Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3532386imu; Mon, 7 Jan 2019 05:12:03 -0800 (PST) X-Google-Smtp-Source: ALg8bN73pksbSL3Df4FUY+x95/PTuCgqGHzUZzq4teWCQ4aTNL3X0vtlTejJ6EO4KEjgmBlMmUrS X-Received: by 2002:a63:ff62:: with SMTP id s34mr30134308pgk.325.1546866723607; Mon, 07 Jan 2019 05:12:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546866723; cv=none; d=google.com; s=arc-20160816; b=VtDUnVUkxut2yyVVZv73Lu89tyOxvRaqMbHRtAJMtcXJ9V2Ou7edkGIo2SBCizGcDh bOwBUvwAl9dAgBf0HNYqfskCpq7lON+0CqyJQd6sQFHPGuE2wbE/VZUU5LlCFlAHgu+F x0GO322vMaFiCZmw9jXhjoQ9YPOs9ql98hEoR1zCE5L5Ov1bGJY1Ny6MfqG+qElaH+dI CQQDqC+NDTdxa2A8esO8K+njvY2WcS9t3dj4czJXQYh6KGZxplSfGD1YK5XeIyH5o/w2 kXdeU0/NHh976dBXrOLBKPrzxTsoQ9PiwMx14ekU3zvuJwL7tMf3m5jVR7ys/66dHM0S hx1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=s9PuAPC1thSKkFYw3NC0QrZ5sxGmvQcmJq8FCOpwYto=; b=LkQfi42dwlexxkBRB1MniXWD7rUNF6EriDpOqPSroUJ0dZ62Z4RGhMdqJUqSU3wqUX cyrfXcs8iaScsTLFEfnSEwycgcurIgQQjYIeTqc6yT1/dkZcevRUeJVy0A7wY6LCmfI4 D0T8y6gS30/nMKSYcUfVPzYSwP7qZgOGJyU5es+/fnoZ1OB/vv9wM4TVGsEdzZTesreW qoyxAJcocAlaZPcUkgQ9bZVDVYTkYpQWMrT7Yfik90oKlZm4KRb/8VW2ZsMADReNC2Ui hiAbz89Ml2WFE0RCdJVe9y6zzzxkAjAQy4UzfunW3lCgzNW7WDW6uAI/b98o3r9TAwJJ f6vQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DHoy3o17; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si17249887pls.71.2019.01.07.05.11.48; Mon, 07 Jan 2019 05:12:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DHoy3o17; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731743AbfAGNI4 (ORCPT + 99 others); Mon, 7 Jan 2019 08:08:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:55956 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731726AbfAGNIw (ORCPT ); Mon, 7 Jan 2019 08:08:52 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 845E22089F; Mon, 7 Jan 2019 13:08:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546866532; bh=A13X+9AwadrN4YqbHaC77fG5yHYWjgpU6qG6NLguf/o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DHoy3o17IKfcxlrkUCwXZHUmscP/p7Dsr4/BmohH53iWkr0bpZMIluG/6f1Gz80HV KIzN60zQWF1M2Rx2mJLtM04AsDeE39Kk7PZARgCkRaEDOf3PnqHLSOQ/ZMpcJ+IC8D lhhv0i7NLVrqntqbDgkJRnHC8IVIEC2yGRhEwL5E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Blumenstingl , Chao Yu , Jaegeuk Kim Subject: [PATCH 4.9 60/71] f2fs: fix validation of the block count in sanity_check_raw_super Date: Mon, 7 Jan 2019 13:33:29 +0100 Message-Id: <20190107105336.152544550@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107105330.280153213@linuxfoundation.org> References: <20190107105330.280153213@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Martin Blumenstingl commit 88960068f25fcc3759455d85460234dcc9d43fef upstream. Treat "block_count" from struct f2fs_super_block as 64-bit little endian value in sanity_check_raw_super() because struct f2fs_super_block declares "block_count" as "__le64". This fixes a bug where the superblock validation fails on big endian devices with the following error: F2FS-fs (sda1): Wrong segment_count / block_count (61439 > 0) F2FS-fs (sda1): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (sda1): Wrong segment_count / block_count (61439 > 0) F2FS-fs (sda1): Can't find valid F2FS filesystem in 2th superblock As result of this the partition cannot be mounted. With this patch applied the superblock validation works fine and the partition can be mounted again: F2FS-fs (sda1): Mounted with checkpoint version = 7c84 My little endian x86-64 hardware was able to mount the partition without this fix. To confirm that mounting f2fs filesystems works on big endian machines again I tested this on a 32-bit MIPS big endian (lantiq) device. Fixes: 0cfe75c5b01199 ("f2fs: enhance sanity_check_raw_super() to avoid potential overflows") Cc: stable@vger.kernel.org Signed-off-by: Martin Blumenstingl Reviewed-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Greg Kroah-Hartman --- fs/f2fs/super.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -1427,10 +1427,10 @@ static int sanity_check_raw_super(struct return 1; } - if (segment_count > (le32_to_cpu(raw_super->block_count) >> 9)) { + if (segment_count > (le64_to_cpu(raw_super->block_count) >> 9)) { f2fs_msg(sb, KERN_INFO, - "Wrong segment_count / block_count (%u > %u)", - segment_count, le32_to_cpu(raw_super->block_count)); + "Wrong segment_count / block_count (%u > %llu)", + segment_count, le64_to_cpu(raw_super->block_count)); return 1; }