Commit graph

1353 commits

Author SHA1 Message Date
Ryusuke Konishi
1870c5b6dc nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
commit 2026559a6c4ce34db117d2db8f710fe2a9420d5a upstream.

When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty()
may cause a NULL pointer dereference, or a general protection fault when
KASAN is enabled.

This happens because, since the tracepoint was added in
mark_buffer_dirty(), it references the dev_t member bh->b_bdev->bd_dev
regardless of whether the buffer head has a pointer to a block_device
structure.

In the current implementation, nilfs_grab_buffer(), which grabs a buffer
to read (or create) a block of metadata, including b-tree node blocks,
does not set the block device, but instead does so only if the buffer is
not in the "uptodate" state for each of its caller block reading
functions.  However, if the uptodate flag is set on a folio/page, and the
buffer heads are detached from it by try_to_free_buffers(), and new buffer
heads are then attached by create_empty_buffers(), the uptodate flag may
be restored to each buffer without the block device being set to
bh->b_bdev, and mark_buffer_dirty() may be called later in that state,
resulting in the bug mentioned above.

Fix this issue by making nilfs_grab_buffer() always set the block device
of the super block structure to the buffer head, regardless of the state
of the buffer's uptodate flag.

Link: https://lkml.kernel.org/r/20241106160811.3316-3-konishi.ryusuke@gmail.com
Fixes: 5305cb830834 ("block: add block_{touch|dirty}_buffer tracepoint")
Signed-off-by: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Cc: Tejun Heo <tj@kernel.org>
Cc: Ubisectech Sirius <bugreport@valiantsec.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:20:51 +01:00
Dmitry Antipov
c6a4ad37e7 ocfs2: fix UBSAN warning in ocfs2_verify_volume()
commit 23aab037106d46e6168ce1214a958ce9bf317f2e upstream.

Syzbot has reported the following splat triggered by UBSAN:

UBSAN: shift-out-of-bounds in fs/ocfs2/super.c:2336:10
shift exponent 32768 is too large for 32-bit type 'int'
CPU: 2 UID: 0 PID: 5255 Comm: repro Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x241/0x360
 ? __pfx_dump_stack_lvl+0x10/0x10
 ? __pfx__printk+0x10/0x10
 ? __asan_memset+0x23/0x50
 ? lockdep_init_map_type+0xa1/0x910
 __ubsan_handle_shift_out_of_bounds+0x3c8/0x420
 ocfs2_fill_super+0xf9c/0x5750
 ? __pfx_ocfs2_fill_super+0x10/0x10
 ? __pfx_validate_chain+0x10/0x10
 ? __pfx_validate_chain+0x10/0x10
 ? validate_chain+0x11e/0x5920
 ? __lock_acquire+0x1384/0x2050
 ? __pfx_validate_chain+0x10/0x10
 ? string+0x26a/0x2b0
 ? widen_string+0x3a/0x310
 ? string+0x26a/0x2b0
 ? bdev_name+0x2b1/0x3c0
 ? pointer+0x703/0x1210
 ? __pfx_pointer+0x10/0x10
 ? __pfx_format_decode+0x10/0x10
 ? __lock_acquire+0x1384/0x2050
 ? vsnprintf+0x1ccd/0x1da0
 ? snprintf+0xda/0x120
 ? __pfx_lock_release+0x10/0x10
 ? do_raw_spin_lock+0x14f/0x370
 ? __pfx_snprintf+0x10/0x10
 ? set_blocksize+0x1f9/0x360
 ? sb_set_blocksize+0x98/0xf0
 ? setup_bdev_super+0x4e6/0x5d0
 mount_bdev+0x20c/0x2d0
 ? __pfx_ocfs2_fill_super+0x10/0x10
 ? __pfx_mount_bdev+0x10/0x10
 ? vfs_parse_fs_string+0x190/0x230
 ? __pfx_vfs_parse_fs_string+0x10/0x10
 legacy_get_tree+0xf0/0x190
 ? __pfx_ocfs2_mount+0x10/0x10
 vfs_get_tree+0x92/0x2b0
 do_new_mount+0x2be/0xb40
 ? __pfx_do_new_mount+0x10/0x10
 __se_sys_mount+0x2d6/0x3c0
 ? __pfx___se_sys_mount+0x10/0x10
 ? do_syscall_64+0x100/0x230
 ? __x64_sys_mount+0x20/0xc0
 do_syscall_64+0xf3/0x230
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f37cae96fda
Code: 48 8b 0d 51 ce 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1e ce 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007fff6c1aa228 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fff6c1aa240 RCX: 00007f37cae96fda
RDX: 00000000200002c0 RSI: 0000000020000040 RDI: 00007fff6c1aa240
RBP: 0000000000000004 R08: 00007fff6c1aa280 R09: 0000000000000000
R10: 00000000000008c0 R11: 0000000000000206 R12: 00000000000008c0
R13: 00007fff6c1aa280 R14: 0000000000000003 R15: 0000000001000000
 </TASK>

For a really damaged superblock, the value of 'i_super.s_blocksize_bits'
may exceed the maximum possible shift for an underlying 'int'.  So add an
extra check whether the aforementioned field represents the valid block
size, which is 512 bytes, 1K, 2K, or 4K.

