lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20240126085716.1363019-1-libaokun1@huawei.com> Date: Fri, 26 Jan 2024 16:57:09 +0800 From: Baokun Li <libaokun1@...wei.com> To: <linux-ext4@...r.kernel.org> CC: <tytso@....edu>, <adilger.kernel@...ger.ca>, <jack@...e.cz>, <ritesh.list@...il.com>, <linux-kernel@...r.kernel.org>, <yi.zhang@...wei.com>, <yangerkun@...wei.com>, <chengzhihao1@...wei.com>, <yukuai3@...wei.com>, <libaokun1@...wei.com> Subject: [PATCH 0/7] ext4: avoid sysfs variables overflow causing BUG_ON/SOOB Hello everyone, This patchset is intended to avoid variables that can be modified via sysfs from overflowing when stored or used and thus causing various problems. "kvm-xfstests -c ext4/all -g auto" has been executed with no new failures. Baokun Li (7): ext4: avoid overflow when setting values via sysfs ext4: refactor out ext4_generic_attr_store() ext4: refactor out ext4_generic_attr_show() ext4: add positive int attr pointer to avoid sysfs variables overflow ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists() ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow ext4: set the type of max_zeroout to unsigned int to avoid overflow fs/ext4/extents.c | 6 +- fs/ext4/mballoc.c | 2 + fs/ext4/mballoc.h | 2 +- fs/ext4/sysfs.c | 159 +++++++++++++++++++++++++--------------------- 4 files changed, 92 insertions(+), 77 deletions(-) -- 2.31.1
Powered by blists - more mailing lists