Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3536329imu; Mon, 7 Jan 2019 05:15:44 -0800 (PST) X-Google-Smtp-Source: ALg8bN7Y/KMIJdlkMM5ok8z5itY2lPZnwEgYI8eKi/8oqEW38vFld0oKqxB11lpAlCwnNfHP3YyB X-Received: by 2002:a17:902:2468:: with SMTP id m37mr61136906plg.314.1546866944457; Mon, 07 Jan 2019 05:15:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546866944; cv=none; d=google.com; s=arc-20160816; b=x7wy0cFny2Kf8Fs/VdRZ4jYl/AYg6KYi6tZ4oUfBRq2tDIpG5CAb5A8rdH8tsHm4sh yCC4w7XDNIxq2EhVF4GeZ+OXCK4zfq+lAKVIcqjBhaw3pJky/cNr/p4Xr4tX86TMcrvM DoQmyNTGObQM+hvWIyat2vyZoavdQlmozm/M0IPSDTLCxKA9vJJk8EaxPoeVVImTgwgO +4POgVj9tmjO4ZMAG10zDqq0H6FlJxiDAZxCHSzOk5dLCVfsU8aP/yxRHN4G8gRicu0r XwXadAhS3UL+BMhiJGSIDsiQ187ApRz/NhqQQtiWl9MfHoa/CFqnw0rHNjen4NjrXuaY OamA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rqAbWlTJSGwlOYIJCVFz+XlgEkwKTi0LysUCyMT/SjQ=; b=c7xlfdMXUxfrboEaOw9PTwOieQ1DLLZRb0aa41CNevuQcBgSx88fpRcici1E/YPWAg At3Rci1pSBBfvK0ag3O6CJuVE6cdQ9zRcEtPDmTYtGGgOednSSvnbv/RLqtzp4a4Gn9U ScdTm0XOwXKcD7KVwmWifgoDt30DnWp7J8hTRfXaLa8BbXuzQZNOxXjd30Ial2RK8FNx F/Ax463IczqCveQoV+DO7Bqwvsozdv8rsQ6wb7qpW3x4dFjRhMgk9xwpEgArR7VwglaF KZJ5sf5b0I3z+vVkPHHu4NrHM6nOST9Qv3XcrixGSmk8nH6wPQ9Pr0Az1XyPiyJBnVsB Zu2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mDJOiN39; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si30851395plq.138.2019.01.07.05.15.29; Mon, 07 Jan 2019 05:15:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mDJOiN39; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731643AbfAGNMc (ORCPT + 99 others); Mon, 7 Jan 2019 08:12:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:52222 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731215AbfAGNEe (ORCPT ); Mon, 7 Jan 2019 08:04:34 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 860362089F; Mon, 7 Jan 2019 13:04:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546866274; bh=5gPlBzSB2RLlERSGaOX1p29moI6A9g0WYECkoK/eSz4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mDJOiN39DbJ+NiMydI9+0DYe9L8/NXquSNMrXbT0I4j+qVF5tJliWu0kaW11Toaln 4bt7dYD5uBmDj4+P3rZuPNejTVLAmROwIoh0Vja7sbt5Zsgt23p3okqoq+LaJVdS7S nev7k+MjBcaAfx9lTTtQCof9lHetxmekQqVKO1L4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Blumenstingl , Chao Yu , Jaegeuk Kim Subject: [PATCH 4.14 085/101] f2fs: fix validation of the block count in sanity_check_raw_super Date: Mon, 7 Jan 2019 13:33:13 +0100 Message-Id: <20190107105337.577412229@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107105330.372621917@linuxfoundation.org> References: <20190107105330.372621917@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Martin Blumenstingl commit 88960068f25fcc3759455d85460234dcc9d43fef upstream. Treat "block_count" from struct f2fs_super_block as 64-bit little endian value in sanity_check_raw_super() because struct f2fs_super_block declares "block_count" as "__le64". This fixes a bug where the superblock validation fails on big endian devices with the following error: F2FS-fs (sda1): Wrong segment_count / block_count (61439 > 0) F2FS-fs (sda1): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (sda1): Wrong segment_count / block_count (61439 > 0) F2FS-fs (sda1): Can't find valid F2FS filesystem in 2th superblock As result of this the partition cannot be mounted. With this patch applied the superblock validation works fine and the partition can be mounted again: F2FS-fs (sda1): Mounted with checkpoint version = 7c84 My little endian x86-64 hardware was able to mount the partition without this fix. To confirm that mounting f2fs filesystems works on big endian machines again I tested this on a 32-bit MIPS big endian (lantiq) device. Fixes: 0cfe75c5b01199 ("f2fs: enhance sanity_check_raw_super() to avoid potential overflows") Cc: stable@vger.kernel.org Signed-off-by: Martin Blumenstingl Reviewed-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Greg Kroah-Hartman --- fs/f2fs/super.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -1897,10 +1897,10 @@ static int sanity_check_raw_super(struct return 1; } - if (segment_count > (le32_to_cpu(raw_super->block_count) >> 9)) { + if (segment_count > (le64_to_cpu(raw_super->block_count) >> 9)) { f2fs_msg(sb, KERN_INFO, - "Wrong segment_count / block_count (%u > %u)", - segment_count, le32_to_cpu(raw_super->block_count)); + "Wrong segment_count / block_count (%u > %llu)", + segment_count, le64_to_cpu(raw_super->block_count)); return 1; }