Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1743870ybl; Sat, 11 Jan 2020 01:56:40 -0800 (PST) X-Google-Smtp-Source: APXvYqz8pFvhw8tacPVpMmTQfCAtz6E5j17BqDlrR1iGQO/TDnnDUoag1xoo4IH6GFw7bPoOSF3e X-Received: by 2002:aca:e084:: with SMTP id x126mr5585077oig.97.1578736600334; Sat, 11 Jan 2020 01:56:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578736600; cv=none; d=google.com; s=arc-20160816; b=Xt7nKYNgptLMVDCwqvcjMRM+V0iVhFZPqxKhAdI2lPI5hgGiTOegUXcmfILqs55+6n PB8uRzA+JPydND30oxctB1oyiYzBN8/zMf8ez7I3uk0rgi4dIE/XP8MpHG+bBIhWxBDT i/DJqmsNOSD9/qhGBEoDKNROXf5vaBdzmInuFbKJXlsh5jdQfMvAujD7DesMoe98NKOp dia5acldKpKotISvLymFUt8tNMfZizr0rPf0G7/+H0OIixNWYOAmQ+h2qe1GTkW4Jh4l 6BON0Zt5h3X6JERYfTedpyJ3yNIiz/CPk9H8q1qhcE+0gjq7rvlrhoXOTTnJ+7yMExlh Xabw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/OOp3yFavAKmlMtPdTeP0c/FQCNT5YJMx6ywHvjRTHY=; b=FbuNDaW7vFzi+LI3L+Yl4+WgJ9x+sxX6J7ecVF+4Of89tdyi1y5fFKIlQHAiZuYLQe 3/2ZKzT6Ejj1aqH+ETd6ZntYqEnK7WwYhPK+07BW0wTERd/aoPYk2wpUqCE1R6dIMXvJ OhIo5kB60v/crpp/MEzwVMOthrVRK5agQvdyKVEzwwb+N9aaFbVoMSZ8C8hkTBvSeK/y e9N2pTIELve99cjqcv2+DYZD/5A0oFvJmCRGwg25ZVq+y/Bm2sjKU/hPjrxBrNEtKMpy zHGcS43Ha5ceVB40uK8Hc08aznsVVdhquL79HO7vY67blJ4N1eMJp9ngnDaELNie6AcH FepQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J5sstdRl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l17si2861499oie.41.2020.01.11.01.56.29; Sat, 11 Jan 2020 01:56:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J5sstdRl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729099AbgAKJyh (ORCPT + 99 others); Sat, 11 Jan 2020 04:54:37 -0500 Received: from mail.kernel.org ([198.145.29.99]:43304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728807AbgAKJyg (ORCPT ); Sat, 11 Jan 2020 04:54:36 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 032512072E; Sat, 11 Jan 2020 09:54:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578736475; bh=CW+8YHjb911IXQD++FpPnPErWmULIcsG8GPVMa5/gdU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J5sstdRlfieUO8ZDKO2qRW7vYOAk6Xtu/wDMZFAwJms5iCvhYvZAlAmRIP5qbTn6L vSh7e5uiNATKVf/3ZLh/Tp2mlCy7UkyHFN0+g1JZEH5g6tYjrMmm9Vw41NtEUcEcFy /0MnyIxpLWX4vJ9njkYKSsedYm6I2OAYfAXhYGDk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+c732f8644185de340492@syzkaller.appspotmail.com, Brian Foster , "Darrick J. Wong" , Sasha Levin Subject: [PATCH 4.4 12/59] xfs: fix mount failure crash on invalid iclog memory access Date: Sat, 11 Jan 2020 10:49:21 +0100 Message-Id: <20200111094840.323120975@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094835.417654274@linuxfoundation.org> References: <20200111094835.417654274@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Brian Foster [ Upstream commit 798a9cada4694ca8d970259f216cec47e675bfd5 ] syzbot (via KASAN) reports a use-after-free in the error path of xlog_alloc_log(). Specifically, the iclog freeing loop doesn't handle the case of a fully initialized ->l_iclog linked list. Instead, it assumes that the list is partially constructed and NULL terminated. This bug manifested because there was no possible error scenario after iclog list setup when the original code was added. Subsequent code and associated error conditions were added some time later, while the original error handling code was never updated. Fix up the error loop to terminate either on a NULL iclog or reaching the end of the list. Reported-by: syzbot+c732f8644185de340492@syzkaller.appspotmail.com Signed-off-by: Brian Foster Reviewed-by: Darrick J. Wong Signed-off-by: Darrick J. Wong Signed-off-by: Sasha Levin --- fs/xfs/xfs_log.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/xfs/xfs_log.c b/fs/xfs/xfs_log.c index 73b725f965eb..065aa4752607 100644 --- a/fs/xfs/xfs_log.c +++ b/fs/xfs/xfs_log.c @@ -1503,6 +1503,8 @@ xlog_alloc_log( if (iclog->ic_bp) xfs_buf_free(iclog->ic_bp); kmem_free(iclog); + if (prev_iclog == log->l_iclog) + break; } spinlock_destroy(&log->l_icloglock); xfs_buf_free(log->l_xbuf); -- 2.20.1