Received: by 2002:a19:f614:0:0:0:0:0 with SMTP id x20csp59471lfe; Fri, 15 Apr 2022 19:27:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwyEa6dqd+ApTlxAg+7Gprol0vrHaURE6uk+wpFt6gtmRSmEBgakAaMJw7HcdVzlvpp13gh X-Received: by 2002:a17:90a:db16:b0:1cb:9ba8:5707 with SMTP id g22-20020a17090adb1600b001cb9ba85707mr7344394pjv.32.1650076034990; Fri, 15 Apr 2022 19:27:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650076034; cv=none; d=google.com; s=arc-20160816; b=Pp9SDsiQdPICrON8XJ43yad9v1CJke8Ery6MapF68oT9V/4FD7EP1uagmS+pjR9NU2 CYOTjIWYuSG5vlQMUgiz+Swu0Qkfs0KMKFQi+WOOU7iHGWue9ru7jw7463JksBIsCPBT OQEAi7rayU0gCHtpNsfGbRvOAAkjaxClgPk6SHjdhVXx0TVzvjz+OePr61HDHB97Jav8 4F7gsVvwRqIqW0/jHK+pwOUgfUyMRL8U97NOvBO2hAQFxgw1xjz+GFc3gclNj6SDkGFE fdjxn76VnvJUdavyIKluZloYv32ra6H3t1kRSlRIGK0tVK1Fue11HJRDnHd2kzeE7kl3 q0qQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SMnPnBcmumeKyKGDj+ZpAQoZ/E61BwcNYOU3z83zyeY=; b=ebq+kzzfdG2La3KGTkEUPNq2R5+m8bUO46D8U8RGdcZkMHSnig1CVI9uJCTPY0AAgk W6X34C9bgDGHQRdX3Yi5Qe2Oed4v3YPq0UjyDXK9LU3iXzg0jPdA9+iOLnwfWOfGNl+r +dQCpUFiyu9GTQgWkd2xp+42vIgPUGco9WkHzAJVPtiZkk7pTb88cf7bjD/IaRVZfUxM b2TBjC5Tio/ZiUL93YoMRqXg9p1kRKxq+/n7Bx3nSgSSxhr+vEOllZRy68oiEV7PaZTD 3J3LqHzMVOdX8yZorfuZr99+A8jC/rPjg2EvY4NjZbm6ZpO7Tvdb2NTJpR00X1DoCn9+ 2FoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1PG1tNo7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id t17-20020a170902e85100b0015605a57d10si2808840plg.523.2022.04.15.19.27.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 19:27:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1PG1tNo7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B1566F65E1; Fri, 15 Apr 2022 18:39:20 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242918AbiDNNTT (ORCPT + 99 others); Thu, 14 Apr 2022 09:19:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37046 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243738AbiDNNRY (ORCPT ); Thu, 14 Apr 2022 09:17:24 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 344B38FE50; Thu, 14 Apr 2022 06:15:00 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id C3ED9612DA; Thu, 14 Apr 2022 13:14:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D36C9C385A1; Thu, 14 Apr 2022 13:14:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649942099; bh=PaTngJ64p5Jnkri65TBcUAY1LQxwH7tWkPjQpSs/TRM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1PG1tNo7NkVKMfyRyCIEZ1dMyBMTrd+muj2MuK4b7ljx3ujHva+0TBL5UZ0O1rT8m DQ4srSa82kkZdJ9v+xjsz3gyc91QEOscx8+tCFJFtm7bQSpZbzEV7aDPJKDT90XQoM V5ndZdeuK+w5vYUIrsNn58J9wkyXL/o/YvXAkwEs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xie Yongji , "Michael S. Tsirkin" , Jens Axboe , Lee Jones Subject: [PATCH 4.19 015/338] virtio-blk: Use blk_validate_block_size() to validate block size Date: Thu, 14 Apr 2022 15:08:38 +0200 Message-Id: <20220414110839.326021105@linuxfoundation.org> X-Mailer: git-send-email 2.35.2 In-Reply-To: <20220414110838.883074566@linuxfoundation.org> References: <20220414110838.883074566@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xie Yongji commit 57a13a5b8157d9a8606490aaa1b805bafe6c37e1 upstream. The block layer can't support a block size larger than page size yet. And a block size that's too small or not a power of two won't work either. If a misconfigured device presents an invalid block size in configuration space, it will result in the kernel crash something like below: [ 506.154324] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 506.160416] RIP: 0010:create_empty_buffers+0x24/0x100 [ 506.174302] Call Trace: [ 506.174651] create_page_buffers+0x4d/0x60 [ 506.175207] block_read_full_page+0x50/0x380 [ 506.175798] ? __mod_lruvec_page_state+0x60/0xa0 [ 506.176412] ? __add_to_page_cache_locked+0x1b2/0x390 [ 506.177085] ? blkdev_direct_IO+0x4a0/0x4a0 [ 506.177644] ? scan_shadow_nodes+0x30/0x30 [ 506.178206] ? lru_cache_add+0x42/0x60 [ 506.178716] do_read_cache_page+0x695/0x740 [ 506.179278] ? read_part_sector+0xe0/0xe0 [ 506.179821] read_part_sector+0x36/0xe0 [ 506.180337] adfspart_check_ICS+0x32/0x320 [ 506.180890] ? snprintf+0x45/0x70 [ 506.181350] ? read_part_sector+0xe0/0xe0 [ 506.181906] bdev_disk_changed+0x229/0x5c0 [ 506.182483] blkdev_get_whole+0x6d/0x90 [ 506.183013] blkdev_get_by_dev+0x122/0x2d0 [ 506.183562] device_add_disk+0x39e/0x3c0 [ 506.184472] virtblk_probe+0x3f8/0x79b [virtio_blk] [ 506.185461] virtio_dev_probe+0x15e/0x1d0 [virtio] So let's use a block layer helper to validate the block size. Signed-off-by: Xie Yongji Acked-by: Michael S. Tsirkin Link: https://lore.kernel.org/r/20211026144015.188-5-xieyongji@bytedance.com Signed-off-by: Jens Axboe Signed-off-by: Lee Jones Signed-off-by: Greg Kroah-Hartman --- drivers/block/virtio_blk.c | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) --- a/drivers/block/virtio_blk.c +++ b/drivers/block/virtio_blk.c @@ -849,9 +849,17 @@ static int virtblk_probe(struct virtio_d err = virtio_cread_feature(vdev, VIRTIO_BLK_F_BLK_SIZE, struct virtio_blk_config, blk_size, &blk_size); - if (!err) + if (!err) { + err = blk_validate_block_size(blk_size); + if (err) { + dev_err(&vdev->dev, + "virtio_blk: invalid block size: 0x%x\n", + blk_size); + goto out_free_tags; + } + blk_queue_logical_block_size(q, blk_size); - else + } else blk_size = queue_logical_block_size(q); /* Use topology information if available */