Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6205174ybv; Tue, 18 Feb 2020 12:00:59 -0800 (PST) X-Google-Smtp-Source: APXvYqzSkMpmBAxBDZlBOYx0E7T8E8kNhO3r+Mk7OD7P8M/a5zAmlsDxkibn9dn9TRS48FMrf9FZ X-Received: by 2002:a05:6830:1385:: with SMTP id d5mr17645955otq.61.1582056058909; Tue, 18 Feb 2020 12:00:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582056058; cv=none; d=google.com; s=arc-20160816; b=k/H+vjKH0PgDA6SlVuSgvbmyXpUcc1t/+2cQGvlb1/LX00a6i/5B5is0I1IVUjT0T8 cC+r1nFxgBFsnSPcByQd4bzQ1MshNhj2oal1H9nMJUT6w0DvYmsHwvWJjrR2WHUqBsPB LooGST2hufYeVFAnUfbjxUOHxU2AcJAYcecTn3vFDh2fcOz5XSDdWZQubTd9KyxsJosM IEbhzldOlz6TD98uLV696ujOBoKBvCo04wOs1pzuucaoceP3JyCw/u0FClNruQ6e7hJQ yqCHChTI1EWNsMZQUU2/w5emChZi5/5pxCTbyyTbTgS4lXjKxZ481fykYyjgT32kUpEJ 98Yg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8TmapQFG0f6FAYO7vXEkW4iynuzNiJ96R0vL01Q14GM=; b=ttr2lQ4oSztti//9m0OhDgx0VuUJ/xmChne1l8YcPknx0t0LYbYmTQ+EFYFhR9f6uG 6XNfxDMfLbA0b0/kNxEgzzWvp98uVgCXeZithrB92ZzgcamX5iiFNE4ZdFoBtDDdhf+k fQ01lwb50kV3WqFHWC/eHhNmO67asFub8VWKaTZg8jIXTRp4BHsJGpngCd/mOr5h/DiA YzGXfC849E/VFe+k+RIWVuEmObhIzFh+y59BTcbl4VnHRSGoBWgpzGnYqCLo64QlWOzj OQ6UPC6DveJFjMedClbw11bet0+Szv8BQ2fOVyg3XxG1IjsyvpnB+DCErMaoJR4IpFgx 9vdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kVeX2UiD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3si2336563otn.140.2020.02.18.12.00.46; Tue, 18 Feb 2020 12:00:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kVeX2UiD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728445AbgBRT7j (ORCPT + 99 others); Tue, 18 Feb 2020 14:59:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:38388 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728069AbgBRT7g (ORCPT ); Tue, 18 Feb 2020 14:59:36 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AB0F820659; Tue, 18 Feb 2020 19:59:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582055976; bh=whexkQU7G08k/GzfraOa3Wa/oXtPc+ny3/A8osupSgA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kVeX2UiDUbYxys+8CDFSskJX+yeEPtwpZLFFqDMs3IbMoOLTmAvMd+QG8yXGzUyvA FcIHI/bhUU9CsU3+1Y8Eefxf835P9salB4oCDftxlDf5esLkAifyWyB2SnBEuulkdR F49dgosDrVz0lGc+S6Z+gGNd3NIDvxDreP2xVlOI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andreas Dilger , Jan Kara , Theodore Tso , stable@kernel.org Subject: [PATCH 5.4 16/66] ext4: fix checksum errors with indexed dirs Date: Tue, 18 Feb 2020 20:54:43 +0100 Message-Id: <20200218190429.586626139@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200218190428.035153861@linuxfoundation.org> References: <20200218190428.035153861@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jan Kara commit 48a34311953d921235f4d7bbd2111690d2e469cf upstream. DIR_INDEX has been introduced as a compat ext4 feature. That means that even kernels / tools that don't understand the feature may modify the filesystem. This works because for kernels not understanding indexed dir format, internal htree nodes appear just as empty directory entries. Index dir aware kernels then check the htree structure is still consistent before using the data. This all worked reasonably well until metadata checksums were introduced. The problem is that these effectively made DIR_INDEX only ro-compatible because internal htree nodes store checksums in a different place than normal directory blocks. Thus any modification ignorant to DIR_INDEX (or just clearing EXT4_INDEX_FL from the inode) will effectively cause checksum mismatch and trigger kernel errors. So we have to be more careful when dealing with indexed directories on filesystems with checksumming enabled. 