kernel_samsung_a53x/fs/nilfs2
Ryusuke Konishi 5613f051bc nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
commit 985ebec4ab0a28bb5910c3b1481a40fbf7f9e61d upstream.

Syzbot reported that when searching for records in a directory where the
inode's i_size is corrupted and has a large value, memory access outside
the folio/page range may occur, or a use-after-free bug may be detected if
KASAN is enabled.

This is because nilfs_last_byte(), which is called by nilfs_find_entry()
and others to calculate the number of valid bytes of directory data in a
page from i_size and the page index, loses the upper 32 bits of the 64-bit
size information due to an inappropriate type of local variable to which
the i_size value is assigned.

This caused a large byte offset value due to underflow in the end address
calculation in the calling nilfs_find_entry(), resulting in memory access
that exceeds the folio/page size.

Fix this issue by changing the type of the local variable causing the bit
loss from "unsigned int" to "u64".  The return value of nilfs_last_byte()
is also of type "unsigned int", but it is truncated so as not to exceed
PAGE_SIZE and no bit loss occurs, so no change is required.

Link: https://lkml.kernel.org/r/20241119172403.9292-1-konishi.ryusuke@gmail.com
Fixes: 2ba466d74ed7 ("nilfs2: directory entry operations")
Signed-off-by: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Reported-by: syzbot+96d5d14c47d97015c624@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=96d5d14c47d97015c624
Tested-by: syzbot+96d5d14c47d97015c624@syzkaller.appspotmail.com
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-17 13:24:28 +01:00
..
alloc.c nilfs2: fix incorrect inode allocation from reserved inodes 2024-11-19 14:19:43 +01:00
alloc.h nilfs2: fix incorrect inode allocation from reserved inodes 2024-11-19 14:19:43 +01:00
bmap.c
bmap.h
btnode.c nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint 2024-12-17 13:20:51 +01:00
btnode.h
btree.c Revert "nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()" 2024-11-24 00:23:22 +01:00
btree.h
cpfile.c
cpfile.h
dat.c nilfs2: fix incorrect inode allocation from reserved inodes 2024-11-19 14:19:43 +01:00
dat.h
dir.c nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() 2024-12-17 13:24:28 +01:00
direct.c nilfs2: fix failure to detect DAT corruption in btree and direct mappings 2024-11-19 09:22:36 +01:00
direct.h
export.h
file.c nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() 2024-11-18 12:13:32 +01:00
gcinode.c nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint 2024-12-17 13:20:51 +01:00
ifile.c nilfs2: fix incorrect inode allocation from reserved inodes 2024-11-19 14:19:43 +01:00
ifile.h
inode.c nilfs2: prevent kernel bug at submit_bh_wbc() 2024-11-19 09:22:36 +01:00
ioctl.c nilfs2: fix out-of-range warning 2024-11-19 12:26:52 +01:00
Kconfig
Makefile
mdt.c nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint 2024-12-17 13:20:51 +01:00
mdt.h
namei.c Revert "nilfs2: propagate directory read errors from nilfs_find_entry()" 2024-11-24 00:22:51 +01:00
nilfs.h Revert "nilfs2: propagate directory read errors from nilfs_find_entry()" 2024-11-24 00:22:51 +01:00
page.c nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint 2024-12-17 13:20:51 +01:00
page.h
recovery.c nilfs2: fix missing cleanup on rollforward recovery error 2024-11-23 23:21:01 +01:00
segbuf.c
segbuf.h
segment.c nilfs2: fix state management in error path of log writing function 2024-11-23 23:21:01 +01:00
segment.h
sufile.c
sufile.h
super.c
sysfs.c Revert "nilfs2: replace snprintf in show functions with sysfs_emit" 2024-11-24 00:23:37 +01:00
sysfs.h
the_nilfs.c nilfs2: fix inode number range checks 2024-11-19 14:19:41 +01:00
the_nilfs.h nilfs2: fix inode number range checks 2024-11-19 14:19:41 +01:00