Link: https://lkml.kernel.org/r/20241106092100.2661330-1-dmantipov@yandex.ru
Fixes: ccd979bdbce9 ("[PATCH] OCFS2: The Second Oracle Cluster Filesystem")
Signed-off-by: Dmitry Antipov <dmantipov@yandex.ru>
Reported-by: syzbot+56f7cd1abe4b8e475180@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=56f7cd1abe4b8e475180
Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
Cc: Mark Fasheh <mark@fasheh.com>
Cc: Joel Becker <jlbec@evilplan.org>
Cc: Junxiao Bi <junxiao.bi@oracle.com>
Cc: Changwei Ge <gechangwei@live.cn>
Cc: Jun Piao <piaojun@huawei.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:20:51 +01:00
Ryusuke Konishi
8e1f48af18 nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
commit cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471 upstream.

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using
nilfs2 and two block-related tracepoints.


This patch (of 2):

It has been reported that when using "block:block_touch_buffer"
tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a
NULL pointer dereference, or a general protection fault when KASAN is
enabled.

This happens because since the tracepoint was added in touch_buffer(), it
references the dev_t member bh->b_bdev->bd_dev regardless of whether the
buffer head has a pointer to a block_device structure.  In the current
implementation, the block_device structure is set after the function
returns to the caller.

Here, touch_buffer() is used to mark the folio/page that owns the buffer
head as accessed, but the common search helper for folio/page used by the
caller function was optimized to mark the folio/page as accessed when it
was reimplemented a long time ago, eliminating the need to call
touch_buffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.

Link: https://lkml.kernel.org/r/20241106160811.3316-1-konishi.ryusuke@gmail.com
Link: https://lkml.kernel.org/r/20241106160811.3316-2-konishi.ryusuke@gmail.com
Fixes: 5305cb830834 ("block: add block_{touch|dirty}_buffer tracepoint")
Signed-off-by: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Reported-by: Ubisectech Sirius <bugreport@valiantsec.com>
Closes: https://lkml.kernel.org/r/86bd3013-887e-4e38-960f-ca45c657f032.bugreport@valiantsec.com
Reported-by: syzbot+9982fb8d18eba905abe2@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=9982fb8d18eba905abe2
Tested-by: syzbot+9982fb8d18eba905abe2@syzkaller.appspotmail.com
Cc: Tejun Heo <tj@kernel.org>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:20:51 +01:00
Dmitry Antipov
e42b227c3c ocfs2: uncache inode which has failed entering the group
commit 737f34137844d6572ab7d473c998c7f977ff30eb upstream.

Syzbot has reported the following BUG:

kernel BUG at fs/ocfs2/uptodate.c:509!
...
Call Trace:
 <TASK>
 ? __die_body+0x5f/0xb0
 ? die+0x9e/0xc0
 ? do_trap+0x15a/0x3a0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? do_error_trap+0x1dc/0x2c0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? __pfx_do_error_trap+0x10/0x10
 ? handle_invalid_op+0x34/0x40
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? exc_invalid_op+0x38/0x50
 ? asm_exc_invalid_op+0x1a/0x20
 ? ocfs2_set_new_buffer_uptodate+0x2e/0x160
 ? ocfs2_set_new_buffer_uptodate+0x144/0x160
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ocfs2_group_add+0x39f/0x15a0
 ? __pfx_ocfs2_group_add+0x10/0x10
 ? __pfx_lock_acquire+0x10/0x10
 ? mnt_get_write_access+0x68/0x2b0
 ? __pfx_lock_release+0x10/0x10
 ? rcu_read_lock_any_held+0xb7/0x160
 ? __pfx_rcu_read_lock_any_held+0x10/0x10
 ? smack_log+0x123/0x540
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x226/0x2b0
 ocfs2_ioctl+0x65e/0x7d0
 ? __pfx_ocfs2_ioctl+0x10/0x10
 ? smack_file_ioctl+0x29e/0x3a0
 ? __pfx_smack_file_ioctl+0x10/0x10
 ? lockdep_hardirqs_on_prepare+0x43d/0x780
 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
 ? __pfx_ocfs2_ioctl+0x10/0x10
 __se_sys_ioctl+0xfb/0x170
 do_syscall_64+0xf3/0x230
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
 </TASK>

When 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' has failed for the particular
inode in 'ocfs2_verify_group_and_input()', corresponding buffer head
remains cached and subsequent call to the same 'ioctl()' for the same
inode issues the BUG() in 'ocfs2_set_new_buffer_uptodate()' (trying
to cache the same buffer head of that inode). Fix this by uncaching
the buffer head with 'ocfs2_remove_from_cache()' on error path in
'ocfs2_group_add()'.

