aboutsummaryrefslogtreecommitdiffstats
path: root/fs/squashfs/fragment.c
diff options
context:
space:
mode:
authorPhillip Lougher <phillip@lougher.demon.co.uk>2011-05-23 23:33:34 -0400
committerPhillip Lougher <phillip@lougher.demon.co.uk>2011-05-25 13:21:33 -0400
commit1cac63cc9b2ff0d16ab2d16232b1a6ee8676a47b (patch)
tree31ee36dac4a1b351c153058ffa0799a959ba0272 /fs/squashfs/fragment.c
parentac51a0a7139aa93bf1176b701c86fa3d2bdf6106 (diff)
Squashfs: add sanity checks to fragment reading at mount time
Fsfuzzer generates corrupted filesystems which throw a warn_on in kmalloc. One of these is due to a corrupted superblock fragments field. Fix this by checking that the number of bytes to be read (and allocated) does not extend into the next filesystem structure. Also add a couple of other sanity checks of the mount-time fragment table structures. Signed-off-by: Phillip Lougher <phillip@lougher.demon.co.uk>
Diffstat (limited to 'fs/squashfs/fragment.c')
-rw-r--r--fs/squashfs/fragment.c24
1 files changed, 22 insertions, 2 deletions
diff --git a/fs/squashfs/fragment.c b/fs/squashfs/fragment.c
index 567093db5870..bfd707569ab7 100644
--- a/fs/squashfs/fragment.c
+++ b/fs/squashfs/fragment.c
@@ -71,9 +71,29 @@ int squashfs_frag_lookup(struct super_block *sb, unsigned int fragment,
71 * Read the uncompressed fragment lookup table indexes off disk into memory 71 * Read the uncompressed fragment lookup table indexes off disk into memory
72 */ 72 */
73__le64 *squashfs_read_fragment_index_table(struct super_block *sb, 73__le64 *squashfs_read_fragment_index_table(struct super_block *sb,
74 u64 fragment_table_start, unsigned int fragments) 74 u64 fragment_table_start, u64 next_table, unsigned int fragments)
75{ 75{
76 unsigned int length = SQUASHFS_FRAGMENT_INDEX_BYTES(fragments); 76 unsigned int length = SQUASHFS_FRAGMENT_INDEX_BYTES(fragments);
77 __le64 *table;
77 78
78 return squashfs_read_table(sb, fragment_table_start, length); 79 /*
80 * Sanity check, length bytes should not extend into the next table -
81 * this check also traps instances where fragment_table_start is
82 * incorrectly larger than the next table start
83 */
84 if (fragment_table_start + length > next_table)
85 return ERR_PTR(-EINVAL);
86
87 table = squashfs_read_table(sb, fragment_table_start, length);
88
89 /*
90 * table[0] points to the first fragment table metadata block, this
91 * should be less than fragment_table_start
92 */
93 if (!IS_ERR(table) && table[0] >= fragment_table_start) {
94 kfree(table);
95 return ERR_PTR(-EINVAL);
96 }
97
98 return table;
79} 99}