mm: fix memcpy_from_file_folio() integer underflow
authorMatthew Wilcox (Oracle) <willy@infradead.org>
Fri, 3 Feb 2023 21:28:40 +0000 (16:28 -0500)
committerAndrew Morton <akpm@linux-foundation.org>
Fri, 10 Feb 2023 00:51:30 +0000 (16:51 -0800)
If we have a HIGHMEM system with a large folio, 'offset' may be larger
than PAGE_SIZE, and so min_t will cap at 'len' instead of the intended
end-of-page.  That can overflow into the next page which is likely to be
unmapped and fault, but could theoretically copy the wrong data.

Link: https://lkml.kernel.org/r/Y919vmSrtAgsf6K3@casper.infradead.org
Fixes: 00cdf76012ab ("mm: add memcpy_from_file_folio()")
Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
Cc: "Fabio M. De Francesco" <fmdefrancesco@gmail.com>
Cc: Ira Weiny <ira.weiny@intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
include/linux/highmem.h

index 348701d..b06254e 100644 (file)
@@ -431,9 +431,10 @@ static inline size_t memcpy_from_file_folio(char *to, struct folio *folio,
        size_t offset = offset_in_folio(folio, pos);
        char *from = kmap_local_folio(folio, offset);
 
-       if (folio_test_highmem(folio))
+       if (folio_test_highmem(folio)) {
+               offset = offset_in_page(offset);
                len = min_t(size_t, len, PAGE_SIZE - offset);
-       else
+       else
                len = min(len, folio_size(folio) - offset);
 
        memcpy(to, from, len);