1) We just disallow loading any directory inodes with EXT4_INDEX_FL when DIR_INDEX is not enabled. This is harsh but it should be very rare (it means someone disabled DIR_INDEX on existing filesystem and didn't run e2fsck), e2fsck can fix the problem, and we don't want to answer the difficult question: "Should we rather corrupt the directory more or should we ignore that DIR_INDEX feature is not set?" 2) When we find out htree structure is corrupted (but the filesystem and the directory should in support htrees), we continue just ignoring htree information for reading but we refuse to add new entries to the directory to avoid corrupting it more. Link: https://lore.kernel.org/r/20200210144316.22081-1-jack@suse.cz Fixes: dbe89444042a ("ext4: Calculate and verify checksums for htree nodes") Reviewed-by: Andreas Dilger Signed-off-by: Jan Kara Signed-off-by: Theodore Ts'o Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/dir.c | 14 ++++++++------ fs/ext4/ext4.h | 5 ++++- fs/ext4/inode.c | 12 ++++++++++++ fs/ext4/namei.c | 7 +++++++ 4 files changed, 31 insertions(+), 7 deletions(-) --- a/fs/ext4/dir.c +++ b/fs/ext4/dir.c @@ -130,12 +130,14 @@ static int ext4_readdir(struct file *fil if (err != ERR_BAD_DX_DIR) { return err; } - /* - * We don't set the inode dirty flag since it's not - * critical that it get flushed back to the disk. - */ - ext4_clear_inode_flag(file_inode(file), - EXT4_INODE_INDEX); + /* Can we just clear INDEX flag to ignore htree information? */ + if (!ext4_has_metadata_csum(sb)) { + /* + * We don't set the inode dirty flag since it's not + * critical that it gets flushed back to the disk. + */ + ext4_clear_inode_flag(inode, EXT4_INODE_INDEX); + } } if (ext4_has_inline_data(inode)) { --- a/fs/ext4/ext4.h +++ b/fs/ext4/ext4.h @@ -2476,8 +2476,11 @@ void ext4_insert_dentry(struct inode *in struct ext4_filename *fname); static inline void ext4_update_dx_flag(struct inode *inode) { - if (!ext4_has_feature_dir_index(inode->i_sb)) + if (!ext4_has_feature_dir_index(inode->i_sb)) { + /* ext4_iget() should have caught this... */ + WARN_ON_ONCE(ext4_has_feature_metadata_csum(inode->i_sb)); ext4_clear_inode_flag(inode, EXT4_INODE_INDEX); + } } static const unsigned char ext4_filetype_table[] = { DT_UNKNOWN, DT_REG, DT_DIR, DT_CHR, DT_BLK, DT_FIFO, DT_SOCK, DT_LNK --- a/fs/ext4/inode.c +++ b/fs/ext4/inode.c @@ -4972,6 +4972,18 @@ struct inode *__ext4_iget(struct super_b ret = -EFSCORRUPTED; goto bad_inode; } + /* + * If dir_index is not enabled but there's dir with INDEX flag set, + * we'd normally treat htree data as empty space. But with metadata + * checksumming that corrupts checksums so forbid that. + */ + if (!ext4_has_feature_dir_index(sb) && ext4_has_metadata_csum(sb) && + ext4_test_inode_flag(inode, EXT4_INODE_INDEX)) { + ext4_error_inode(inode, function, line, 0, + "iget: Dir with htree data on filesystem without dir_index feature."); + ret = -EFSCORRUPTED; + goto bad_inode; + } ei->i_disksize = inode->i_size; #ifdef CONFIG_QUOTA ei->i_reserved_quota = 0; --- a/fs/ext4/namei.c +++ b/fs/ext4/namei.c @@ -2205,6 +2205,13 @@ static int ext4_add_entry(handle_t *hand retval = ext4_dx_add_entry(handle, &fname, dir, inode); if (!retval || (retval != ERR_BAD_DX_DIR)) goto out; + /* Can we just ignore htree data? */ + if (ext4_has_metadata_csum(sb)) { + EXT4_ERROR_INODE(dir, + "Directory has corrupted htree index."); + retval = -EFSCORRUPTED; + goto out; + } ext4_clear_inode_flag(dir, EXT4_INODE_INDEX); dx_fallback++; ext4_mark_inode_dirty(handle, dir);