Hi Andrew, Sorry for the delay in replying.
> On 19 Feb 2021, at 18:49, Andrew Morton <a...@linux-foundation.org> wrote: > > On Fri, 19 Feb 2021 01:54:30 +0000 Anton Altaparmakov <an...@tuxera.com> > wrote: > >> Hi Andrew, >> >> Can you please push this one upstream? Thanks a lot in advance! > > The changelog is a bit brief... Yes you are right it is a bit brief. I guess I thought the syzkaller link was sufficient... Rustam would you like to resubmit with an improved/extended description? >>> On 17 Feb 2021, at 15:59, Rustam Kovhaev <rkovh...@gmail.com> wrote: >>> >>> we should check for valid STANDARD_INFORMATION attribute offset and >>> length before trying to access it > > It's a kernel a crash and I assume it results from mounting a corrupted > filesystem? > > I think it's worth a cc:stable, yes? The problem is an invalid memory access due to corrupt on-disk metadata. The issue with NTFS is that it is effectively a relational database so it is full of "struct X, field A" contains offset to "struct Y" so you get: "&struct Y = &struct X + X->A" and if the value of A is corrupt on-disk then your Y pointer is now pointing to random memory. The patch fixes one such place by validating that Y pointer is within bounds of the structure/buffer it is in. So I guess this could be worth a cc:stable? I guess we can add it and Greg / others can decide whether to put it into stable or not... Rustam when resubmitting with better description, please also add the "Cc: sta...@vger.kernel.org" line together with the "Signed-off-by", etc lines (note no need to actually put this in CC: field of the email iteslf). Best regards, Anton -- Anton Altaparmakov <anton at tuxera.com> (replace at with @) Lead in File System Development, Tuxera Inc., http://www.tuxera.com/ Linux NTFS maintainer