Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2905317ybk; Mon, 18 May 2020 10:46:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxI1BYWEbF0lbBiEEVzXmjin0MFyXtH9jSgeUOMNNPx7RoEM8RHyjmy1wQJkewmDlYo6RcS X-Received: by 2002:a05:6402:1d81:: with SMTP id dk1mr14231726edb.143.1589824006670; Mon, 18 May 2020 10:46:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589824006; cv=none; d=google.com; s=arc-20160816; b=f2bAHU7QGDRejD3QgYkaHLXakiHa5uRvR+hYjt0NfI5qZIruQLqD/lrlwo1bftiaft zEzWY14X9hu6BiRE13M6uqLWWRFJIOPzptwCHW4zt5EBmj0vnyxHXimu11qHdPk62Szh QPF+8wcfmz67INkUaqWAyC7+H9QYgD9xkG+PII7VxKCtbOZikGg+yIabzKPLD2X41EMg 2Oh6Q90HEhoLomAbJmfrVUXDhHb6idpIsMNHcoEIK6TAvhK5Cv0nyhSYtgn/s+2kzkMz OwRjj4O71klw/osGqi4esNvCPW2BvtHA/UtknirbjhxZR7I5gr1dMkts3sWf8YR3oLR4 1pAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Y6uFtk/GD4gitJGgf+tmhfnH9MR5UO2vykKmxnw99dk=; b=zeYawagcwCuOUO8AT6xxtGr9XEqsGib8djWG5vyMyndsMmJaGBgGqCk4bCVYzmdIv0 2lRgMI+l1KnGn9sQlq+6RVLqOxZTqHjp3uhdHsrqiVzecH6g3fdgJPGeijMyFGKcswUk xmUURJJdNm4o1kLM4maK6gjm6BfV3lZGXuwtZm9ylCrrworzN5vzRwbleke4PIvYSLVx u9uxDTosbBp2RV7MoVRI/x2Faa2Ld3ODqrodw6PjOkZcuXKDXjOUrFPO57C0ikzYddVN 2aE9ju/IN2fDGaLF9bKIlmrwtk3tOUmXWpMmTY/T0Ud3ggTp4idEfOcCz3VG9yaNfLK/ SlXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DzBZCx1c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m14si7500830eda.97.2020.05.18.10.46.24; Mon, 18 May 2020 10:46:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DzBZCx1c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728654AbgERRnD (ORCPT + 99 others); Mon, 18 May 2020 13:43:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:39950 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728916AbgERRmt (ORCPT ); Mon, 18 May 2020 13:42:49 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ECE3820715; Mon, 18 May 2020 17:42:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589823768; bh=NElWdHSPE0Co3MWskyrX7Zbj7D9KTvqkOaLCXT/v8lg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DzBZCx1c4CH3S0x/lVvGWOqIVBNEKqJ7seSp6MncsPJm6xOohD2v4Z6yEk9vWgxX8 0jG+cxJ0dhczyUlGh056BawY4g7XDpitfRfxgBmMD5xipxNWAEuXLoF2OqijiPuZYT v+81IxN9EfEeHKRhsM6YbRkKD8rVH6aHVJE/J5ik= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , syzbot+0251e883fe39e7a0cb0a@syzkaller.appspotmail.com, "Jason A. Donenfeld" , "David S. Miller" Subject: [PATCH 4.9 08/90] sch_sfq: validate silly quantum values Date: Mon, 18 May 2020 19:35:46 +0200 Message-Id: <20200518173452.906332765@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200518173450.930655662@linuxfoundation.org> References: <20200518173450.930655662@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet [ Upstream commit df4953e4e997e273501339f607b77953772e3559 ] syzbot managed to set up sfq so that q->scaled_quantum was zero, triggering an infinite loop in sfq_dequeue() More generally, we must only accept quantum between 1 and 2^18 - 7, meaning scaled_quantum must be in [1, 0x7FFF] range. Otherwise, we also could have a loop in sfq_dequeue() if scaled_quantum happens to be 0x8000, since slot->allot could indefinitely switch between 0 and 0x8000. Fixes: eeaeb068f139 ("sch_sfq: allow big packets and be fair") Signed-off-by: Eric Dumazet Reported-by: syzbot+0251e883fe39e7a0cb0a@syzkaller.appspotmail.com Cc: Jason A. Donenfeld Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/sched/sch_sfq.c | 9 +++++++++ 1 file changed, 9 insertions(+) --- a/net/sched/sch_sfq.c +++ b/net/sched/sch_sfq.c @@ -635,6 +635,15 @@ static int sfq_change(struct Qdisc *sch, if (ctl->divisor && (!is_power_of_2(ctl->divisor) || ctl->divisor > 65536)) return -EINVAL; + + /* slot->allot is a short, make sure quantum is not too big. */ + if (ctl->quantum) { + unsigned int scaled = SFQ_ALLOT_SIZE(ctl->quantum); + + if (scaled <= 0 || scaled > SHRT_MAX) + return -EINVAL; + } + if (ctl_v1 && !red_check_params(ctl_v1->qth_min, ctl_v1->qth_max, ctl_v1->Wlog)) return -EINVAL;