Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp19928ybl; Tue, 7 Jan 2020 13:15:32 -0800 (PST) X-Google-Smtp-Source: APXvYqyD4jus/RxKXbrmj3ttDbdjRHeX7AHq6/Mn2wSD/9rPIzxQNrCSKRpfzqJlv1c//AQpcxYB X-Received: by 2002:aca:f1c6:: with SMTP id p189mr337146oih.159.1578431732393; Tue, 07 Jan 2020 13:15:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578431732; cv=none; d=google.com; s=arc-20160816; b=gxHY0bEzuHz01lJdAoJtA5SKPvStj4iFEYkoa67SoxEg1t++JOc2QE9NytP15oF+3R Upqpb9eWM6HyswwnqOOIy+2r/UknQQIFHJ3fAI3DCoPQ34z6KUorKyj1HROiEgA4eNQt 1oIrDDcqjADJVC/2I9W9olK4iX6sXAt5Etd5yfUsKXn7M2wiLNNvfYSP8hrleSt8co2/ TbePrqlkeYKKmNcf6Y00eWMFG6Oen059Yis9wmvapdvYIY8uy3jz4/3rE59nfv8kHcyI X9V69sE1o9W4AtyjmUJEugZmoNfhhj35okjHum1boIWp0gsajBCpPXLvH83k9Lhtj4h/ N+4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EbHiEO4eWM0erAY9NDfEj8y6+F5ZkRNM0Fb6Ba8XBzU=; b=hslboJjZmUtlSY1s2VIXQluY6G+cwQrjzt7VauiN6wPQxEuIGlbpUDkIwYSjMtaUOm 8TdfGK9LNmXEwTJvzPJ86pDuddHphNYqwWy5SmriieFgc/xGvL6v7WBFo7S+mLXgppq0 0m7d5Z0jMRbd351ga9R5hg08yQzI9ZcnhohBlivyQoHfF9MHNdjVYgek3n2OwnWgXtiB kYyJHypiTqbNjX1Le1zZlV8px/F1CGx6AJtbdnSNdXc6NEq1C9igNQUqwvTkdIKfJkA0 /hVOhh9QBLeGqnqa8yIbkQSuGGuMbYb140Z04Nrvq7AjqjRJFe52/siGvvP1FHujVOmI iBAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SsNqJFwG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p20si572631otk.73.2020.01.07.13.15.19; Tue, 07 Jan 2020 13:15:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SsNqJFwG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729777AbgAGVOk (ORCPT + 99 others); Tue, 7 Jan 2020 16:14:40 -0500 Received: from mail.kernel.org ([198.145.29.99]:34250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729786AbgAGVJK (ORCPT ); Tue, 7 Jan 2020 16:09:10 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8B6B02077B; Tue, 7 Jan 2020 21:09:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578431350; bh=iBoHMJDZnbO3kqXZFkUczZBgYWQj2tfUMH+07frX/jU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SsNqJFwGkWvSiWhXQT5nzyhR+9j22Kma2fb+q5nOq6Fk9j2535hMKCXVfSg8WiFCc rvkJ2WFvdxQo3jO6E9mkUmrvJ006rZLPqzMN+R1/es3TmGcesXRhZlNOh2uC6+D5Jb tmSdQ/vAVbTybZFxDfjMtuFj2gFeHwUFvd/hHnEo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+c732f8644185de340492@syzkaller.appspotmail.com, Brian Foster , "Darrick J. Wong" , Sasha Levin Subject: [PATCH 4.14 20/74] xfs: fix mount failure crash on invalid iclog memory access Date: Tue, 7 Jan 2020 21:54:45 +0100 Message-Id: <20200107205149.039516312@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200107205135.369001641@linuxfoundation.org> References: <20200107205135.369001641@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Brian Foster [ Upstream commit 798a9cada4694ca8d970259f216cec47e675bfd5 ] syzbot (via KASAN) reports a use-after-free in the error path of xlog_alloc_log(). Specifically, the iclog freeing loop doesn't handle the case of a fully initialized ->l_iclog linked list. Instead, it assumes that the list is partially constructed and NULL terminated. This bug manifested because there was no possible error scenario after iclog list setup when the original code was added. Subsequent code and associated error conditions were added some time later, while the original error handling code was never updated. Fix up the error loop to terminate either on a NULL iclog or reaching the end of the list. Reported-by: syzbot+c732f8644185de340492@syzkaller.appspotmail.com Signed-off-by: Brian Foster Reviewed-by: Darrick J. Wong Signed-off-by: Darrick J. Wong Signed-off-by: Sasha Levin --- fs/xfs/xfs_log.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/xfs/xfs_log.c b/fs/xfs/xfs_log.c index dc95a49d62e7..4e768e606998 100644 --- a/fs/xfs/xfs_log.c +++ b/fs/xfs/xfs_log.c @@ -1539,6 +1539,8 @@ xlog_alloc_log( if (iclog->ic_bp) xfs_buf_free(iclog->ic_bp); kmem_free(iclog); + if (prev_iclog == log->l_iclog) + break; } spinlock_destroy(&log->l_icloglock); xfs_buf_free(log->l_xbuf); -- 2.20.1