Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp5849603ybn; Sun, 29 Sep 2019 07:03:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqz5rEPdwDVP85kGuGj37X+F92qeI3jXo+me6AkP+AzJI5+AY+9InEgJim/zssV5Iwbu7key X-Received: by 2002:aa7:d48f:: with SMTP id b15mr14785295edr.159.1569765803529; Sun, 29 Sep 2019 07:03:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569765803; cv=none; d=google.com; s=arc-20160816; b=CKgYxO82vEDfrw8c0HXGnOGxFra8LwAfoi0XTRp7lfhxXQUrD4lcQs4MtBvNUlnK7x yeB6+x07kCLFldMDTvaEYBuehkeO2avAZDT0nXUgW1WWLO/UxXP7LQ5TiQAD6+Sdt4G9 1UqdemglVm1/0qd/drXRBiKhtNkbA9M1s9TiBebwoXXC43xmKYtNJ78tiilwaH113Na+ k3JMUYuXNrKrFYb6fWLAJHH854H//kYPdsnvT342zMf42jnMjviuK/kQZ1Vnw8xTjaOW AgxqnlzG3tRM0rFp/N2NK57shaNPoRB7aHvZ0jOUL92muFHq6loCJQIvoJMztyF9w2Z4 8D6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NW9ffOxy0Cp4QEX9bSUqaEyEHKkPswfBcQkalUU8cLA=; b=eo9//0L1DudBDFyQgVNWZsQhf6i+RE/nTAHRJLKPeDELiy3ApfOcrA+PN9xnGkwumV /wq7z4V0x/qX7Xda5H+YoVOxG5DxoRRAzhrKCYAgIiaKyb4fzQSFEm4SQetyic7Qretz yGu/C4tfZRie9PSNp2va5mQemRHQ0S1bElwp9uxOVABrkebQDZ19ZpckhPJc5bn/Chu8 0AfnncRDoodalTnE8BZTaow1m9f3QMLjjH6dgBjXSExyivf0+0F6M0P3etsNlWEAnU6s rNyPfh+SZsj/eDhN5nCwT8lM+Z78d2Wo6rdX30jpmLFjEglJzBKq+Z8YGcgORZWJTCmH YXtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nquLjZIy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si5585203ejf.28.2019.09.29.07.02.58; Sun, 29 Sep 2019 07:03:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nquLjZIy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729352AbfI2OBb (ORCPT + 99 others); Sun, 29 Sep 2019 10:01:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:43710 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729427AbfI2OB3 (ORCPT ); Sun, 29 Sep 2019 10:01:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8CFC1218DE; Sun, 29 Sep 2019 14:01:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569765688; bh=476I8gwOaPfJybD0uj+iX2biT3xfPGq1TbijcaYmdlQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nquLjZIy12YSn0eVyW5GlYiyCJwxnCAm/zyBZKSGJvaalyWy3yJpnr6te8yxvrhe2 t7zPyXuhNmIWtedm2QHB5DTULDkVjVSYJouRPioej0zM0vwio5y8yjGlobuoChK7MT nYjUX/FWW/tLinVlto65FDrRSV8OYEvcAxj+bNlM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 5.2 30/45] Revert "f2fs: avoid out-of-range memory access" Date: Sun, 29 Sep 2019 15:55:58 +0200 Message-Id: <20190929135031.976705152@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190929135024.387033930@linuxfoundation.org> References: <20190929135024.387033930@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chao Yu [ Upstream commit a37d0862d17411edb67677a580a6f505ec2225f6 ] As Pavel Machek reported: "We normally use -EUCLEAN to signal filesystem corruption. Plus, it is good idea to report it to the syslog and mark filesystem as "needing fsck" if filesystem can do that." Still we need improve the original patch with: - use unlikely keyword - add message print - return EUCLEAN However, after rethink this patch, I don't think we should add such condition check here as below reasons: - We have already checked the field in f2fs_sanity_check_ckpt(), - If there is fs corrupt or security vulnerability, there is nothing to guarantee the field is integrated after the check, unless we do the check before each of its use, however no filesystem does that. - We only have similar check for bitmap, which was added due to there is bitmap corruption happened on f2fs' runtime in product. - There are so many key fields in SB/CP/NAT did have such check after f2fs_sanity_check_{sb,cp,..}. So I propose to revert this unneeded check. This reverts commit 56f3ce675103e3fb9e631cfb4131fc768bc23e9a. Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/segment.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c index ce15fbcd7cff0..291f7106537c7 100644 --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -3403,11 +3403,6 @@ static int read_compacted_summaries(struct f2fs_sb_info *sbi) seg_i = CURSEG_I(sbi, i); segno = le32_to_cpu(ckpt->cur_data_segno[i]); blk_off = le16_to_cpu(ckpt->cur_data_blkoff[i]); - if (blk_off > ENTRIES_IN_SUM) { - f2fs_bug_on(sbi, 1); - f2fs_put_page(page, 1); - return -EFAULT; - } seg_i->next_segno = segno; reset_curseg(sbi, i, 0); seg_i->alloc_type = ckpt->alloc_type[i]; -- 2.20.1