]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.9-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 29 Apr 2018 10:21:18 +0000 (12:21 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 29 Apr 2018 10:21:18 +0000 (12:21 +0200)
added patches:
ext4-prevent-right-shifting-extents-beyond-ext_max_blocks.patch
ext4-set-h_journal-if-there-is-a-failure-starting-a-reserved-handle.patch

queue-4.9/ext4-prevent-right-shifting-extents-beyond-ext_max_blocks.patch [new file with mode: 0644]
queue-4.9/ext4-set-h_journal-if-there-is-a-failure-starting-a-reserved-handle.patch [new file with mode: 0644]

diff --git a/queue-4.9/ext4-prevent-right-shifting-extents-beyond-ext_max_blocks.patch b/queue-4.9/ext4-prevent-right-shifting-extents-beyond-ext_max_blocks.patch
new file mode 100644 (file)
index 0000000..c1f7aab
--- /dev/null
@@ -0,0 +1,70 @@
+From 349fa7d6e1935f49bf4161c4900711b2989180a9 Mon Sep 17 00:00:00 2001
+From: Eric Biggers <ebiggers@google.com>
+Date: Thu, 12 Apr 2018 11:48:09 -0400
+Subject: ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS
+
+From: Eric Biggers <ebiggers@google.com>
+
+commit 349fa7d6e1935f49bf4161c4900711b2989180a9 upstream.
+
+During the "insert range" fallocate operation, extents starting at the
+range offset are shifted "right" (to a higher file offset) by the range
+length.  But, as shown by syzbot, it's not validated that this doesn't
+cause extents to be shifted beyond EXT_MAX_BLOCKS.  In that case
+->ee_block can wrap around, corrupting the extent tree.
+
+Fix it by returning an error if the space between the end of the last
+extent and EXT4_MAX_BLOCKS is smaller than the range being inserted.
+
+This bug can be reproduced by running the following commands when the
+current directory is on an ext4 filesystem with a 4k block size:
+
+        fallocate -l 8192 file
+        fallocate --keep-size -o 0xfffffffe000 -l 4096 -n file
+        fallocate --insert-range -l 8192 file
+
+Then after unmounting the filesystem, e2fsck reports corruption.
+
+Reported-by: syzbot+06c885be0edcdaeab40c@syzkaller.appspotmail.com
+Fixes: 331573febb6a ("ext4: Add support FALLOC_FL_INSERT_RANGE for fallocate")
+Cc: stable@vger.kernel.org # v4.2+
+Signed-off-by: Eric Biggers <ebiggers@google.com>
+Signed-off-by: Theodore Ts'o <tytso@mit.edu>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ fs/ext4/extents.c |   16 +++++++++++-----
+ 1 file changed, 11 insertions(+), 5 deletions(-)
+
+--- a/fs/ext4/extents.c
++++ b/fs/ext4/extents.c
+@@ -5356,8 +5356,9 @@ ext4_ext_shift_extents(struct inode *ino
+       stop = le32_to_cpu(extent->ee_block);
+        /*
+-       * In case of left shift, Don't start shifting extents until we make
+-       * sure the hole is big enough to accommodate the shift.
++      * For left shifts, make sure the hole on the left is big enough to
++      * accommodate the shift.  For right shifts, make sure the last extent
++      * won't be shifted beyond EXT_MAX_BLOCKS.
+       */
+       if (SHIFT == SHIFT_LEFT) {
+               path = ext4_find_extent(inode, start - 1, &path,
+@@ -5377,9 +5378,14 @@ ext4_ext_shift_extents(struct inode *ino
+               if ((start == ex_start && shift > ex_start) ||
+                   (shift > start - ex_end)) {
+-                      ext4_ext_drop_refs(path);
+-                      kfree(path);
+-                      return -EINVAL;
++                      ret = -EINVAL;
++                      goto out;
++              }
++      } else {
++              if (shift > EXT_MAX_BLOCKS -
++                  (stop + ext4_ext_get_actual_len(extent))) {
++                      ret = -EINVAL;
++                      goto out;
+               }
+       }
diff --git a/queue-4.9/ext4-set-h_journal-if-there-is-a-failure-starting-a-reserved-handle.patch b/queue-4.9/ext4-set-h_journal-if-there-is-a-failure-starting-a-reserved-handle.patch
new file mode 100644 (file)
index 0000000..d3802be
--- /dev/null
@@ -0,0 +1,43 @@
+From b2569260d55228b617bd82aba6d0db2faeeb4116 Mon Sep 17 00:00:00 2001
+From: Theodore Ts'o <tytso@mit.edu>
+Date: Wed, 18 Apr 2018 11:49:31 -0400
+Subject: ext4: set h_journal if there is a failure starting a reserved handle
+
+From: Theodore Ts'o <tytso@mit.edu>
+
+commit b2569260d55228b617bd82aba6d0db2faeeb4116 upstream.
+
+If ext4 tries to start a reserved handle via
+jbd2_journal_start_reserved(), and the journal has been aborted, this
+can result in a NULL pointer dereference.  This is because the fields
+h_journal and h_transaction in the handle structure share the same
+memory, via a union, so jbd2_journal_start_reserved() will clear
+h_journal before calling start_this_handle().  If this function fails
+due to an aborted handle, h_journal will still be NULL, and the call
+to jbd2_journal_free_reserved() will pass a NULL journal to
+sub_reserve_credits().
+
+This can be reproduced by running "kvm-xfstests -c dioread_nolock
+generic/475".
+
+Cc: stable@kernel.org # 3.11
+Fixes: 8f7d89f36829b ("jbd2: transaction reservation support")
+Signed-off-by: Theodore Ts'o <tytso@mit.edu>
+Reviewed-by: Andreas Dilger <adilger@dilger.ca>
+Reviewed-by: Jan Kara <jack@suse.cz>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ fs/jbd2/transaction.c |    1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/fs/jbd2/transaction.c
++++ b/fs/jbd2/transaction.c
+@@ -528,6 +528,7 @@ int jbd2_journal_start_reserved(handle_t
+        */
+       ret = start_this_handle(journal, handle, GFP_NOFS);
+       if (ret < 0) {
++              handle->h_journal = journal;
+               jbd2_journal_free_reserved(handle);
+               return ret;
+       }