Message ID | 20200116231717.786549933@linuxfoundation.org |
---|---|
State | New |
Headers | show
Return-Path: <SRS0=dSN7=3F=vger.kernel.org=stable-owner@kernel.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI, SIGNED_OFF_BY, SPF_HELO_NONE, SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 744C6C33CAF for <stable@archiver.kernel.org>; Thu, 16 Jan 2020 23:34:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 39615206D9 for <stable@archiver.kernel.org>; Thu, 16 Jan 2020 23:34:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579217653; bh=eEeWCNCmkK+2SKixXeT+HZW32oNZAV+5LIKadrQZWQY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=cAHmza3p6pDbPUn23atC+jrlsgWyuzuzFiIz31dk9v3EhJ6uAkeEjqlhNrQUk+GlW WJ3XGEhNQr6Gw4DUmdM+AN+BHzP31ZM4TLBoDDnDDTAuMs4fH0Rq50G/2aMxqy1iZI p8tRRsUMrGvf0+dJ/bMqtOzyNiWZL2nk5ctHYk4s= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391365AbgAPXeL (ORCPT <rfc822;stable@archiver.kernel.org>); Thu, 16 Jan 2020 18:34:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:44648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404414AbgAPXdu (ORCPT <rfc822;stable@vger.kernel.org>); Thu, 16 Jan 2020 18:33:50 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ECB5D20684; Thu, 16 Jan 2020 23:33:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579217629; bh=eEeWCNCmkK+2SKixXeT+HZW32oNZAV+5LIKadrQZWQY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=W/qRVQXdtZ6L5RGTeWJDdLZlZjPHj6RbiDmtLAdzjJ17v5HcBld6rGja0QW04NGP9 fQ9oyTq688Bl1MvYa6pI3zP+631vWjiuuyFU7hcBSJDaF9SQndI4VhmUFdHcIeXUWc sn5OOtNKMz32yjg+eOJa5qIxbKfqifwBgP6xYZp4= From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>, stable@vger.kernel.org, Chao Yu <yuchao0@huawei.com>, Jaegeuk Kim <jaegeuk@kernel.org> Subject: [PATCH 4.14 60/71] f2fs: fix potential overflow Date: Fri, 17 Jan 2020 00:18:58 +0100 Message-Id: <20200116231717.786549933@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200116231709.377772748@linuxfoundation.org> References: <20200116231709.377772748@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: <stable.vger.kernel.org> X-Mailing-List: stable@vger.kernel.org |
Series |
None
|
expand
|
--- a/fs/f2fs/data.c +++ b/fs/f2fs/data.c @@ -1512,7 +1512,7 @@ static int __write_data_page(struct page loff_t i_size = i_size_read(inode); const pgoff_t end_index = ((unsigned long long) i_size) >> PAGE_SHIFT; - loff_t psize = (page->index + 1) << PAGE_SHIFT; + loff_t psize = (loff_t)(page->index + 1) << PAGE_SHIFT; unsigned offset = 0; bool need_balance_fs = false; int err = 0; --- a/fs/f2fs/file.c +++ b/fs/f2fs/file.c @@ -1059,7 +1059,7 @@ static int __clone_blkaddrs(struct inode } dn.ofs_in_node++; i++; - new_size = (dst + i) << PAGE_SHIFT; + new_size = (loff_t)(dst + i) << PAGE_SHIFT; if (dst_inode->i_size < new_size) f2fs_i_size_write(dst_inode, new_size); } while (--ilen && (do_replace[i] || blkaddr[i] == NULL_ADDR));