Headline
CVE-2020-8992: [v2] ext4: add cond_resched() to ext4_protect_reserved_inode
ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.
Message ID
State
Accepted
Headers
show
Series
[v2] ext4: add cond_resched() to ext4_protect_reserved_inode | expand
Commit Message****Comments
Patch
diff --git a/fs/ext4/block_validity.c b/fs/ext4/block_validity.c index 1ee04e76bbe0…0a734ffb4310 100644 — a/fs/ext4/block_validity.c +++ b/fs/ext4/block_validity.c @@ -207,6 +207,7 @@ static int ext4_protect_reserved_inode(struct super_block *sb, return PTR_ERR(inode); num = (inode->i_size + sb->s_blocksize - 1) >> sb->s_blocksize_bits; while (i < num) {
cond\_resched(); map.m\_lblk = i; map.m\_len = num - i; n = ext4\_map\_blocks(NULL, inode, &map, 0);