Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp176756ybp; Thu, 3 Oct 2019 11:53:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxU8/AzUW6L04f/v5kXKdmFIJio+L9TVo/CflYcetIEj5iZLrzGBqOIAQtNjqHUgP38XE/A X-Received: by 2002:a17:906:3108:: with SMTP id 8mr8985935ejx.11.1570128835714; Thu, 03 Oct 2019 11:53:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570128835; cv=none; d=google.com; s=arc-20160816; b=vFeVLt6c/QNN3i4Dv5i7SdjOi2ww5ILtbdnfi3BuQQ12R01tqCGqRlmwkWnd9WWuGy QvAP7xGTuq9Wg5EKeqpRt5PjsAXOng46pRXKpa3Gwl41IXhP3X+ln2k2W4IFvfLAzIaI NWtrrqt9K/BcjiSdMpbUSuGBQo6y6w0v+8FX1s2nZ9VF5CZTnsRPlgUOC4lKR19bZpgQ VSjxMr1ewpKxVXvZ4aBRS/83AIU6KG/B/6QdORwHESLSam85FcjEo0/NQWDDPPGxk63y /r3E0Fhh6F8rNPcXfj05aK7bOT2EwrMboLqDJ/XdTQc1N6lFbnst+/YJiZ3OnNtxbx1h /Zaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=QnF3CT6+2HEWGa0oyscGDCtEXralE5u6Nzk88VMuM90=; b=x7ZDdJBJnDJODFQnW0OFFxPmpnHpLAA/7mPNhOWdQquqHnoWhLhax4as3Bme3uOiP1 rFkO6/4kQjI7UjIMu6dC97NZjxOzxV0fuT9NKc4m355NpLvRUKA1JNXQimYaCAtB+wS4 I8v8Zij9nsMrNeTXIJcvfi7FsiJLWRCLt1kN1dh/BEhCDLP+n2foDlhe2S95N0tWdiTQ lor4DTUSoj5PHprWXeJbW/TyWMVOxc6CQ6qLtDeRb4rrjNtEDN3mxZnuVTBpjH6Yscbo WkOw0GERxbZnswis6b4WK0fX5hY72sbi9N6ThqrvzK454L3C2r69iQkLJYJd7e/atGBi jFCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2IK22RXo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c19si2346215ede.360.2019.10.03.11.53.31; Thu, 03 Oct 2019 11:53:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2IK22RXo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390653AbfJCRnb (ORCPT + 99 others); Thu, 3 Oct 2019 13:43:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:37996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730508AbfJCP4L (ORCPT ); Thu, 3 Oct 2019 11:56:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C5875222C2; Thu, 3 Oct 2019 15:56:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570118171; bh=fUAnB/ruuX52fNGvK6A6pX90EFxYq0eSKrdO/R1/YDQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2IK22RXoll77RkTOs9fRF+sNqXS45izbAtXR7t+8pKx0iVpq71K6mex5G/DKd13tR Rgbv69mpGgDMsMzfSPN1upfLMv8ztWTg4Y/sqT/neY6+nd/Fy1RHJp1GTy6bpipV3I Sv+gdxf8nbyxLp+S/hze66GO9+8m+N4rIIng12nE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 4.4 16/99] Revert "f2fs: avoid out-of-range memory access" Date: Thu, 3 Oct 2019 17:52:39 +0200 Message-Id: <20191003154301.630690783@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154252.297991283@linuxfoundation.org> References: <20191003154252.297991283@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chao Yu [ Upstream commit a37d0862d17411edb67677a580a6f505ec2225f6 ] As Pavel Machek reported: "We normally use -EUCLEAN to signal filesystem corruption. Plus, it is good idea to report it to the syslog and mark filesystem as "needing fsck" if filesystem can do that." Still we need improve the original patch with: - use unlikely keyword - add message print - return EUCLEAN However, after rethink this patch, I don't think we should add such condition check here as below reasons: - We have already checked the field in f2fs_sanity_check_ckpt(), - If there is fs corrupt or security vulnerability, there is nothing to guarantee the field is integrated after the check, unless we do the check before each of its use, however no filesystem does that. - We only have similar check for bitmap, which was added due to there is bitmap corruption happened on f2fs' runtime in product. - There are so many key fields in SB/CP/NAT did have such check after f2fs_sanity_check_{sb,cp,..}. So I propose to revert this unneeded check. This reverts commit 56f3ce675103e3fb9e631cfb4131fc768bc23e9a. Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/segment.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c index 014bee5c0e75e..6802cd754eda0 100644 --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -1510,11 +1510,6 @@ static int read_compacted_summaries(struct f2fs_sb_info *sbi) seg_i = CURSEG_I(sbi, i); segno = le32_to_cpu(ckpt->cur_data_segno[i]); blk_off = le16_to_cpu(ckpt->cur_data_blkoff[i]); - if (blk_off > ENTRIES_IN_SUM) { - f2fs_bug_on(sbi, 1); - f2fs_put_page(page, 1); - return -EFAULT; - } seg_i->next_segno = segno; reset_curseg(sbi, i, 0); seg_i->alloc_type = ckpt->alloc_type[i]; -- 2.20.1