Link: https://lkml.kernel.org/r/20241114043844.111847-1-dmantipov@yandex.ru
Fixes: 7909f2bf8353 ("[PATCH 2/2] ocfs2: Implement group add for online resize")
Signed-off-by: Dmitry Antipov <dmantipov@yandex.ru>
Reported-by: syzbot+453873f1588c2d75b447@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=453873f1588c2d75b447
Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
Cc: Dmitry Antipov <dmantipov@yandex.ru>
Cc: Joel Becker <jlbec@evilplan.org>
Cc: Mark Fasheh <mark@fasheh.com>
Cc: Junxiao Bi <junxiao.bi@oracle.com>
Cc: Changwei Ge <gechangwei@live.cn>
Cc: Jun Piao <piaojun@huawei.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:20:50 +01:00
Vasiliy Kovalev
7746b46e96 ovl: Filter invalid inodes with missing lookup function
commit c8b359dddb418c60df1a69beea01d1b3322bfe83 upstream.

Add a check to the ovl_dentry_weird() function to prevent the
processing of directory inodes that lack the lookup function.
This is important because such inodes can cause errors in overlayfs
when passed to the lowerstack.

Reported-by: syzbot+a8c9d476508bd14a90e5@syzkaller.appspotmail.com
Link: https://syzkaller.appspot.com/bug?extid=a8c9d476508bd14a90e5
Suggested-by: Miklos Szeredi <miklos@szeredi.hu>
Link: https://lore.kernel.org/linux-unionfs/CAJfpegvx-oS9XGuwpJx=Xe28_jzWx5eRo1y900_ZzWY+=gGzUg@mail.gmail.com/
Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org>
Cc: <stable@vger.kernel.org>
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:20:50 +01:00
Alessandro Zanni
da4803a973 fs: Fix uninitialized value issue in from_kuid and from_kgid
[ Upstream commit 15f34347481648a567db67fb473c23befb796af5 ]

ocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in
a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.

Initialize all fields of newattrs to avoid uninitialized variables, by
checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.

Reported-by: syzbot+6c55f725d1bdc8c52058@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=6c55f725d1bdc8c52058
Signed-off-by: Alessandro Zanni <alessandro.zanni87@gmail.com>
Link: https://lore.kernel.org/r/20241017120553.55331-1-alessandro.zanni87@gmail.com
Reviewed-by: Jan Kara <jack@suse.cz>
Signed-off-by: Christian Brauner <brauner@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-30 02:33:28 +01:00
Andrew Kanner
940968132d ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
commit 0b63c0e01fba40e3992bc627272ec7b618ccaef7 upstream.

Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove():

[   57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: status = -12
[   57.320420] (a.out,1161,7):ocfs2_xa_cleanup_value_truncate:1999 ERROR: Partial truncate while removing xattr overlay.upper.  Leaking 1 clusters and removing the entry
[   57.321727] BUG: kernel NULL pointer dereference, address: 0000000000000004
[...]
[   57.325727] RIP: 0010:ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[...]
[   57.331328] Call Trace:
[   57.331477]  <TASK>
[...]
[   57.333511]  ? do_user_addr_fault+0x3e5/0x740
[   57.333778]  ? exc_page_fault+0x70/0x170
[   57.334016]  ? asm_exc_page_fault+0x2b/0x30
[   57.334263]  ? __pfx_ocfs2_xa_block_wipe_namevalue+0x10/0x10
[   57.334596]  ? ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[   57.334913]  ocfs2_xa_remove_entry+0x23/0xc0
[   57.335164]  ocfs2_xa_set+0x704/0xcf0
[   57.335381]  ? _raw_spin_unlock+0x1a/0x40
[   57.335620]  ? ocfs2_inode_cache_unlock+0x16/0x20
[   57.335915]  ? trace_preempt_on+0x1e/0x70
[   57.336153]  ? start_this_handle+0x16c/0x500
[   57.336410]  ? preempt_count_sub+0x50/0x80
[   57.336656]  ? _raw_read_unlock+0x20/0x40
[   57.336906]  ? start_this_handle+0x16c/0x500
[   57.337162]  ocfs2_xattr_block_set+0xa6/0x1e0
[   57.337424]  __ocfs2_xattr_set_handle+0x1fd/0x5d0
[   57.337706]  ? ocfs2_start_trans+0x13d/0x290
[   57.337971]  ocfs2_xattr_set+0xb13/0xfb0
[   57.338207]  ? dput+0x46/0x1c0
[   57.338393]  ocfs2_xattr_trusted_set+0x28/0x30
[   57.338665]  ? ocfs2_xattr_trusted_set+0x28/0x30
[   57.338948]  __vfs_removexattr+0x92/0xc0
[   57.339182]  __vfs_removexattr_locked+0xd5/0x190
[   57.339456]  ? preempt_count_sub+0x50/0x80
[   57.339705]  vfs_removexattr+0x5f/0x100
[...]

