On Fri, Mar 31, 2017 at 06:29:34PM -0700, Darrick J. Wong wrote: > Fix a couple of memory exposure problems in the getbmap implementation > where we copy too much header data from userspace, and a second problem > in inumbers where we allocate an array of structures with holes, fail to > zero the holes, then blindly copy the kernel memory contents into > userspace. This should be two different patches. > --- a/fs/xfs/xfs_ioctl.c > +++ b/fs/xfs/xfs_ioctl.c > @@ -1547,10 +1547,10 @@ xfs_ioc_getbmap( > unsigned int cmd, > void __user *arg) > { > - struct getbmapx bmx; > + struct getbmapx bmx = {0}; missing spaces around the zero. > int error; > > - if (copy_from_user(&bmx, arg, sizeof(struct getbmapx))) > + if (copy_from_user(&bmx, arg, sizeof(struct getbmap))) > return -EFAULT; This really needs a comment on how struct getbmap is a strict subset of struct getbmapx. Or even better don't use getbmap at all and use offsetoff on struct getbmapx. > diff --git a/fs/xfs/xfs_itable.c b/fs/xfs/xfs_itable.c > index e775f78..55642cd 100644 > --- a/fs/xfs/xfs_itable.c > +++ b/fs/xfs/xfs_itable.c > @@ -584,7 +584,7 @@ xfs_inumbers( > return error; > > bcount = MIN(left, (int)(PAGE_SIZE / sizeof(*buffer))); > - buffer = kmem_alloc(bcount * sizeof(*buffer), KM_SLEEP); > + buffer = kmem_zalloc(bcount * sizeof(*buffer), KM_SLEEP); This looks fine: Reviewed-by: Christoph Hellwig <hch@xxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-xfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html