summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorFlorian-Ewald Mueller <florian-ewald.mueller@ionos.com>2022-10-25 09:37:05 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2023-01-18 11:41:49 +0100
commit2c4832a0893a47068a660049bedf9c6b3f08f640 (patch)
tree54553b4d522deb105b3e1cfc849819fce8274678 /security
parentb869cb7a3d524040966a08487fa9003bc7856aa9 (diff)
md/bitmap: Fix bitmap chunk size overflow issues
commit 4555211190798b6b6fa2c37667d175bf67945c78 upstream. - limit bitmap chunk size internal u64 variable to values not overflowing the u32 bitmap superblock structure variable stored on persistent media - assign bitmap chunk size internal u64 variable from unsigned values to avoid possible sign extension artifacts when assigning from a s32 value The bug has been there since at least kernel 4.0. Steps to reproduce it: 1: mdadm -C /dev/mdx -l 1 --bitmap=internal --bitmap-chunk=256M -e 1.2 -n2 /dev/rnbd1 /dev/rnbd2 2 resize member device rnbd1 and rnbd2 to 8 TB 3 mdadm --grow /dev/mdx --size=max The bitmap_chunksize will overflow without patch. Cc: stable@vger.kernel.org Signed-off-by: Florian-Ewald Mueller <florian-ewald.mueller@ionos.com> Signed-off-by: Jack Wang <jinpu.wang@ionos.com> Signed-off-by: Song Liu <song@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions