patches.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: patches@lists.linux.dev, stable@vger.kernel.org
Cc: Dmitry Kandybka <d.kandybka@gmail.com>,
	Viacheslav Dubeyko <Slava.Dubeyko@ibm.com>,
	Ilya Dryomov <idryomov@gmail.com>,
	Sasha Levin <sashal@kernel.org>,
	xiubli@redhat.com, ceph-devel@vger.kernel.org
Subject: [PATCH AUTOSEL 5.10 3/4] ceph: fix possible integer overflow in ceph_zero_objects()
Date: Mon,  9 Jun 2025 18:54:08 -0400	[thread overview]
Message-ID: <20250609225410.1444715-3-sashal@kernel.org> (raw)
In-Reply-To: <20250609225410.1444715-1-sashal@kernel.org>

From: Dmitry Kandybka <d.kandybka@gmail.com>

[ Upstream commit 0abd87942e0c93964e93224836944712feba1d91 ]

In 'ceph_zero_objects', promote 'object_size' to 'u64' to avoid possible
integer overflow.

Compile tested only.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Signed-off-by: Dmitry Kandybka <d.kandybka@gmail.com>
Reviewed-by: Viacheslav Dubeyko <Slava.Dubeyko@ibm.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---

**YES**

This commit should be backported to stable kernel trees. Here's my
detailed analysis:

## Why This Should Be Backported

### 1. **Clear Bug Fix with User Impact**
The commit fixes a real integer overflow vulnerability in
`ceph_zero_objects()` where `s32 object_size` is multiplied by `s32
stripe_count` to calculate `u64 object_set_size`. When the layout values
exceed 2^31, the multiplication can underflow, leading to:
- Incorrect loop bounds in the zeroing logic
- Potential infinite loops or premature termination
- Data integrity issues during hole punching operations
- Incorrect `do_div()` operations

### 2. **Affects Critical Kernel Functionality**
This bug impacts core filesystem operations that users depend on:
- `fallocate()` system call with `FALLOC_FL_PUNCH_HOLE`
- File sparse operations used by databases, VMs, backup tools
- Copy-on-write optimizations in Ceph filesystems

### 3. **Small, Contained, and Low-Risk Fix**
The code change is minimal and safe:
```c
- u64 object_set_size = object_size * stripe_count;
+       u64 object_set_size = (u64) object_size * stripe_count;
```

This fix:
- Promotes `object_size` to `u64` before multiplication, preventing
  overflow
- Has no functional side effects beyond fixing the bug
- Maintains consistency with the underlying `u32` data types in
  `ceph_file_layout`
- Cannot introduce regressions

### 4. **Follows Stable Tree Criteria**
- **Important bugfix**: Prevents potential data corruption and system
  instability
- **Minimal risk**: Single-line change with no architectural impact
- **Confined scope**: Only affects Ceph filesystem's hole punching logic
- **No new features**: Pure defensive fix

### 5. **Matches Successful Backport Pattern**
This commit is very similar to **Similar Commit #1** (marked YES for
backport) which also:
- Fixed a type promotion bug affecting critical operations
- Had minimal code changes with clear safety benefits
- Addressed potential data integrity issues
- Was explicitly marked with `Cc: stable@vger.kernel.org`

### 6. **Proactive Hardening Value**
While the bug requires specific conditions to trigger (large object
sizes or stripe counts), backporting provides:
- Defense against potential malicious layouts from compromised metadata
  servers
- Protection for users with unusual but valid filesystem configurations
- General robustness improvement for production systems

The fix has no downside risk and provides meaningful protection against
a real integer overflow scenario that could affect data integrity in
Ceph filesystems.

 fs/ceph/file.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fs/ceph/file.c b/fs/ceph/file.c
index d4974c652e8e4..c1eafff45b194 100644
--- a/fs/ceph/file.c
+++ b/fs/ceph/file.c
@@ -2034,7 +2034,7 @@ static int ceph_zero_objects(struct inode *inode, loff_t offset, loff_t length)
 	s32 stripe_unit = ci->i_layout.stripe_unit;
 	s32 stripe_count = ci->i_layout.stripe_count;
 	s32 object_size = ci->i_layout.object_size;
-	u64 object_set_size = object_size * stripe_count;
+	u64 object_set_size = (u64) object_size * stripe_count;
 	u64 nearly, t;
 
 	/* round offset up to next period boundary */
-- 
2.39.5


  parent reply	other threads:[~2025-06-09 22:54 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-06-09 22:54 [PATCH AUTOSEL 5.10 1/4] ALSA: hda: Ignore unsol events for cards being shut down Sasha Levin
2025-06-09 22:54 ` [PATCH AUTOSEL 5.10 2/4] ALSA: hda: Add new pci id for AMD GPU display HD audio controller Sasha Levin
2025-06-09 22:54 ` Sasha Levin [this message]
2025-06-09 22:54 ` [PATCH AUTOSEL 5.10 4/4] ovl: Check for NULL d_inode() in ovl_dentry_upper() Sasha Levin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250609225410.1444715-3-sashal@kernel.org \
    --to=sashal@kernel.org \
    --cc=Slava.Dubeyko@ibm.com \
    --cc=ceph-devel@vger.kernel.org \
    --cc=d.kandybka@gmail.com \
    --cc=idryomov@gmail.com \
    --cc=patches@lists.linux.dev \
    --cc=stable@vger.kernel.org \
    --cc=xiubli@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).