Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8121271imu; Tue, 4 Dec 2018 03:22:06 -0800 (PST) X-Google-Smtp-Source: AFSGD/UxFR7om/VBndXyeWGc7iCgZiJO/r5Q8KRu8YF20C5AP7F/dpqc1YqvpzqWFufGLKfagKoB X-Received: by 2002:a63:ea4f:: with SMTP id l15mr16099372pgk.102.1543922526376; Tue, 04 Dec 2018 03:22:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543922526; cv=none; d=google.com; s=arc-20160816; b=tqtMSZI5tY4euREgfSx4q+cZ/Z6TQdFzswDXJusTPXXj/fx+krXo5Q98h/oYKIoFjS pgwC3Y8BYWumuPI4oXm23EjgTswoINllNZ89yAzztG41ZLl6xCyeIcnmj/08Sy3jqX+7 3T4s1CqQXBLch+3gLJs+gmB2rBKyVMZZOtScGyjtICTKM3OexfuWqtfO06UmNUxu2tLH jXu+bmDLp7rMYaFp2yLOCuGP8KIP0/T1WS4BcMsyFrkrj8G4EkeQ4DcMb9RLG3ld1YeA oRG+I+uGeYkoJFh6bZssb17vcVUO1f/TofvpRHR7A6rU3HEFp9GBz+HONzzXZgyaYj4S TtYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iOOylL517oViDH+tTmlm38aXt+Za2GdwK86/HIyMffY=; b=T3Fo6VSaZFcCN4AhwRyl+uiXyOL88zn7mHcVYcXe0DZagydKLP9MB0+Dq1FgbmemDE /zExCPpbFfy2Ipmdq9g+xBnqDS608gtdxfJr0oF6iy+fF86/TtUIrcGU9dXxXZCF85U3 nvsNSvtSBnxceDj8Om+Bkl3rQLtuE2WGPof1TBy9ER7dMV/o2XG8Mcv8dXInk2Hu5o4n TJHyYOsH6pvB6grEmG5wxSf+zgivEFv0P87hpQwa7Kbt8vxKTujzViCsGl+i4hJJWn8V jCT+fwtpwQZPu2B7FiG5o8q4j3GVOzb00vBFVVFSVzM2GzzB1Hp0O7zuKg560pqCI1oU pWXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SYgm4Uk+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b8si15372404pge.384.2018.12.04.03.21.51; Tue, 04 Dec 2018 03:22:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SYgm4Uk+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727853AbeLDLDn (ORCPT + 99 others); Tue, 4 Dec 2018 06:03:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:50240 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726402AbeLDLDj (ORCPT ); Tue, 4 Dec 2018 06:03:39 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1AE70214DA; Tue, 4 Dec 2018 11:03:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921418; bh=iBiGUctwaj/a9ks6zN/5StmSDeksdLU/ijDUIoX8m+A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SYgm4Uk+X0U5PnjUxL/4hOPmfjRGZ3Ptb6G0/jeaRGCopsJwD0zrceXuQWpsschfk VYnDkA/+iPrbNXEy5UIKYqt0P5WlpjNIQjbN58vU4V6dcFQwKCQDNG4wLMnlrXeaYB f4n3BGZzPLzTOovFxENWLK9xBIW0qNYLeQ2/Yf84= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xu Wen , Qu Wenruo , Gu Jinxiang , David Sterba , Ben Hutchings , Sasha Levin Subject: [PATCH 4.14 028/146] btrfs: Verify that every chunk has corresponding block group at mount time Date: Tue, 4 Dec 2018 11:48:34 +0100 Message-Id: <20181204103727.990828074@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103726.750894136@linuxfoundation.org> References: <20181204103726.750894136@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ commit 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6 upstream. If a crafted image has missing block group items, it could cause unexpected behavior and breaks the assumption of 1:1 chunk<->block group mapping. Although we have the block group -> chunk mapping check, we still need chunk -> block group mapping check. This patch will do extra check to ensure each chunk has its corresponding block group. Link: https://bugzilla.kernel.org/show_bug.cgi?id=199847 Reported-by: Xu Wen Signed-off-by: Qu Wenruo Reviewed-by: Gu Jinxiang Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Ben Hutchings Signed-off-by: Sasha Levin --- fs/btrfs/extent-tree.c | 58 +++++++++++++++++++++++++++++++++++++++++- 1 file changed, 57 insertions(+), 1 deletion(-) diff --git a/fs/btrfs/extent-tree.c b/fs/btrfs/extent-tree.c index 2cb3569ac548..fdc42eddccc2 100644 --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -10092,6 +10092,62 @@ btrfs_create_block_group_cache(struct btrfs_fs_info *fs_info, return cache; } + +/* + * Iterate all chunks and verify that each of them has the corresponding block + * group + */ +static int check_chunk_block_group_mappings(struct btrfs_fs_info *fs_info) +{ + struct btrfs_mapping_tree *map_tree = &fs_info->mapping_tree; + struct extent_map *em; + struct btrfs_block_group_cache *bg; + u64 start = 0; + int ret = 0; + + while (1) { + read_lock(&map_tree->map_tree.lock); + /* + * lookup_extent_mapping will return the first extent map + * intersecting the range, so setting @len to 1 is enough to + * get the first chunk. + */ + em = lookup_extent_mapping(&map_tree->map_tree, start, 1); + read_unlock(&map_tree->map_tree.lock); + if (!em) + break; + + bg = btrfs_lookup_block_group(fs_info, em->start); + if (!bg) { + btrfs_err(fs_info, + "chunk start=%llu len=%llu doesn't have corresponding block group", + em->start, em->len); + ret = -EUCLEAN; + free_extent_map(em); + break; + } + if (bg->key.objectid != em->start || + bg->key.offset != em->len || + (bg->flags & BTRFS_BLOCK_GROUP_TYPE_MASK) != + (em->map_lookup->type & BTRFS_BLOCK_GROUP_TYPE_MASK)) { + btrfs_err(fs_info, +"chunk start=%llu len=%llu flags=0x%llx doesn't match block group start=%llu len=%llu flags=0x%llx", + em->start, em->len, + em->map_lookup->type & BTRFS_BLOCK_GROUP_TYPE_MASK, + bg->key.objectid, bg->key.offset, + bg->flags & BTRFS_BLOCK_GROUP_TYPE_MASK); + ret = -EUCLEAN; + free_extent_map(em); + btrfs_put_block_group(bg); + break; + } + start = em->start + em->len; + free_extent_map(em); + btrfs_put_block_group(bg); + } + return ret; +} + int btrfs_read_block_groups(struct btrfs_fs_info *info) { struct btrfs_path *path; @@ -10264,7 +10320,7 @@ int btrfs_read_block_groups(struct btrfs_fs_info *info) } init_global_block_rsv(info); - ret = 0; + ret = check_chunk_block_group_mappings(info); error: btrfs_free_path(path); return ret; -- 2.17.1