Reproducer uses faultinject facility to fail ocfs2_xa_remove() ->
ocfs2_xa_value_truncate() with -ENOMEM.

In this case the comment mentions that we can return 0 if
ocfs2_xa_cleanup_value_truncate() is going to wipe the entry
anyway. But the following 'rc' check is wrong and execution flow do
'ocfs2_xa_remove_entry(loc);' twice:
* 1st: in ocfs2_xa_cleanup_value_truncate();
* 2nd: returning back to ocfs2_xa_remove() instead of going to 'out'.

Fix this by skipping the 2nd removal of the same entry and making
syzkaller repro happy.

Link: https://lkml.kernel.org/r/20241103193845.2940988-1-andrew.kanner@gmail.com
Fixes: 399ff3a748cf ("ocfs2: Handle errors while setting external xattr values.")
Signed-off-by: Andrew Kanner <andrew.kanner@gmail.com>
Reported-by: syzbot+386ce9e60fa1b18aac5b@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/all/671e13ab.050a0220.2b8c0f.01d0.GAE@google.com/T/
Tested-by: syzbot+386ce9e60fa1b18aac5b@syzkaller.appspotmail.com
Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
Cc: Mark Fasheh <mark@fasheh.com>
Cc: Joel Becker <jlbec@evilplan.org>
Cc: Junxiao Bi <junxiao.bi@oracle.com>
Cc: Changwei Ge <gechangwei@live.cn>
Cc: Jun Piao <piaojun@huawei.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-30 02:33:26 +01:00
Qi Xi
1f415e0144 fs/proc: fix compile warning about variable 'vmcore_mmap_ops'
commit b8ee299855f08539e04d6c1a6acb3dc9e5423c00 upstream.

When build with !CONFIG_MMU, the variable 'vmcore_mmap_ops'
is defined but not used:

>> fs/proc/vmcore.c:458:42: warning: unused variable 'vmcore_mmap_ops'
     458 | static const struct vm_operations_struct vmcore_mmap_ops = {

Fix this by only defining it when CONFIG_MMU is enabled.

Link: https://lkml.kernel.org/r/20241101034803.9298-1-xiqi2@huawei.com
Fixes: 9cb218131de1 ("vmcore: introduce remap_oldmem_pfn_range()")
Signed-off-by: Qi Xi <xiqi2@huawei.com>
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/lkml/202410301936.GcE8yUos-lkp@intel.com/
Cc: Baoquan He <bhe@redhat.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: Michael Holzheu <holzheu@linux.vnet.ibm.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Wang ShaoBo <bobo.shaobowang@huawei.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-30 02:33:26 +01:00
Filipe Manana
506bbb9474 btrfs: reinitialize delayed ref list after deleting it from the list
commit c9a75ec45f1111ef530ab186c2a7684d0a0c9245 upstream.

At insert_delayed_ref() if we need to update the action of an existing
ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's
ref_add_list using list_del(), which leaves the ref's add_list member
not reinitialized, as list_del() sets the next and prev members of the
list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can
happen during merging or when destroying delayed refs due to a transaction
abort, we can trigger a crash since at drop_delayed_ref() we call
list_empty() against the ref's add_list, which returns false since
the list was not reinitialized after the list_del() and as a consequence
we call list_del() again at drop_delayed_ref(). This results in an
invalid list access since the next and prev members are set to poison
pointers, resulting in a splat if CONFIG_LIST_HARDENED and
CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences
otherwise.

So fix this by deleting from the list with list_del_init() instead.

Fixes: 1d57ee941692 ("btrfs: improve delayed refs iterations")
CC: stable@vger.kernel.org # 4.19+
Reviewed-by: Johannes Thumshirn <johannes.thumshirn@wdc.com>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-30 02:33:25 +01:00
Roberto Sassu
b55da2e129 nfs: Fix KMSAN warning in decode_getfattr_attrs()
commit dc270d7159699ad6d11decadfce9633f0f71c1db upstream.

Fix the following KMSAN warning:

CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G    B
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)
=====================================================
=====================================================
BUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90
 decode_getfattr_attrs+0x2d6d/0x2f90
 decode_getfattr_generic+0x806/0xb00
 nfs4_xdr_dec_getattr+0x1de/0x240
 rpcauth_unwrap_resp_decode+0xab/0x100
 rpcauth_unwrap_resp+0x95/0xc0
 call_decode+0x4ff/0xb50
 __rpc_execute+0x57b/0x19d0
 rpc_execute+0x368/0x5e0
 rpc_run_task+0xcfe/0xee0
 nfs4_proc_getattr+0x5b5/0x990
 __nfs_revalidate_inode+0x477/0xd00
 nfs_access_get_cached+0x1021/0x1cc0
 nfs_do_access+0x9f/0xae0
 nfs_permission+0x1e4/0x8c0
 inode_permission+0x356/0x6c0
 link_path_walk+0x958/0x1330
 path_lookupat+0xce/0x6b0
 filename_lookup+0x23e/0x770
 vfs_statx+0xe7/0x970
 vfs_fstatat+0x1f2/0x2c0
 __se_sys_newfstatat+0x67/0x880
 __x64_sys_newfstatat+0xbd/0x120
 x64_sys_call+0x1826/0x3cf0
 do_syscall_64+0xd0/0x1b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The KMSAN warning is triggered in decode_getfattr_attrs(), when calling
decode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not
initialized.

Fix the issue by initializing fattr->mdsthreshold to NULL in
nfs_fattr_init().

