Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5616357imu; Mon, 26 Nov 2018 03:03:44 -0800 (PST) X-Google-Smtp-Source: AFSGD/Vd0XhPswe0KR+JTKt13mEQODN7SSw40CbgfaIt9T2IWEtrmuJK2rEAGxmkDMVRfXGYZz3N X-Received: by 2002:a17:902:930b:: with SMTP id bc11mr27743970plb.17.1543230224243; Mon, 26 Nov 2018 03:03:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543230224; cv=none; d=google.com; s=arc-20160816; b=axXGL2EjE7SWOdqnyfWyo7dQmEc21qsNmb7DjstSZpurWHDLnnfBFVQJmO6w3p/rcV B7B0hN7ZFgMnL+QO27rDSj+JLHXMOSyz8w71/mcXho/881o88tXXybOD53JPmA2dNWIA 5VioiNTIjDTgmx1iGxFRlfrJc0gez7vOgfhiBhGq+vFCp9KImRKncqY/xVTTgKn52Uaf x6jbXwNCirr6Eu01Ua4KMXCsHlpyFL+hWgT7Ep4cJ3rLa7737O+GJBfLr7vWUnwCSuHz GnMULA6PXLHfbMLeeM/AF7LlJl0J2CUjV5b3BEOhGmBMMYqyL26sQ59tG8M0qdlcTSr7 vB8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RCV1EIwWqZA1ECdlruEzm48QD514IpNQ0GJVJ5pCPZ4=; b=uKbAozHsQNkbRdq0mponLl9cILHRB7jvkhDYkkQlu6GKP7f1wzU+v1f7xFdO7kJQiD laWkSFZxnsPxkndS3aVq/E8wU5lSHknOpqBN4mxOJ3mLgHqzord5FMgBicmR7p6QLueE UrDAa4U2qiuxjs+YQExA8c4XVcEXooYtRRr3wjZzMe38pgmg0b/wgROb9p0UzUWzR5Ap 1C8v26+z3axYhEX7kOdCs14GaBDZzVq7HktM6sAKO80yvKDHR9kQ09x/2pfxPIgJ+xub YSNinuI7K6Yt+ZR0JPWLArrlh9jKL/ErbuJ8e9RGwnmm/A9pMr73mTNBzjbnMQ/qCpFu nGQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvdJePfY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n1si59818319pgq.36.2018.11.26.03.03.23; Mon, 26 Nov 2018 03:03:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvdJePfY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729337AbeKZVz6 (ORCPT + 99 others); Mon, 26 Nov 2018 16:55:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:38846 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729237AbeKZVz6 (ORCPT ); Mon, 26 Nov 2018 16:55:58 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 80BBD21104; Mon, 26 Nov 2018 11:02:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543230133; bh=GxmSVeZuIDkhOqlr/axmfKSvzRFNrkHAKHimvKYCoz4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hvdJePfY4WefB7WftaYSkGCn+o07ilpDHxBWtBwNI7xqvH3sbJB1ktAq0JQELWa8z IDTv3AQi54LTt1jhQPu9n1SsRGqZRNMzmSWXnI+ZsMhtd5avveHLIxiE92XB/XtJE6 0f+xcDNUxMLXLVLJ4MS1LwGEc3TD65YdhHlgXOt8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , Steve French , Aurelien Aptel , Sasha Levin Subject: [PATCH 4.19 003/118] cifs: fix return value for cifs_listxattr Date: Mon, 26 Nov 2018 11:49:57 +0100 Message-Id: <20181126105059.971474691@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181126105059.832485122@linuxfoundation.org> References: <20181126105059.832485122@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0c5d6cb6643f48ad3775322f3ebab6c7eb67484e ] If the application buffer was too small to fit all the names we would still count the number of bytes and return this for listxattr. This would then trigger a BUG in usercopy.c Fix the computation of the size so that we return -ERANGE correctly when the buffer is too small. This fixes the kernel BUG for xfstest generic/377 Signed-off-by: Ronnie Sahlberg Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Sasha Levin --- fs/cifs/smb2ops.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c index 89985a0a6819..812da3e56a22 100644 --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -686,6 +686,7 @@ move_smb2_ea_to_cifs(char *dst, size_t dst_size, int rc = 0; unsigned int ea_name_len = ea_name ? strlen(ea_name) : 0; char *name, *value; + size_t buf_size = dst_size; size_t name_len, value_len, user_name_len; while (src_size > 0) { @@ -721,9 +722,10 @@ move_smb2_ea_to_cifs(char *dst, size_t dst_size, /* 'user.' plus a terminating null */ user_name_len = 5 + 1 + name_len; - rc += user_name_len; - - if (dst_size >= user_name_len) { + if (buf_size == 0) { + /* skip copy - calc size only */ + rc += user_name_len; + } else if (dst_size >= user_name_len) { dst_size -= user_name_len; memcpy(dst, "user.", 5); dst += 5; @@ -731,8 +733,7 @@ move_smb2_ea_to_cifs(char *dst, size_t dst_size, dst += name_len; *dst = 0; ++dst; - } else if (dst_size == 0) { - /* skip copy - calc size only */ + rc += user_name_len; } else { /* stop before overrun buffer */ rc = -ERANGE; -- 2.17.1