Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1052645pxv; Thu, 22 Jul 2021 20:59:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyT8YgbpggIDXMXXmbGHDHofa546AZsKQ5UfZ77lbtfWeQFOh/dswY6EIV/XKPzNmylFJZM X-Received: by 2002:a17:906:a08d:: with SMTP id q13mr2803082ejy.465.1627012795461; Thu, 22 Jul 2021 20:59:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627012795; cv=none; d=google.com; s=arc-20160816; b=c73/QYnnV3Ak3SSjuBnbUgRSP+cNYvnrKtk0yjRQWIcOEitAGVdKq3s5D1iMJ6p9ug C4HVVcORVaETbk6FT2h9N7guh6H6FRjFZURL0jA9/hFaqlhZRVlb4rgvxiCvn1P+lDxK CHk21RlGXvw6UZUcz57OY9Lv6j9dPvLOQ4xt53RT9Yt74eSexdaDV7PcdpQ9HWNulEyV BukVRct++2zOxFLpdixmSlPjnvyzSJ9pKf0JBNODdlZzR+tYUdLChWJHSCsk7PTsfEVi TCjs5R/FLExiVHHQKj7WIEf7/7xFBpdlV0x6ruArBePZQY3TSDaDrbxE7T6I9jQf7xMf 8IVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=CguQsSptaH5uaB5XZK+Cip2Me0Q5t3R8tfGzhvCWyrU=; b=OyBwWE5hrskBf1Mma3B9bLhM0/NkOvlwen9UevzUjMxfznROJV+3CJ4tqCZ3vbecnr linEc53YgsicwHYLyU/yo9JcSxjdUGLen+QMpAFcEVru1Slecr+TpRpXZS/OTASCcUNz Qdu/7CgfLZMn7s7zj8AEzCJ9fcQ+sCjUF1nwQ76ckxWkg9XN5CANSdSi7C09xjxUO7bN te+rgK9x8IcQqxr/fhAaXhCWPG6prdyrMusywrXeW0N9FxnomsMVSihxvOJwUIwuF09G 4JDuYF/soOH3Le+4iYnLMyMrazQYqZ2Vk+xJZfZmxZk/WajswI06rruj63ymA4N+9Nlz 7PuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tk40Up4u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hq29si30966039ejc.133.2021.07.22.20.59.32; Thu, 22 Jul 2021 20:59:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tk40Up4u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233723AbhGWDRL (ORCPT + 99 others); Thu, 22 Jul 2021 23:17:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:37266 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233756AbhGWDRC (ORCPT ); Thu, 22 Jul 2021 23:17:02 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C027E60EE6; Fri, 23 Jul 2021 03:57:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627012656; bh=xWkpJRPBgVu7ghb0+9m/dqBnIov78P5tyBMJYtPGLao=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tk40Up4unfDIzKbrPB5C9VQlh3vY3Udg/5UIOh00n8WRcGD2vxcFZyuCKIOXjjpGO gXy3MLs0hlpgVFTxko49XupDyk40q0L5DAo5Pu/NzE3W72ACFxF29M+N+f5rzAQASl Ms9ryShH1DAw2Q5BmSEhZTNwTLL6ltBO/51QIQehbRbe4AHJEGKfKpqwM1Wb1vdNjt 4YFjK/GoY9FYmJEN8G+/zWU1MKEOIjEBJEEne9uSMBGRgQx+9YZig33cjR7l8nE5x9 utjjWUxeNwFXEzNZRuVRo1s/Vjlm7F6zzXFCPq2KEBMDXAo79ppX3V7UohJ3ZqKHoU LtQwdqGfmdL1Q== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Desmond Cheong Zhi Xi , Viacheslav Dubeyko , "Gustavo A . R . Silva" , Al Viro , Shuah Khan , Greg Kroah-Hartman , Andrew Morton , Linus Torvalds , Sasha Levin , linux-fsdevel@vger.kernel.org Subject: [PATCH AUTOSEL 5.13 11/19] hfs: add missing clean-up in hfs_fill_super Date: Thu, 22 Jul 2021 23:57:12 -0400 Message-Id: <20210723035721.531372-11-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210723035721.531372-1-sashal@kernel.org> References: <20210723035721.531372-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Desmond Cheong Zhi Xi [ Upstream commit 16ee572eaf0d09daa4c8a755fdb71e40dbf8562d ] Patch series "hfs: fix various errors", v2. This series ultimately aims to address a lockdep warning in hfs_find_init reported by Syzbot [1]. The work done for this led to the discovery of another bug, and the Syzkaller repro test also reveals an invalid memory access error after clearing the lockdep warning. Hence, this series is broken up into three patches: 1. Add a missing call to hfs_find_exit for an error path in hfs_fill_super 2. Fix memory mapping in hfs_bnode_read by fixing calls to kmap 3. Add lock nesting notation to tell lockdep that the observed locking hierarchy is safe This patch (of 3): Before exiting hfs_fill_super, the struct hfs_find_data used in hfs_find_init should be passed to hfs_find_exit to be cleaned up, and to release the lock held on the btree. The call to hfs_find_exit is missing from an error path. We add it back in by consolidating calls to hfs_find_exit for error paths. Link: https://syzkaller.appspot.com/bug?id=f007ef1d7a31a469e3be7aeb0fde0769b18585db [1] Link: https://lkml.kernel.org/r/20210701030756.58760-1-desmondcheongzx@gmail.com Link: https://lkml.kernel.org/r/20210701030756.58760-2-desmondcheongzx@gmail.com Signed-off-by: Desmond Cheong Zhi Xi Reviewed-by: Viacheslav Dubeyko Cc: Gustavo A. R. Silva Cc: Al Viro Cc: Shuah Khan Cc: Greg Kroah-Hartman Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/hfs/super.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/fs/hfs/super.c b/fs/hfs/super.c index 44d07c9e3a7f..12d9bae39363 100644 --- a/fs/hfs/super.c +++ b/fs/hfs/super.c @@ -420,14 +420,12 @@ static int hfs_fill_super(struct super_block *sb, void *data, int silent) if (!res) { if (fd.entrylength > sizeof(rec) || fd.entrylength < 0) { res = -EIO; - goto bail; + goto bail_hfs_find; } hfs_bnode_read(fd.bnode, &rec, fd.entryoffset, fd.entrylength); } - if (res) { - hfs_find_exit(&fd); - goto bail_no_root; - } + if (res) + goto bail_hfs_find; res = -EINVAL; root_inode = hfs_iget(sb, &fd.search_key->cat, &rec); hfs_find_exit(&fd); @@ -443,6 +441,8 @@ static int hfs_fill_super(struct super_block *sb, void *data, int silent) /* everything's okay */ return 0; +bail_hfs_find: + hfs_find_exit(&fd); bail_no_root: pr_err("get root inode failed\n"); bail: -- 2.30.2