Cc: stable@vger.kernel.org # v3.5.x
Fixes: 88034c3d88c2 ("NFSv4.1 mdsthreshold attribute xdr")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Anna Schumaker <anna.schumaker@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-30 02:33:25 +01:00
Ksawlii
c193da6e53 Revert "virtiofs: forbid newlines in tags"
This reverts commit e07d94ea1d.
2024-11-24 00:23:52 +01:00
Ksawlii
254706192f Revert "fsnotify: clear PARENT_WATCHED flags lazily"
This reverts commit 887fdf24d2.
2024-11-24 00:23:48 +01:00
Ksawlii
bbcbbc3b23 Revert "udf: Limit file size to 4TB"
This reverts commit db611d177b.
2024-11-24 00:23:46 +01:00
Ksawlii
e254363d4c Revert "ext4: handle redirtying in ext4_bio_write_page()"
This reverts commit 952c89ac51.
2024-11-24 00:23:46 +01:00
Ksawlii
4a63b68b74 Revert "NFSD: Refactor nfsd_reply_cache_free_locked()"
This reverts commit 06ca7ef647.
2024-11-24 00:23:45 +01:00
Ksawlii
7232cc0acc Revert "NFSD: Rename nfsd_reply_cache_alloc()"
This reverts commit bf9e2edffb.
2024-11-24 00:23:45 +01:00
Ksawlii
679a5499d6 Revert "NFSD: Replace nfsd_prune_bucket()"
This reverts commit 11242ff0bf.
2024-11-24 00:23:45 +01:00
Ksawlii
a77ba247a7 Revert "NFSD: Refactor the duplicate reply cache shrinker"
This reverts commit ddc87a28f9.
2024-11-24 00:23:45 +01:00
Ksawlii
370fd3e8ce Revert "NFSD: simplify error paths in nfsd_svc()"
This reverts commit 3890c7c53c.
2024-11-24 00:23:45 +01:00
Ksawlii
6d767ecd3e Revert "NFSD: Rewrite synopsis of nfsd_percpu_counters_init()"
This reverts commit b26ad58084.
2024-11-24 00:23:45 +01:00
Ksawlii
18f77282d9 Revert "NFSD: Fix frame size warning in svc_export_parse()"
This reverts commit 2f282ed1a9.
2024-11-24 00:23:45 +01:00
Ksawlii
ac304417cc Revert "nfsd: stop setting ->pg_stats for unused stats"
This reverts commit 1f1c36f524.
2024-11-24 00:23:44 +01:00
Ksawlii
181d28ae2b Revert "sunrpc: pass in the sv_stats struct through svc_create_pooled"
This reverts commit bdc4a7b40a.
2024-11-24 00:23:44 +01:00
Ksawlii
279ec1c17f Revert "sunrpc: remove ->pg_stats from svc_program"
This reverts commit 2f7108a6c4.
2024-11-24 00:23:44 +01:00
Ksawlii
06b45d7dd6 Revert "nfsd: rename NFSD_NET_* to NFSD_STATS_*"
This reverts commit 4004e4dc9d.
2024-11-24 00:23:44 +01:00
Ksawlii
7dd81aa9d2 Revert "nfsd: expose /proc/net/sunrpc/nfsd in net namespaces"
This reverts commit cc1ec49fa8.
2024-11-24 00:23:44 +01:00
Ksawlii
2a0e4e700f Revert "nfsd: make all of the nfsd stats per-network namespace"
This reverts commit 8e153e6f02.
2024-11-24 00:23:43 +01:00
Ksawlii
e7983f03a7 Revert "nfsd: remove nfsd_stats, make th_cnt a global counter"
This reverts commit 32028a262e.
2024-11-24 00:23:43 +01:00
Ksawlii
d494229215 Revert "nfsd: make svc_stat per-network namespace instead of global"
This reverts commit 886f600c8d.
2024-11-24 00:23:43 +01:00
Ksawlii
4bd71292a1 Revert "udf: Avoid excessive partition lengths"
This reverts commit 53de2c2b51.
2024-11-24 00:23:43 +01:00
Ksawlii
a82373ed36 Revert "btrfs: replace BUG_ON with ASSERT in walk_down_proc()"
This reverts commit 833703b1be.
2024-11-24 00:23:39 +01:00
Ksawlii
9dfd5971af Revert "btrfs: clean up our handling of refs == 0 in snapshot delete"
This reverts commit c6dfc73da3.
2024-11-24 00:23:39 +01:00
Ksawlii
1944f01920 Revert "btrfs: initialize location to fix -Wmaybe-uninitialized in btrfs_lookup_dentry()"
This reverts commit ccb6b6363d.
2024-11-24 00:23:39 +01:00
Ksawlii
367c3c0607 Revert "Squashfs: sanity check symbolic link size"
This reverts commit 56685ee756.
2024-11-24 00:23:38 +01:00
Ksawlii
223197c81f Revert "NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations"
This reverts commit 3f033e95e7.
2024-11-24 00:23:38 +01:00
Ksawlii
2a04905087 Revert "nilfs2: replace snprintf in show functions with sysfs_emit"
This reverts commit bd580a7fd9.
2024-11-24 00:23:37 +01:00
Ksawlii
acfc7f60d9 Revert "nilfs2: protect references to superblock parameters exposed in sysfs"
This reverts commit 29b2aeb40d.
2024-11-24 00:23:37 +01:00
Ksawlii
495ede5554 Revert "btrfs: update target inode's ctime on unlink"
This reverts commit 0bc0b0b3e1.
2024-11-24 00:23:35 +01:00
Ksawlii
e4328eacde Revert "NFS: Avoid unnecessary rescanning of the per-server delegation list"
This reverts commit bf7d380b4c.
2024-11-24 00:23:35 +01:00
Ksawlii
ea2eef284d Revert "ocfs2: add bounds checking to ocfs2_xattr_find_entry()"
