aboutsummaryrefslogtreecommitdiffstats
path: root/fs/overlayfs
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2015-09-18 06:45:12 -0400
committerMiklos Szeredi <miklos@szeredi.hu>2015-10-12 09:56:20 -0400
commit0480334fa60488d12ae101a02d7d9e1a3d03d7dd (patch)
treef9dfbb52a2ada460e3513bcf4e58ac488d8c9d3b /fs/overlayfs
parent64291f7db5bd8150a74ad2036f1037e6a0428df2 (diff)
ovl: use O_LARGEFILE in ovl_copy_up()
Open the lower file with O_LARGEFILE in ovl_copy_up(). Pass O_LARGEFILE unconditionally in ovl_copy_up_data() as it's purely for catching 32-bit userspace dealing with a file large enough that it'll be mishandled if the application isn't aware that there might be an integer overflow. Inside the kernel, there shouldn't be any problems. Reported-by: Ulrich Obergfell <uobergfe@redhat.com> Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Miklos Szeredi <miklos@szeredi.hu> Cc: <stable@vger.kernel.org> # v3.18+
Diffstat (limited to 'fs/overlayfs')
-rw-r--r--fs/overlayfs/copy_up.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c
index 84d693d37428..b1990ac8fa09 100644
--- a/fs/overlayfs/copy_up.c
+++ b/fs/overlayfs/copy_up.c
@@ -81,11 +81,11 @@ static int ovl_copy_up_data(struct path *old, struct path *new, loff_t len)
81 if (len == 0) 81 if (len == 0)
82 return 0; 82 return 0;
83 83
84 old_file = ovl_path_open(old, O_RDONLY); 84 old_file = ovl_path_open(old, O_LARGEFILE | O_RDONLY);
85 if (IS_ERR(old_file)) 85 if (IS_ERR(old_file))
86 return PTR_ERR(old_file); 86 return PTR_ERR(old_file);
87 87
88 new_file = ovl_path_open(new, O_WRONLY); 88 new_file = ovl_path_open(new, O_LARGEFILE | O_WRONLY);
89 if (IS_ERR(new_file)) { 89 if (IS_ERR(new_file)) {
90 error = PTR_ERR(new_file); 90 error = PTR_ERR(new_file);
91 goto out_fput; 91 goto out_fput;