Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp479691yba; Mon, 1 Apr 2019 10:07:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqzQVJON4awjHAb0GWUx31YeXAUd9f4hIniydTlKZODj0EEO8xjGwg8CDUv1f/Cwhv7YAQUn X-Received: by 2002:a63:6fcf:: with SMTP id k198mr49192899pgc.158.1554138470528; Mon, 01 Apr 2019 10:07:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554138470; cv=none; d=google.com; s=arc-20160816; b=Ig1vfBvI6df741pawet75Y9H7uHR1S+Q9W1FyrO/gaT7NGKxliCGDNhbqE1jQfWxb8 6VRNvIHwHNI6vlnaOBo03Do7dnlGqOAL4iRP0JFFAGihsQrx6/VcL/Lt02XUC536eNl+ kczDbAE9APmpoMD/oBnrEOXZZmor6343Ns0iVZo03ky6dC1TA6g/mLFG8o2ASmkEpMmH rQ/MwK3T/rpGBhjtFoAidoIxGq5VG6NlcVpE6qd5peRcBlqjjlUSODvYoXyI3kNfUheu Fllo4oEJKUIbV4aPBQFYWjBgHDBg4ko4/ntNpQ2RK+RKWhXpxyzxk+RmaZU4MV+DpvYT y0iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W4E+J7ykrZgzT751745ubo7WyVD98PE4lCYdBhMDtKQ=; b=hKagFglxaqh0MESw4g3tR0N/7OhfkLJX7wEUmEDkwf+2/amU0pTUKNgpogjvIZYmq0 jVqrLCzd8+W/q69J00U5YxgFnS6ooSPwYWN5MLFcekiGjhH/86IDi+whhNT7pUagp+// cRauNXWbGbx5ICbFlh4LitDuSEG76cTS/8877clxq/FAp/ZgvLKFeAP7DFbMpHO1iWs6 Ki8zjKoViTrid9H3ZtZErLjIMp/ATCFeg1F0glqaYzQIA3woBAUZXQQ1qM9pfn1Va+3k wpWjRkiu45/O4GV/n3ldjlI1EWSpWfFMNmzto1ENM8VTjbvB73pIasnwkkd3aUWCMETN GYHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Huci3oSL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a23si8838003pls.188.2019.04.01.10.07.35; Mon, 01 Apr 2019 10:07:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Huci3oSL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729229AbfDARG0 (ORCPT + 99 others); Mon, 1 Apr 2019 13:06:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:51948 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729216AbfDARGY (ORCPT ); Mon, 1 Apr 2019 13:06:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8709721924; Mon, 1 Apr 2019 17:06:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554138384; bh=9CV7+nSd6kIKXRHlTxtdckGbg57cmsMS00v3spp6Jqw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Huci3oSLMWe9vl8ropOz8BNrdJJ+lnrbHVo1hgC84QRhrrrh78crKC59DyJRnyVkX NbH8fbdpAWWhSzAKAwcrPE00q32HKzS/qGB6onhAU4u42NQUYlxFwPNlpCZj4dm8C8 kh/zTxc2iZxRD0fhewB71C3b0JEdJZFKW3JxtS+o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qu Wenruo , Nikolay Borisov , David Sterba Subject: [PATCH 5.0 043/146] btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size Date: Mon, 1 Apr 2019 19:00:55 +0200 Message-Id: <20190401170052.186034840@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170048.449559024@linuxfoundation.org> References: <20190401170048.449559024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Nikolay Borisov commit 139a56170de67101791d6e6c8e940c6328393fe9 upstream. qgroup_rsv_size is calculated as the product of outstanding_extent * fs_info->nodesize. The product is calculated with 32 bit precision since both variables are defined as u32. Yet qgroup_rsv_size expects a 64 bit result. Avoid possible multiplication overflow by casting outstanding_extent to u64. Such overflow would in the worst case (64K nodesize) require more than 65536 extents, which is quite large and i'ts not likely that it would happen in practice. Fixes-coverity-id: 1435101 Fixes: ff6bc37eb7f6 ("btrfs: qgroup: Use independent and accurate per inode qgroup rsv") CC: stable@vger.kernel.org # 4.19+ Reviewed-by: Qu Wenruo Signed-off-by: Nikolay Borisov Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/extent-tree.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -6115,7 +6115,7 @@ static void btrfs_calculate_inode_block_ * * This is overestimating in most cases. */ - qgroup_rsv_size = outstanding_extents * fs_info->nodesize; + qgroup_rsv_size = (u64)outstanding_extents * fs_info->nodesize; spin_lock(&block_rsv->lock); block_rsv->size = reserve_size;