This reverts commit 9f8e960daa.
2024-11-24 00:23:33 +01:00
Ksawlii
288d6adf78 Revert "ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()"
This reverts commit e5a4f3990a.
2024-11-24 00:23:32 +01:00
Ksawlii
f45a13db54 Revert "fs: explicitly unregister per-superblock BDIs"
This reverts commit 716f0f8e49.
2024-11-24 00:23:31 +01:00
Ksawlii
fd797305e8 Revert "mount: warn only once about timestamp range expiration"
This reverts commit c9b4f8d73e.
2024-11-24 00:23:31 +01:00
Ksawlii
9ba56941a6 Revert "fs/namespace: fnic: Switch to use %ptTd"
This reverts commit 7c72670e6a.
2024-11-24 00:23:31 +01:00
Ksawlii
a9b3c9fff3 Revert "mount: handle OOM on mnt_warn_timestamp_expiry"
This reverts commit 3e27e86884.
2024-11-24 00:23:31 +01:00
Ksawlii
a83bba270c Revert "ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard"
This reverts commit 2305ff5e44.
2024-11-24 00:23:23 +01:00
Ksawlii
84c804134c Revert "ext4: avoid buffer_head leak in ext4_mark_inode_used()"
This reverts commit 4e2ca3b317.
2024-11-24 00:23:23 +01:00
Ksawlii
1b82c86b6e Revert "ext4: avoid potential buffer_head leak in __ext4_new_inode()"
This reverts commit 919de34d5e.
2024-11-24 00:23:23 +01:00
Ksawlii
edcb108ec3 Revert "ext4: avoid negative min_clusters in find_group_orlov()"
This reverts commit aa2552d473.
2024-11-24 00:23:22 +01:00
Ksawlii
484646c44e Revert "ext4: return error on ext4_find_inline_entry"
This reverts commit 84e6545d45.
2024-11-24 00:23:22 +01:00
Ksawlii
c3584f20ca Revert "nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()"
This reverts commit 8bb2d85f57.
2024-11-24 00:23:22 +01:00
Ksawlii
83721b0c9f Revert "nilfs2: determine empty node blocks as corrupted"
This reverts commit d436afe369.
2024-11-24 00:23:22 +01:00
Ksawlii
50c89bbfce Revert "nilfs2: fix potential oob read in nilfs_btree_check_delete()"
This reverts commit 4bb27977a9.
2024-11-24 00:23:22 +01:00
Ksawlii
1bde9f1a58 Revert "nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire"
This reverts commit 047ae79564.
2024-11-24 00:23:21 +01:00
Ksawlii
4e72477dc9 Revert "nfsd: fix refcount leak when file is unhashed after being found"
This reverts commit 5d70e0c71b.
2024-11-24 00:23:21 +01:00
Ksawlii
d9dfdb4f9a Revert "nfsd: call cache_put if xdr_reserve_space returns NULL"
This reverts commit 230230cbc0.
2024-11-24 00:23:20 +01:00
Ksawlii
916f5cf5c7 Revert "nfsd: return -EINVAL when namelen is 0"
This reverts commit a7d5a90335.
2024-11-24 00:23:20 +01:00
Ksawlii
ee72aa29e3 Revert "f2fs: fix to update i_ctime in __f2fs_setxattr()"
This reverts commit fc4e788a8f.
2024-11-24 00:23:20 +01:00
Ksawlii
ed27a80717 Revert "f2fs: remove unneeded check condition in __f2fs_setxattr()"
This reverts commit 7aff4e5b85.
2024-11-24 00:23:19 +01:00
Ksawlii
02b4e700f3 Revert "f2fs: prevent possible int overflow in dir_block_index()"
This reverts commit 67b4e793e4.
2024-11-24 00:23:15 +01:00
Ksawlii
9c15f09887 Revert "f2fs: avoid potential int overflow in sanity_check_area_boundary()"
This reverts commit 331eb7909d.
2024-11-24 00:23:15 +01:00
Ksawlii
075c794bc1 Revert "vfs: fix race between evice_inodes() and find_inode()&iput()"
This reverts commit 3b9c45c479.
2024-11-24 00:23:15 +01:00
Ksawlii
831814b413 Revert "fs: Fix file_set_fowner LSM hook inconsistencies"
This reverts commit 33a22518e4.
2024-11-24 00:23:15 +01:00
Ksawlii
40cd6892ab Revert "nfs: fix memory leak in error path of nfs4_do_reclaim"
This reverts commit 33d69e565e.
2024-11-24 00:23:15 +01:00
Ksawlii
ae928b45d6 Revert "ceph: remove the incorrect Fw reference check when dirtying pages"
This reverts commit 0c92def6af.
2024-11-24 00:23:13 +01:00
Ksawlii
96a727b0c0 Revert "f2fs: Require FMODE_WRITE for atomic write ioctls"
This reverts commit 3877a33618.
2024-11-24 00:23:11 +01:00
Ksawlii
8b17ca6430 Revert "proc: add config & param to block forcing mem writes"
This reverts commit 72291ae00f.
2024-11-24 00:23:07 +01:00
Ksawlii
3797787773 Revert "jfs: UBSAN: shift-out-of-bounds in dbFindBits"
This reverts commit 41aeda6a14.
2024-11-24 00:23:06 +01:00
Ksawlii
6fa39039f4 Revert "jfs: Fix uaf in dbFreeBits"
This reverts commit 6122749c1d.
2024-11-24 00:23:06 +01:00
Ksawlii
ee8a73fdde Revert "jfs: check if leafidx greater than num leaves per dmap tree"
This reverts commit 9fcdffe74e.
2024-11-24 00:23:06 +01:00
Ksawlii
