Received: by 10.192.165.148 with SMTP id m20csp4186597imm; Mon, 30 Apr 2018 13:27:15 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqLDtqjbPoayYQ647ZNlOqWGNeCsLz2voy4d8iOQx3919L73+5vqxMcW+L5xav3OAbQvzEu X-Received: by 2002:a17:902:9890:: with SMTP id s16-v6mr13760023plp.132.1525120035760; Mon, 30 Apr 2018 13:27:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525120035; cv=none; d=google.com; s=arc-20160816; b=iKOhiXh03DAhxmxZQ9ovE4dyJAzQPjZWWxfVRjNPbWVtNC/eVvY3KxwovtmQmRBMKX WgabVT5G7x4pkEtAP1ql/sRdNQYKdct1YC5Oqbvs56ZFqx1JqcqrxgSKW5CQPeHb278H DBE/pw1Rjy4OxOW69mxDwpwqfgTX5FwIicDWLxmTJh29wc5PB0krdjsBOxPMzKlgQEJA 94XdAoCZR8NlhNhWcZb4bEYTD6H6dGiQZxsZVtYxExhsvza6fw721OVGsBZKsIa2mjHV TqC9pfduuF4pJcZKV6asVbMcanuNqISv7o8FJbLS18l4AgYpU2bQ6YrSQFxLU/11C9pE HSZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=8ktO0D7MH9bjr1tGKE1gyg46AiO8hl0gsuRBTiFa29s=; b=NaIRWDg+yP2EOULbvbtStrTP7lG9mUiYfVGwt3Y56FSuRwLmDMr5QM3tXAAqlrFaej q9MqLOUgZXmpXYPEouIQvvGNIx7qSdMcASaaXe/WSCMfTVNYufTsmZ5TGHpIV0jeWu/h kY49kFqaoVF29m8HPjYcNa2ocV0Snb9kGOf5tKLhiqR1hV+A5Jxk7S/RgFSBPZXNpKiX 6Kg9Gp4Lti8QVl3OLLUVJj9hEIfldWsJzVMF86Xo0A++kmrf+3XXPTbo/uVmzcNEM0Q4 doDgIFfbNEBVerZmDxt7DvhY30CKb7R1EW2cokdcJDJBi05Mfbz2MFu2YVtUoqkPZfVW ZHYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l1-v6si49356pli.409.2018.04.30.13.27.01; Mon, 30 Apr 2018 13:27:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755933AbeD3UZp (ORCPT + 99 others); Mon, 30 Apr 2018 16:25:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:60202 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755658AbeD3T0a (ORCPT ); Mon, 30 Apr 2018 15:26:30 -0400 Received: from localhost (unknown [104.132.1.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A897122DAE; Mon, 30 Apr 2018 19:26:29 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org A897122DAE Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Czerner , Theodore Tso , Ilya Dryomov Subject: [PATCH 4.9 04/61] ext4: fix bitmap position validation Date: Mon, 30 Apr 2018 12:24:07 -0700 Message-Id: <20180430183951.709934183@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180430183951.312721450@linuxfoundation.org> References: <20180430183951.312721450@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Lukas Czerner commit 22be37acce25d66ecf6403fc8f44df9c5ded2372 upstream. Currently in ext4_valid_block_bitmap() we expect the bitmap to be positioned anywhere between 0 and s_blocksize clusters, but that's wrong because the bitmap can be placed anywhere in the block group. This causes false positives when validating bitmaps on perfectly valid file system layouts. Fix it by checking whether the bitmap is within the group boundary. The problem can be reproduced using the following mkfs -t ext3 -E stride=256 /dev/vdb1 mount /dev/vdb1 /mnt/test cd /mnt/test wget https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.16.3.tar.xz tar xf linux-4.16.3.tar.xz This will result in the warnings in the logs EXT4-fs error (device vdb1): ext4_validate_block_bitmap:399: comm tar: bg 84: block 2774529: invalid block bitmap [ Changed slightly for clarity and to not drop a overflow test -- TYT ] Signed-off-by: Lukas Czerner Signed-off-by: Theodore Ts'o Reported-by: Ilya Dryomov Fixes: 7dac4a1726a9 ("ext4: add validity checks for bitmap block numbers") Cc: stable@vger.kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/balloc.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) --- a/fs/ext4/balloc.c +++ b/fs/ext4/balloc.c @@ -320,6 +320,7 @@ static ext4_fsblk_t ext4_valid_block_bit struct ext4_sb_info *sbi = EXT4_SB(sb); ext4_grpblk_t offset; ext4_grpblk_t next_zero_bit; + ext4_grpblk_t max_bit = EXT4_CLUSTERS_PER_GROUP(sb); ext4_fsblk_t blk; ext4_fsblk_t group_first_block; @@ -337,7 +338,7 @@ static ext4_fsblk_t ext4_valid_block_bit /* check whether block bitmap block number is set */ blk = ext4_block_bitmap(sb, desc); offset = blk - group_first_block; - if (offset < 0 || EXT4_B2C(sbi, offset) >= sb->s_blocksize || + if (offset < 0 || EXT4_B2C(sbi, offset) >= max_bit || !ext4_test_bit(EXT4_B2C(sbi, offset), bh->b_data)) /* bad block bitmap */ return blk; @@ -345,7 +346,7 @@ static ext4_fsblk_t ext4_valid_block_bit /* check whether the inode bitmap block number is set */ blk = ext4_inode_bitmap(sb, desc); offset = blk - group_first_block; - if (offset < 0 || EXT4_B2C(sbi, offset) >= sb->s_blocksize || + if (offset < 0 || EXT4_B2C(sbi, offset) >= max_bit || !ext4_test_bit(EXT4_B2C(sbi, offset), bh->b_data)) /* bad block bitmap */ return blk; @@ -353,8 +354,8 @@ static ext4_fsblk_t ext4_valid_block_bit /* check whether the inode table block number is set */ blk = ext4_inode_table(sb, desc); offset = blk - group_first_block; - if (offset < 0 || EXT4_B2C(sbi, offset) >= sb->s_blocksize || - EXT4_B2C(sbi, offset + sbi->s_itb_per_group) >= sb->s_blocksize) + if (offset < 0 || EXT4_B2C(sbi, offset) >= max_bit || + EXT4_B2C(sbi, offset + sbi->s_itb_per_group) >= max_bit) return blk; next_zero_bit = ext4_find_next_zero_bit(bh->b_data, EXT4_B2C(sbi, offset + EXT4_SB(sb)->s_itb_per_group),