Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp52808pxb; Mon, 13 Sep 2021 12:42:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJykd3w5jqko+KzCpnmR6QVGGOfjtUnu1Mwh42YGq2MEtEjLPV73S0nTQ5OgCCS/t+cUhNkf X-Received: by 2002:a17:906:3746:: with SMTP id e6mr11521280ejc.57.1631562147286; Mon, 13 Sep 2021 12:42:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631562147; cv=none; d=google.com; s=arc-20160816; b=fV1rA6BRFO5kcLN431+Od46UvabHztCktw7/7Sa6azH4xiWf+QC/VgmP6Xj0E1PjPw L/diYc7HmOgtoQ06LmnCsm0wqVt+KS2PmJYBKB4y21ShkL/DPorD3pvlHwb+abmNgslT PcdUc9uQtYkBsUNB6PkLeJdyd8LZ3OeLapYyn2vB5LbeJgfp6jGMfR36mdtPEt1WkDww ohxMb1XhhpT3itlk7ljIJBhhz7nwxrFnZKVAkWGekVQU2FVhdIsDt15gyNQrxTFxOyU+ AaLOx+KG1Rm6Uzhr5ljd/D/UxuMh66Ayrfz2hUgJrvx4rcoXp6Bn8AqEIHJBmrni8s9o uYOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hlJTkj2ODs6i8pCq4r2iIhYw0L5R8Uluc6S8BetU19Q=; b=qbpM5M4GZfPhPBsqtNXG/zQzPX26zDCxg6/1JnZkD1KFiXLsGPWgE1cTWBVKZ/WQLm 5tFvx8MXsKqyESD2zMHUbImAT2u58apqQv8S+ecjnF5X6MFtJ3xoeaDLkktuSluNk5jA pwSuxJf7skH7NKSaneGj/41bfOdlb6nDkomfKx8HalJ7siQN75a7Wl13rqFc+01xxy6Q 0KoN+BCbZhJFCNAs3YtB3zVyP6yG8gD6APizibfDsNHMlkUU8zs9iU88Ybc3s7K3kRvn hY/MGmiXXCGuCJaEYaleEFCrP31DJXjU+Kuztkqqc12SX756TxyvBQsKIskJF62zpg19 w3rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T+SS1gie; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ch10si8070196edb.4.2021.09.13.12.42.02; Mon, 13 Sep 2021 12:42:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T+SS1gie; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243193AbhIMNmK (ORCPT + 99 others); Mon, 13 Sep 2021 09:42:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:35546 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241380AbhIMNgX (ORCPT ); Mon, 13 Sep 2021 09:36:23 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C2129613A7; Mon, 13 Sep 2021 13:27:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631539669; bh=CPT4ZBiULuw3xhdWyYmp8eWV+zgr5iLX8NgXvtBw9Tk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T+SS1gie+MLPH+k6oKVo3RCTPVcIYQJjRYd9Z0CzrB2T2Sn5KPwIvgIbJHxgsoY4T 24j+mpr8AmorMJSxIqNSDwWkr8fs98o3drzVdpt4iQulSI/FQqS2MjjYlAq7RjrJAN 5bCN/Ifetqx7tKPzjrb6jd2E57VrZY+3Ha6uXmxE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Moore , Pavel Skripkin , "David S. Miller" , Sasha Levin , syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Subject: [PATCH 5.10 114/236] net: cipso: fix warnings in netlbl_cipsov4_add_std Date: Mon, 13 Sep 2021 15:13:39 +0200 Message-Id: <20210913131104.222949345@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131100.316353015@linuxfoundation.org> References: <20210913131100.316353015@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Skripkin [ Upstream commit 8ca34a13f7f9b3fa2c464160ffe8cc1a72088204 ] Syzbot reported warning in netlbl_cipsov4_add(). The problem was in too big doi_def->map.std->lvl.local_size passed to kcalloc(). Since this value comes from userpace there is no need to warn if value is not correct. The same problem may occur with other kcalloc() calls in this function, so, I've added __GFP_NOWARN flag to all kcalloc() calls there. Reported-and-tested-by: syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Fixes: 96cb8e3313c7 ("[NetLabel]: CIPSOv4 and Unlabeled packet integration") Acked-by: Paul Moore Signed-off-by: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/netlabel/netlabel_cipso_v4.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index 4f50a64315cf..50f40943c815 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c @@ -187,14 +187,14 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, } doi_def->map.std->lvl.local = kcalloc(doi_def->map.std->lvl.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; } doi_def->map.std->lvl.cipso = kcalloc(doi_def->map.std->lvl.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -263,7 +263,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.local = kcalloc( doi_def->map.std->cat.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -271,7 +271,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.cipso = kcalloc( doi_def->map.std->cat.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; -- 2.30.2