Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp966658pxb; Wed, 6 Apr 2022 05:32:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyxoIRGVzV/BHip8jHmwNKH3gwRsh/TBIn/PU1bjWdS8UHM5Gck4dG+LYfPnSpQonRoFGT5 X-Received: by 2002:a05:6a00:1a4e:b0:4fb:4188:d72a with SMTP id h14-20020a056a001a4e00b004fb4188d72amr8702771pfv.24.1649248366517; Wed, 06 Apr 2022 05:32:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649248366; cv=none; d=google.com; s=arc-20160816; b=HR6Nf8rVdswUpmbZUnoX4fau2HiACZq4eCtx5+TZ/8DaHVwMbdLbHAtnhjdZlc0iPE umUC8/ImyTXv/nH3+wt72A9sa1aDGRPP7unArlDovFFo+G7b0VbRfh6M5/CZKDwX4C1T 2bmC5fNHx5d/M647PMozkugS4xcEjdJR0qXycS4GGtV/YcXD0GTePIDGC4FwsgAbrIOK ljhGK0zz1ot2FWyN5QdUPcKqnG3W1q1cVjZEG8cEcZ9P9OLRRqr8idskNfktLW3o4qfN pJYxJIrMQJtdiSZaAzF/8DfA+Dn7FMEgROSN+qi+YHeDq6A0V5rBGMpzIGnKIuWXCBBh 7YwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=F2kTL4YuBTPq1wvPyu2dhMpZjPS39v3wIlWkllaMNss=; b=r5P0BXG6gAmn27ansfy4F3Qo9ZazOHWLZ43FwrPTqotlVgL3Nnca6XXVW8I1RPRZE5 cN2cZ/+ZFuuBpxYjtDAgnBfppmAAachGY8YhCjMmtinInqjmARrdyL8PDsmJg4sXTMso Yqz6jIANA53p0QkA7bGqC1mrnY1KujIscLtcW6hN5vR6N4byXRHmUXdNUI/KwSC5wuJ5 O02XRZ/oxhs4Xc09d2KuEvIeiGSvhlM322KYsMrAz/aSqrxXDbhtXSfiJ9kS7Q/DwdcL XNd1sbKxCnpQqr69xYM8CWnAmL2/D/ELxltzuvhZQxih+8IDOsqJXKpEZF7mXSstYaGG P/NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fHl9h1uY; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u6-20020a17090341c600b00156e028729fsi2994976ple.263.2022.04.06.05.32.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 05:32:46 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fHl9h1uY; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 12F6653E7F7; Wed, 6 Apr 2022 02:13:21 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1840100AbiDFBHK (ORCPT + 99 others); Tue, 5 Apr 2022 21:07:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354577AbiDEKOk (ORCPT ); Tue, 5 Apr 2022 06:14:40 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28D204991A; Tue, 5 Apr 2022 03:01:27 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B87E461676; Tue, 5 Apr 2022 10:01:26 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C345EC385A2; Tue, 5 Apr 2022 10:01:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649152886; bh=na5hAgnCaVoKY/ciAWchSLPD1IiKCXLoiXTbpqxLsgQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fHl9h1uYxEAUJxIRukFflygXn3K0GEiuoOJbtR0qq+9jwXChDU6oIUMDUr71vJ+xx a0/+KTSQvSC04oEZQ7qaS7uzHLfeQpY1SmWpsszoNDD+AZgJheEQGmY/ct1Qs+klTH rbuCYzJBIynylu26tSbMcUNZh2zkYkbmrp3eDgBQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xie Yongji , "Michael S. Tsirkin" , Jens Axboe , Lee Jones Subject: [PATCH 5.10 024/599] virtio-blk: Use blk_validate_block_size() to validate block size Date: Tue, 5 Apr 2022 09:25:18 +0200 Message-Id: <20220405070259.539372553@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070258.802373272@linuxfoundation.org> References: <20220405070258.802373272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xie Yongji commit 57a13a5b8157d9a8606490aaa1b805bafe6c37e1 upstream. The block layer can't support a block size larger than page size yet. And a block size that's too small or not a power of two won't work either. If a misconfigured device presents an invalid block size in configuration space, it will result in the kernel crash something like below: [ 506.154324] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 506.160416] RIP: 0010:create_empty_buffers+0x24/0x100 [ 506.174302] Call Trace: [ 506.174651] create_page_buffers+0x4d/0x60 [ 506.175207] block_read_full_page+0x50/0x380 [ 506.175798] ? __mod_lruvec_page_state+0x60/0xa0 [ 506.176412] ? __add_to_page_cache_locked+0x1b2/0x390 [ 506.177085] ? blkdev_direct_IO+0x4a0/0x4a0 [ 506.177644] ? scan_shadow_nodes+0x30/0x30 [ 506.178206] ? lru_cache_add+0x42/0x60 [ 506.178716] do_read_cache_page+0x695/0x740 [ 506.179278] ? read_part_sector+0xe0/0xe0 [ 506.179821] read_part_sector+0x36/0xe0 [ 506.180337] adfspart_check_ICS+0x32/0x320 [ 506.180890] ? snprintf+0x45/0x70 [ 506.181350] ? read_part_sector+0xe0/0xe0 [ 506.181906] bdev_disk_changed+0x229/0x5c0 [ 506.182483] blkdev_get_whole+0x6d/0x90 [ 506.183013] blkdev_get_by_dev+0x122/0x2d0 [ 506.183562] device_add_disk+0x39e/0x3c0 [ 506.184472] virtblk_probe+0x3f8/0x79b [virtio_blk] [ 506.185461] virtio_dev_probe+0x15e/0x1d0 [virtio] So let's use a block layer helper to validate the block size. Signed-off-by: Xie Yongji Acked-by: Michael S. Tsirkin Link: https://lore.kernel.org/r/20211026144015.188-5-xieyongji@bytedance.com Signed-off-by: Jens Axboe Signed-off-by: Lee Jones Signed-off-by: Greg Kroah-Hartman --- drivers/block/virtio_blk.c | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) --- a/drivers/block/virtio_blk.c +++ b/drivers/block/virtio_blk.c @@ -825,9 +825,17 @@ static int virtblk_probe(struct virtio_d err = virtio_cread_feature(vdev, VIRTIO_BLK_F_BLK_SIZE, struct virtio_blk_config, blk_size, &blk_size); - if (!err) + if (!err) { + err = blk_validate_block_size(blk_size); + if (err) { + dev_err(&vdev->dev, + "virtio_blk: invalid block size: 0x%x\n", + blk_size); + goto out_free_tags; + } + blk_queue_logical_block_size(q, blk_size); - else + } else blk_size = queue_logical_block_size(q); /* Use topology information if available */