Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2319175pxb; Mon, 20 Sep 2021 18:42:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOn0WsOAa3peeMbACp1IZMFVCTXrzEVxJZU9oznucbUV/QPtM8Jhy5DP7eIu+2gKMCHOVQ X-Received: by 2002:a6b:ec03:: with SMTP id c3mr7963456ioh.179.1632188525745; Mon, 20 Sep 2021 18:42:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632188525; cv=none; d=google.com; s=arc-20160816; b=BhSEDQ6XKAc0eNNJxRGhdQ/p+poFBLHYpV3tsaneYUXLljH6+IbmryMsvDy7yaR6Rj NlxxXZ2aXa1RiQ5GBVdy+sA603m5JQZf6lrLjKWacXPpvTC/0pz9x0+o7s9fn4b/U0hL iN5VjjcthOzEKtz3JHkmV+SnuyiBIsE4Zf0H0q7xW2cGJpBWnOOtzk/gPH6iiyWnkELT wfyrTzaBOTltnIXJxu71YMm+RUrlT386iaoGdm70oapSbGj7/y4WkgnheLL3cn/hwr0U VMklVx+vYf3xlDMVFNGmY+1MM8YcwHDLM9d8YGdoMDPhEPYYww+bRXYRDn/A2f8tHYH0 B7ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=7O531fIXsTFQNZ0zrHbTrtnnTmDVlh1Rr4Wt+E9OZw0=; b=FZYkhBPXnYkXNCNQ5SZoC+Xgjj+JuwQhERF4bEFLsymO0XFKaUw8i5xuPiHFHIlWoS see8foDhVHH2h5SnA/qWkUrJcc5aMSge7wgxJl3u4CUpkFc36KXFHPnpKhFUWucF77ic D3L/64TleCNYL0Km6FfFuqtA/8HvzZhuVGrkfWlX/9f8/CjXswybkTlwinoQjQZgUtW3 pgAKtpk2R4AgOtzlXRTk7s3sfLCrSheQ3MM+SP7vvUNqSCQaJldYGiGcUtod1D5XUp7n rKQYdrUC+gajwGTvRFTHZ6hdTUXNnR7RjcYIrTByisVrL5EnieIJ1VCTfZQFgRNKUx4/ 0pZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="vXCOmcW/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y18si2139533iow.31.2021.09.20.18.41.53; Mon, 20 Sep 2021 18:42:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="vXCOmcW/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240223AbhITQtH (ORCPT + 99 others); Mon, 20 Sep 2021 12:49:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:36724 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243737AbhITQsL (ORCPT ); Mon, 20 Sep 2021 12:48:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id DAFE261222; Mon, 20 Sep 2021 16:46:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1632156404; bh=IqbTn1MvFeXAy+rBiPf4JN0oCguSHwSyiWLudmzB/Vc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vXCOmcW/o4f3ZUN+IO5q4BeI6bY8ojhSytPUwsyJHRnIaxQsu472CzzOMFeHNbEGM gaTVpg9tenFUgw/M4L/3e4Jksfak763SheboDvemMYab3r75G5Ye+9gvoY+M/vBRBn i4NH2TI3Q65UqVALRwtjgKWVzv78QliuJ5c8d0ZI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Moore , Pavel Skripkin , "David S. Miller" , Sasha Levin , syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Subject: [PATCH 4.4 043/133] net: cipso: fix warnings in netlbl_cipsov4_add_std Date: Mon, 20 Sep 2021 18:42:01 +0200 Message-Id: <20210920163914.059902750@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210920163912.603434365@linuxfoundation.org> References: <20210920163912.603434365@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Skripkin [ Upstream commit 8ca34a13f7f9b3fa2c464160ffe8cc1a72088204 ] Syzbot reported warning in netlbl_cipsov4_add(). The problem was in too big doi_def->map.std->lvl.local_size passed to kcalloc(). Since this value comes from userpace there is no need to warn if value is not correct. The same problem may occur with other kcalloc() calls in this function, so, I've added __GFP_NOWARN flag to all kcalloc() calls there. Reported-and-tested-by: syzbot+cdd51ee2e6b0b2e18c0d@syzkaller.appspotmail.com Fixes: 96cb8e3313c7 ("[NetLabel]: CIPSOv4 and Unlabeled packet integration") Acked-by: Paul Moore Signed-off-by: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/netlabel/netlabel_cipso_v4.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index 7fd1104ba900..d31cd4d509ca 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c @@ -205,14 +205,14 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, } doi_def->map.std->lvl.local = kcalloc(doi_def->map.std->lvl.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; } doi_def->map.std->lvl.cipso = kcalloc(doi_def->map.std->lvl.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->lvl.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -279,7 +279,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.local = kcalloc( doi_def->map.std->cat.local_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.local == NULL) { ret_val = -ENOMEM; goto add_std_failure; @@ -287,7 +287,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info, doi_def->map.std->cat.cipso = kcalloc( doi_def->map.std->cat.cipso_size, sizeof(u32), - GFP_KERNEL); + GFP_KERNEL | __GFP_NOWARN); if (doi_def->map.std->cat.cipso == NULL) { ret_val = -ENOMEM; goto add_std_failure; -- 2.30.2