diff options
author | Phillip Lougher <phillip@lougher.demon.co.uk> | 2011-05-23 23:33:34 -0400 |
---|---|---|
committer | Phillip Lougher <phillip@lougher.demon.co.uk> | 2011-05-25 13:21:33 -0400 |
commit | 1cac63cc9b2ff0d16ab2d16232b1a6ee8676a47b (patch) | |
tree | 31ee36dac4a1b351c153058ffa0799a959ba0272 /fs/squashfs/fragment.c | |
parent | ac51a0a7139aa93bf1176b701c86fa3d2bdf6106 (diff) |
Squashfs: add sanity checks to fragment reading at mount time
Fsfuzzer generates corrupted filesystems which throw a warn_on in
kmalloc. One of these is due to a corrupted superblock fragments field.
Fix this by checking that the number of bytes to be read (and allocated)
does not extend into the next filesystem structure.
Also add a couple of other sanity checks of the mount-time fragment table
structures.
Signed-off-by: Phillip Lougher <phillip@lougher.demon.co.uk>
Diffstat (limited to 'fs/squashfs/fragment.c')
-rw-r--r-- | fs/squashfs/fragment.c | 24 |
1 files changed, 22 insertions, 2 deletions
diff --git a/fs/squashfs/fragment.c b/fs/squashfs/fragment.c index 567093db5870..bfd707569ab7 100644 --- a/fs/squashfs/fragment.c +++ b/fs/squashfs/fragment.c | |||
@@ -71,9 +71,29 @@ int squashfs_frag_lookup(struct super_block *sb, unsigned int fragment, | |||
71 | * Read the uncompressed fragment lookup table indexes off disk into memory | 71 | * Read the uncompressed fragment lookup table indexes off disk into memory |
72 | */ | 72 | */ |
73 | __le64 *squashfs_read_fragment_index_table(struct super_block *sb, | 73 | __le64 *squashfs_read_fragment_index_table(struct super_block *sb, |
74 | u64 fragment_table_start, unsigned int fragments) | 74 | u64 fragment_table_start, u64 next_table, unsigned int fragments) |
75 | { | 75 | { |
76 | unsigned int length = SQUASHFS_FRAGMENT_INDEX_BYTES(fragments); | 76 | unsigned int length = SQUASHFS_FRAGMENT_INDEX_BYTES(fragments); |
77 | __le64 *table; | ||
77 | 78 | ||
78 | return squashfs_read_table(sb, fragment_table_start, length); | 79 | /* |
80 | * Sanity check, length bytes should not extend into the next table - | ||
81 | * this check also traps instances where fragment_table_start is | ||
82 | * incorrectly larger than the next table start | ||
83 | */ | ||
84 | if (fragment_table_start + length > next_table) | ||
85 | return ERR_PTR(-EINVAL); | ||
86 | |||
87 | table = squashfs_read_table(sb, fragment_table_start, length); | ||
88 | |||
89 | /* | ||
90 | * table[0] points to the first fragment table metadata block, this | ||
91 | * should be less than fragment_table_start | ||
92 | */ | ||
93 | if (!IS_ERR(table) && table[0] >= fragment_table_start) { | ||
94 | kfree(table); | ||
95 | return ERR_PTR(-EINVAL); | ||
96 | } | ||
97 | |||
98 | return table; | ||
79 | } | 99 | } |