7fdbc2acb2 Revert "jfs: Fix uninit-value access of new_ea in ea_buffer"
This reverts commit 2ff373f85e.
2024-11-24 00:23:06 +01:00
Ksawlii
ac0ea5a530 Revert "ext4: avoid use-after-free in ext4_ext_show_leaf()"
This reverts commit 2997f7a995.
2024-11-24 00:23:05 +01:00
Ksawlii
260c648056 Revert "ext4: fix i_data_sem unlock order in ext4_ind_migrate()"
This reverts commit fe7c357e85.
2024-11-24 00:23:05 +01:00
Ksawlii
8e669b0469 Revert "ext4: no need to continue when the number of entries is 1"
This reverts commit 3e2686893a.
2024-11-24 00:23:04 +01:00
Ksawlii
cf3b0a3d32 Revert "ext4: fix slab-use-after-free in ext4_split_extent_at()"
This reverts commit 36cf824440.
2024-11-24 00:23:04 +01:00
Ksawlii
9d13a5c8be Revert "ext4: propagate errors from ext4_find_extent() in ext4_insert_range()"
This reverts commit d833f09638.
2024-11-24 00:23:04 +01:00
Ksawlii
d97a370085 Revert "ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space()"
This reverts commit 12dbad5099.
2024-11-24 00:23:04 +01:00
Ksawlii
c8162dd5e3 Revert "ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free"
This reverts commit a92dad3741.
2024-11-24 00:23:04 +01:00
Ksawlii
93a6c5ff53 Revert "ext4: aovid use-after-free in ext4_ext_insert_extent()"
This reverts commit d6a31f504e.
2024-11-24 00:23:04 +01:00
Ksawlii
28ec6970cd Revert "ext4: fix double brelse() the buffer of the extents path"
This reverts commit 1751fc5974.
2024-11-24 00:23:03 +01:00
Ksawlii
2f34213701 Revert "ext4: update orig_path in ext4_find_extent()"
This reverts commit 39b44a0c92.
2024-11-24 00:23:03 +01:00
Ksawlii
3b0ddcb83c Revert "ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit()"
This reverts commit 4af33d15cb.
2024-11-24 00:23:03 +01:00
Ksawlii
7229d80fef Revert "parisc: Fix stack start for ADDR_NO_RANDOMIZE personality"
This reverts commit 603d38c5da.
2024-11-24 00:23:03 +01:00
Ksawlii
f542f45344 Revert "jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error"
This reverts commit 7477cade32.
2024-11-24 00:23:03 +01:00
Ksawlii
79fa380062 Revert "jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit"
This reverts commit b9329bdfe6.
2024-11-24 00:23:03 +01:00
Ksawlii
16ded01ec1 Revert "ocfs2: fix the la space leak when unmounting an ocfs2 volume"
This reverts commit 0ff194d066.
2024-11-24 00:23:03 +01:00
Ksawlii
2de4d41368 Revert "ocfs2: fix uninit-value in ocfs2_get_block()"
This reverts commit 33b11064c4.
2024-11-24 00:23:03 +01:00
Ksawlii
dfe3742af2 Revert "ocfs2: reserve space for inline xattr before attaching reflink tree"
This reverts commit 63e2db6c0b.
2024-11-24 00:23:03 +01:00
Ksawlii
c5c1ab676d Revert "ocfs2: cancel dqi_sync_work before freeing oinfo"
This reverts commit 687a6ab8c4.
2024-11-24 00:23:03 +01:00
Ksawlii
947732bc18 Revert "ocfs2: remove unreasonable unlock in ocfs2_read_blocks"
This reverts commit c656a23346.
2024-11-24 00:23:02 +01:00
Ksawlii
25c64d5629 Revert "ocfs2: fix null-ptr-deref when journal load failed."
This reverts commit e7014629c9.
2024-11-24 00:23:02 +01:00
Ksawlii
d751cc7fe8 Revert "ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate"
This reverts commit e721564d9c.
2024-11-24 00:23:02 +01:00
Ksawlii
5ef504acd1 Revert "exfat: fix memory leak in exfat_load_bitmap()"
This reverts commit defa602d2c.
2024-11-24 00:23:02 +01:00
Ksawlii
9378ee00ac Revert "nfsd: fix delegation_blocked() to block correctly for at least 30 seconds"
This reverts commit 2f271f8591.
2024-11-24 00:23:02 +01:00
Ksawlii
ab71c81dd8 Revert "nfsd: map the EBADMSG to nfserr_io to avoid warning"
This reverts commit 5b22601874.
2024-11-24 00:23:02 +01:00
Ksawlii
dc047d3806 Revert "NFSD: Fix NFSv4's PUTPUBFH operation"
This reverts commit 770d812d36.
2024-11-24 00:23:02 +01:00
Ksawlii
212baf41d2 Revert "btrfs: fix a NULL pointer dereference when failed to start a new trasacntion"
This reverts commit e03ae5b888.
2024-11-24 00:23:01 +01:00
Ksawlii
7628389383 Revert "btrfs: wait for fixup workers before stopping cleaner kthread during umount"
This reverts commit cfbf212995.
2024-11-24 00:23:01 +01:00
Ksawlii
8a062fad2b Revert "ext4: properly sync file size update after O_SYNC direct IO"
This reverts commit 8d891d670a.
2024-11-24 00:23:01 +01:00
Ksawlii
1c4245ba87 Revert "ext4: dax: fix overflowing extents beyond inode size when partially writing"
This reverts commit eb2d9a8577.
2024-11-24 00:23:00 +01:00