RDN0WwjcYNavHBVnDWXw6XVvOA aUv8jDKb2iz/9bdCwuXHT53wuVhDikujH7GIgStKN6XQTUprmN/gJJXkelpgEhPzUg2I OrDEO1Z8YxkuBoKGFZvo3h1OxpvFNKGbMBdAhQKz+mFb2XXnA4UDyoO2RB+/hsjmOkxt +7akot7ll8iLVWZcc8AniZLw11FIkdfotE+oVoMVR8FyjVLctitoRXAIjjpr114VFL6Z ws4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=7sIXYD0OXENqa95jaRe/qk/eaC7tjqPG09wUR6+M2gU=; b=SSjU0PO2FRFnONi2h1g+bKlfsSO8arlmADltnFNXt+cZOYwfaqZvI89zpbSelcwmKJ BXUZ9aUBN1SvioH/ILFfL0gMeUW0nnFrtHg2S1xh0AxV3Q0YYSkyXUai6zllRXQ/jRDE x6j2YgxMGo7cF7spvT4xzGQY0TQZPH3OiXJ+aG9eCh6WXY+Z8Dx24p0q54FIefPUWiLH 3FF06k4dVCwbriZcdTKby9fIfMJnSG0l9gPWFPA1RTuy+pq/4OlhVrXWmT7mXIClyOX4 hTG+8E3KbieR5ceD+3as0L4q+0/F8uRxXaI00P6pMaPDkEhB+dVWLxpw7aAlO/wtVW+7 Ujlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OBQCn67P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u2-v6si19952579plq.268.2018.11.12.22.03.39; Mon, 12 Nov 2018 22:03:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OBQCn67P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731867AbeKMPrW (ORCPT + 99 others); Tue, 13 Nov 2018 10:47:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:33028 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731809AbeKMPrV (ORCPT ); Tue, 13 Nov 2018 10:47:21 -0500 Received: from sasha-vm.mshome.net (unknown [64.114.255.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3146222511; Tue, 13 Nov 2018 05:50:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542088254; bh=zJKm/H+NU+kQwMVk2r78buikKheGjfKc90xgxTKY7Ks=; h=From:To:Cc:Subject:Date:From; b=OBQCn67P4rqULZp4a/f9MgcsSPdaW1C/NZtq69vdmkXm2YeZv1FOt0lHDYWRKt1a8 g79DXABVqkpgs8Fb0fB81GK7vatJQgh9IK4pB5E0Sh+2d6vwZVLLxZ4rDoFWTObRcB Rj7vI9Fk+D/0prr8CJjhpEHnv1badMAvbjCFi848= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Tetsuo Handa , Tigran Aivazian , Matthew Wilcox , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH AUTOSEL 4.18 01/39] bfs: add sanity check at bfs_fill_super() Date: Tue, 13 Nov 2018 00:50:15 -0500 Message-Id: <20181113055053.78352-1-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tetsuo Handa [ Upstream commit 9f2df09a33aa2c76ce6385d382693f98d7f2f07e ] syzbot is reporting too large memory allocation at bfs_fill_super() [1]. Since file system image is corrupted such that bfs_sb->s_start == 0, bfs_fill_super() is trying to allocate 8MB of continuous memory. Fix this by adding a sanity check on bfs_sb->s_start, __GFP_NOWARN and printf(). [1] https://syzkaller.appspot.com/bug?id=16a87c236b951351374a84c8a32f40edbc034e96 Link: http://lkml.kernel.org/r/1525862104-3407-1-git-send-email-penguin-kernel@I-love.SAKURA.ne.jp Signed-off-by: Tetsuo Handa Reported-by: syzbot Reviewed-by: Andrew Morton Cc: Tigran Aivazian Cc: Matthew Wilcox Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/bfs/inode.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/fs/bfs/inode.c b/fs/bfs/inode.c index 9a69392f1fb3..d81c148682e7 100644 --- a/fs/bfs/inode.c +++ b/fs/bfs/inode.c @@ -350,7 +350,8 @@ static int bfs_fill_super(struct super_block *s, void *data, int silent) s->s_magic = BFS_MAGIC; - if (le32_to_cpu(bfs_sb->s_start) > le32_to_cpu(bfs_sb->s_end)) { + if (le32_to_cpu(bfs_sb->s_start) > le32_to_cpu(bfs_sb->s_end) || + le32_to_cpu(bfs_sb->s_start) < BFS_BSIZE) { printf("Superblock is corrupted\n"); goto out1; } @@ -359,9 +360,11 @@ static int bfs_fill_super(struct super_block *s, void *data, int silent) sizeof(struct bfs_inode) + BFS_ROOT_INO - 1; imap_len = (info->si_lasti / 8) + 1; - info->si_imap = kzalloc(imap_len, GFP_KERNEL); - if (!info->si_imap) + info->si_imap = kzalloc(imap_len, GFP_KERNEL | __GFP_NOWARN); + if (!info->si_imap) { + printf("Cannot allocate %u bytes\n", imap_len); goto out1; + } for (i = 0; i < BFS_ROOT_INO; i++) set_bit(i, info->si_imap); -- 2.17.1