]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
fs/filesystems: Fix potential unsigned integer underflow in fs_name()
authorZijun Hu <quic_zijuhu@quicinc.com>
Thu, 10 Apr 2025 11:45:27 +0000 (19:45 +0800)
committerChristian Brauner <brauner@kernel.org>
Mon, 14 Apr 2025 11:05:59 +0000 (13:05 +0200)
fs_name() has @index as unsigned int, so there is underflow risk for
operation '@index--'.

Fix by breaking the for loop when '@index == 0' which is also more proper
than '@index <= 0' for unsigned integer comparison.

Signed-off-by: Zijun Hu <quic_zijuhu@quicinc.com>
Link: https://lore.kernel.org/20250410-fix_fs-v1-1-7c14ccc8ebaa@quicinc.com
Signed-off-by: Christian Brauner <brauner@kernel.org>
fs/filesystems.c

index 58b9067b2391ce814e580709b518b405e0f9cb8a..95e5256821a53494d88f496193305a2e50e04444 100644 (file)
@@ -156,15 +156,19 @@ static int fs_index(const char __user * __name)
 static int fs_name(unsigned int index, char __user * buf)
 {
        struct file_system_type * tmp;
-       int len, res;
+       int len, res = -EINVAL;
 
        read_lock(&file_systems_lock);
-       for (tmp = file_systems; tmp; tmp = tmp->next, index--)
-               if (index <= 0 && try_module_get(tmp->owner))
+       for (tmp = file_systems; tmp; tmp = tmp->next, index--) {
+               if (index == 0) {
+                       if (try_module_get(tmp->owner))
+                               res = 0;
                        break;
+               }
+       }
        read_unlock(&file_systems_lock);
-       if (!tmp)
-               return -EINVAL;
+       if (res)
+               return res;
 
        /* OK, we got the reference, so we can safely block */
        len = strlen(tmp->name) + 1;