Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3530758imu; Mon, 7 Jan 2019 05:10:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN7VJlnqKc5NkowKhuoRMpmW/TpWjvs2Z2eIzGZWUQwaIgS39r/wDIpd55jbvUecBnO5Kyxn X-Received: by 2002:a17:902:280b:: with SMTP id e11mr61427994plb.269.1546866633642; Mon, 07 Jan 2019 05:10:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546866633; cv=none; d=google.com; s=arc-20160816; b=eXW/lIhDi4A0fF70yKlDIJ31uLR46BcjuMnVBnYU6eLZqc9dL264CGtimYfumjl7wh DjMwI657i3QM5uxhcG02ON9+Rqac5tJ9XYScmzGRvmbtX0QhF7VJByAj0iUfRkQKNi6d pJgv4fn35vLXQ1cxy7qEx0EUJfkzmhNmLX7TYh6yXUATiquep9bA7pCMiuPpUL3+g7vL +EvBawi9nsfOcUfscS72VKv2EHRrZL9h/2E8tPbzzyL6mCROSsVrsNILjrWTTmvFPp0K yykCsJSiLVCtVP4IqXXsR9wAi0itKyNoglF3sOESODJmxzB8nTr/C2na1TKttuH0HjgM kS/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ba2ZT+SYlXf5T4ZTv1nM+aEqHCdAoxdIZ3fkpKFIe+8=; b=eHu7R4FT7QjhjTlUv053d+1ukGnQ9HLwzO05Hk/Qybfe9x2UJt3qPZuaYy8mxnIm3g kkB43GTky2TEq35Pn1kuRkeoFpelQO2dJzVPD4LZxVEAO6elYtfOUFPxBEHR9n0COgqn FSIC1vjOW4oN9cdgfOgR6kEcgoIl4+s4/KhV+L+6eBxY/0se1/IijtVMBqsDEI/a21AO VQCtjShn7APkeKWn7zNa4SLE8S+p9CbwQDE0cvfdFuxGX7w0fkMYVMGcnJaxneTQGanm qZsHUG/mHeWIsyxlY1kUkybXjSNbRb5bmRzXDR34+AJnXKXo/WW5b8ZOZ0hmHVvQ5h6q V+9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iMm62ejG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si30851395plq.138.2019.01.07.05.10.18; Mon, 07 Jan 2019 05:10:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iMm62ejG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731394AbfAGNIQ (ORCPT + 99 others); Mon, 7 Jan 2019 08:08:16 -0500 Received: from mail.kernel.org ([198.145.29.99]:55292 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730855AbfAGNIN (ORCPT ); Mon, 7 Jan 2019 08:08:13 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E1002147C; Mon, 7 Jan 2019 13:08:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546866492; bh=yQsP6D9eSNhsSXu8JtO7Z9/J9ZFq+f8FMR8HkpVADPk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iMm62ejGmaFZrqVhEOa6QwUZqdPmhgrUq7yi5GCIZK2j5wOKipacU7atC5vsUJhm8 A8R9f9LyDACcdOHqCWP+chZ76Yj31gjCWiWB+vOo/wmpooF0ZFBRLNEObdxvj4pvYd 5sZDemgIMQEmHvUZ359EbU7KCjkdkqSANmwvLkG4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve Graham , Theodore Tso , stable@kernel.org Subject: [PATCH 4.9 49/71] ext4: include terminating u32 in size of xattr entries when expanding inodes Date: Mon, 7 Jan 2019 13:33:18 +0100 Message-Id: <20190107105335.546078808@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107105330.280153213@linuxfoundation.org> References: <20190107105330.280153213@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Theodore Ts'o commit a805622a757b6d7f65def4141d29317d8e37b8a1 upstream. In ext4_expand_extra_isize_ea(), we calculate the total size of the xattr header, plus the xattr entries so we know how much of the beginning part of the xattrs to move when expanding the inode extra size. We need to include the terminating u32 at the end of the xattr entries, or else if there is uninitialized, non-zero bytes after the xattr entries and before the xattr values, the list of xattr entries won't be properly terminated. Reported-by: Steve Graham Signed-off-by: Theodore Ts'o Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/xattr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/ext4/xattr.c +++ b/fs/ext4/xattr.c @@ -1499,7 +1499,7 @@ retry: base = IFIRST(header); end = (void *)raw_inode + EXT4_SB(inode->i_sb)->s_inode_size; min_offs = end - base; - total_ino = sizeof(struct ext4_xattr_ibody_header); + total_ino = sizeof(struct ext4_xattr_ibody_header) + sizeof(u32); error = xattr_check_inode(inode, header, end); if (error)