Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1864138pxb; Mon, 13 Sep 2021 07:10:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJymvULuTWnUTRzxgXiUN3NzPFNuLcOxt/d5+pvKRexjY+w26DcGugltKwZkwOQrOeBgb77y X-Received: by 2002:a05:6e02:1a8a:: with SMTP id k10mr8037269ilv.1.1631542209450; Mon, 13 Sep 2021 07:10:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631542209; cv=none; d=google.com; s=arc-20160816; b=CL71p99Idk2ycd/n40kMyPQMcrj8ao3M9esykHTB/GyqtO1IuOP1jNzduAGcoDlXpr aI+gFF9cU4QxJmwNieMYwoUnLDUXKBjguNF1NbIp+zm6xNMQfJeCCpmFPNyIDYQtQ0Vg hlCtvwcHpLT3QwLjlDBK0DKsSYCNaavl22PpqVje1noNMZR9gKpP+TqIBNSm/g16QzHV nhwGmdL4pWMGYxo2LbWBJ271Mq+6YdpVsTZbbz7uMufgG3DZSUeTEsTfV+v8w5pxnGH7 Vz0vGNP2qX2jBKnjLLPuSi0ndx7UTUUvaT+Y12J5xswa7IWLTOWG/Gb+oiLVw/jcZcfn UvdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hlJTkj2ODs6i8pCq4r2iIhYw0L5R8Uluc6S8BetU19Q=; b=XiJ2DBQbq6KGfGBupAus7cE9aM/9IBc6q0+nDXsDw/GB5xhLE7MUQQYqVHEZ/Wze83 ta+62Y/IBSRgKl0n+PIykxAomh+sZNB+6GRsY1bV7IC/Aq3L4wZWuHa2vprnIZlNn0Br n9035YCcmRfJv6QI7HQjs6Ey3sKK4lXlJmxqnfyXgvIM7AWR5VYm63XWqvowGjwV0LB4 4Gz7iEDyKuCAc40+GsHnKFEez2lx/9qT3V9oc0JWYkmccACIWcipAkDco/PdRq7GDTtM OJqkfPmVC/1+LfXGmORbCG/i6YFjQEiPGkZxhCXZlv2gVV29GF1Nq86AQsodGl6/DvpZ n3+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CirGbjMx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o18si7984174jam.60.2021.09.13.07.09.54; Mon, 13 Sep 2021 07:10:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CirGbjMx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245716AbhIMOIP (ORCPT + 99 others); Mon, 13 Sep 2021 10:08:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:54742 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344310AbhIMOEp (ORCPT ); Mon, 13 Sep 2021 10:04:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 65D5061A63; Mon, 13 Sep 2021 13:39:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540362; bh=CPT4ZBiULuw3xhdWyYmp8eWV+zgr5iLX8NgXvtBw9Tk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CirGbjMxgJXJF90QBNFzhPsu4EMFigaOVTbUKZviIvTEmSeU2pyHa81QRAHsfGTXH VejVUubAUJM5QT5zXSuOEq1obJYQ8TaDfIj4uJQHKEVtmCHMIbskL1byQXhJfJZmWm bNV1uLtCK3ilm9RGWpoSk5WXAcBfdl92YmRuEnvI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Moore , Pavel Skripkin , "David S. Miller" , Sasha Levin , syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Subject: [PATCH 5.13 131/300] net: cipso: fix warnings in netlbl_cipsov4_add_std Date: Mon, 13 Sep 2021 15:13:12 +0200 Message-Id: <20210913131113.818875234@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131109.253835823@linuxfoundation.org> References: <20210913131109.253835823@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Skripkin [ Upstream commit 8ca34a13f7f9b3fa2c464160ffe8cc1a72088204 ] Syzbot reported warning in netlbl_cipsov4_add(). The problem was in too big doi_def->map.std->lvl.local_size passed to kcalloc(). Since this value comes from userpace there is no need to warn if value is not correct. The same problem may occur with other kcalloc() calls in this function, so, I've added __GFP_NOWARN flag to all kcalloc() calls there. Reported-and-tested-by: syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Fixes: 96cb8e3313c7 ("[NetLabel]: CIPSOv4 and Unlabeled packet integration") Acked-by: Paul Moore Signed-off-by: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/netlabel/netlabel_cipso_v4.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index 4f50a64315cf..50f40943c815 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c @@ -187,14 +187,14 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, } doi_def->map.std->lvl.local = kcalloc(doi_def->map.std->lvl.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; } doi_def->map.std->lvl.cipso = kcalloc(doi_def->map.std->lvl.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -263,7 +263,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.local = kcalloc( doi_def->map.std->cat.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -271,7 +271,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.cipso = kcalloc( doi_def->map.std->cat.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; -- 2.30.2