dm verity: fix overflow check
This patch fixes sector_t overflow checking in dm-verity. Without this patch, the code checks for overflow only if sector_t is smaller than long long, not if sector_t and long long have the same size. Signed-off-by: Mikulas Patocka <mpatocka@redhat.com> Cc: stable@vger.kernel.org Signed-off-by: Alasdair G Kergon <agk@redhat.com>
This commit is contained in:
committed by
Alasdair G Kergon
parent
0424caa145
commit
1d55f6bcc0
@@ -718,8 +718,8 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
|
|||||||
v->hash_dev_block_bits = ffs(num) - 1;
|
v->hash_dev_block_bits = ffs(num) - 1;
|
||||||
|
|
||||||
if (sscanf(argv[5], "%llu%c", &num_ll, &dummy) != 1 ||
|
if (sscanf(argv[5], "%llu%c", &num_ll, &dummy) != 1 ||
|
||||||
num_ll << (v->data_dev_block_bits - SECTOR_SHIFT) !=
|
(sector_t)(num_ll << (v->data_dev_block_bits - SECTOR_SHIFT))
|
||||||
(sector_t)num_ll << (v->data_dev_block_bits - SECTOR_SHIFT)) {
|
>> (v->data_dev_block_bits - SECTOR_SHIFT) != num_ll) {
|
||||||
ti->error = "Invalid data blocks";
|
ti->error = "Invalid data blocks";
|
||||||
r = -EINVAL;
|
r = -EINVAL;
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -733,8 +733,8 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (sscanf(argv[6], "%llu%c", &num_ll, &dummy) != 1 ||
|
if (sscanf(argv[6], "%llu%c", &num_ll, &dummy) != 1 ||
|
||||||
num_ll << (v->hash_dev_block_bits - SECTOR_SHIFT) !=
|
(sector_t)(num_ll << (v->hash_dev_block_bits - SECTOR_SHIFT))
|
||||||
(sector_t)num_ll << (v->hash_dev_block_bits - SECTOR_SHIFT)) {
|
>> (v->hash_dev_block_bits - SECTOR_SHIFT) != num_ll) {
|
||||||
ti->error = "Invalid hash start";
|
ti->error = "Invalid hash start";
|
||||||
r = -EINVAL;
|
r = -EINVAL;
|
||||||
goto bad;
|
goto bad;
|
||||||
|
Reference in New Issue
Block a user