ext4: add extra checks to ext4_xattr_block_get()
Add explicit checks in ext4_xattr_block_get() just in case the e_value_offs and e_value_size fields in the the xattr block are corrupted in memory after the buffer_verified bit is set on the xattr block. Signed-off-by: Theodore Ts'o <tytso@mit.edu> Cc: stable@kernel.org
This commit is contained in:
@@ -70,6 +70,17 @@ struct ext4_xattr_entry {
|
||||
EXT4_I(inode)->i_extra_isize))
|
||||
#define IFIRST(hdr) ((struct ext4_xattr_entry *)((hdr)+1))
|
||||
|
||||
/*
|
||||
* XATTR_SIZE_MAX is currently 64k, but for the purposes of checking
|
||||
* for file system consistency errors, we use a somewhat bigger value.
|
||||
* This allows XATTR_SIZE_MAX to grow in the future, but by using this
|
||||
* instead of INT_MAX for certain consistency checks, we don't need to
|
||||
* worry about arithmetic overflows. (Actually XATTR_SIZE_MAX is
|
||||
* defined in include/uapi/linux/limits.h, so changing it is going
|
||||
* not going to be trivial....)
|
||||
*/
|
||||
#define EXT4_XATTR_SIZE_MAX (1 << 24)
|
||||
|
||||
/*
|
||||
* The minimum size of EA value when you start storing it in an external inode
|
||||
* size of block - size of header - size of 1 entry - 4 null bytes
|
||||
|
Reference in New Issue
Block a user