Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2331604ybz; Thu, 23 Apr 2020 16:10:42 -0700 (PDT) X-Google-Smtp-Source: APiQypLTZjpRclEMBl1+8cEVQR9KLhs422fmgUfKkkJFCa0fulIA7qXgdrZjFoj4Z85R+PkKpafX X-Received: by 2002:a05:6402:1684:: with SMTP id a4mr4650703edv.99.1587683441929; Thu, 23 Apr 2020 16:10:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587683441; cv=none; d=google.com; s=arc-20160816; b=UMUXOGOGd+qfbo9YL/gymUsDBJIIh1w5sL+D7CHh3WwmZLbWcOpuXhUrjKzFp9RilP u5AJKtIGqSMobeepOMvk6mGhfdU1Jk7Z5oO7hvkbuDdeJM1GG36NDnjrgsXt7vVCOs2a VqhuRm6NTOQt5bDXJGEr59xt2xFm8nXKpyfq2Q68zJSTiVnW91PE0Boka5jqkZ/FwWDx mKWoaS66p9i1VTJEZJ3ESxNV9OT4+RjNRNhf93WvjO5hjRHpS4e7SLCa5n/MksKIn+ke YSu8G+ckzsRgO+gA2UIAUW4RstE+xOz1N9Q9ZOP3PBHXTvvbv6FXLREOOR32moF1XRrl Vxlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=czorWIn/qZv94yABlbji4KILFTngsqFLy+5WH/hQX3w=; b=oFNtLg+C/Y0LoGOWPb/UJ1TGSyTVBiggPifYDtv5nnQNwdYJDNCNyn1gPw+zfSa1BJ SOzaDfGOpHRKCdrM92AEPJBCsL+YouGKcrqE4ggfbOEy9rB/qOJ4CG19FcgR336cy2zF 1IarYLCgn7doJT+IPJk0DjQgT/NFVVcVnZiYEyYr8NInBSyIOY9+jJ1Fyhmj/LlGtTCL xfA02tiemUzQf0nRziCScoEmfHra71E6gwIljcSrkOolJoHG6kjYzRbWGRY4MyiNgLLp 0ETPxyZqgM7umEu3S/xf9Ft2fA6JNbuPapT078HZ3tYFGMS/AWWfCT16xPJjCRVm2qwd KGvQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k3si2053123edk.571.2020.04.23.16.10.18; Thu, 23 Apr 2020 16:10:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728773AbgDWXHK (ORCPT + 99 others); Thu, 23 Apr 2020 19:07:10 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:49670 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728402AbgDWXGr (ORCPT ); Thu, 23 Apr 2020 19:06:47 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1jRkvT-0004iP-Kw; Fri, 24 Apr 2020 00:06:35 +0100 Received: from ben by deadeye with local (Exim 4.93) (envelope-from ) id 1jRkvR-00E6ow-1A; Fri, 24 Apr 2020 00:06:33 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "Theodore Ts'o" , "Jan Kara" Date: Fri, 24 Apr 2020 00:05:50 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 123/245] ext4: check for directory entries too close to block end In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.83-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Jan Kara commit 109ba779d6cca2d519c5dd624a3276d03e21948e upstream. ext4_check_dir_entry() currently does not catch a case when a directory entry ends so close to the block end that the header of the next directory entry would not fit in the remaining space. This can lead to directory iteration code trying to access address beyond end of current buffer head leading to oops. Signed-off-by: Jan Kara Link: https://lore.kernel.org/r/20191202170213.4761-3-jack@suse.cz Signed-off-by: Theodore Ts'o Signed-off-by: Ben Hutchings --- fs/ext4/dir.c | 5 +++++ 1 file changed, 5 insertions(+) --- a/fs/ext4/dir.c +++ b/fs/ext4/dir.c @@ -78,6 +78,11 @@ int __ext4_check_dir_entry(const char *f error_msg = "rec_len is too small for name_len"; else if (unlikely(((char *) de - buf) + rlen > size)) error_msg = "directory entry overrun"; + else if (unlikely(((char *) de - buf) + rlen > + size - EXT4_DIR_REC_LEN(1) && + ((char *) de - buf) + rlen != size)) { + error_msg = "directory entry too close to block end"; + } else if (unlikely(le32_to_cpu(de->inode) > le32_to_cpu(EXT4_SB(dir->i_sb)->s_es->s_inodes_count))) error_msg = "inode out of bounds";