Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3518212pxf; Mon, 15 Mar 2021 11:19:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxrbgDLqeIZZR6YBv4s8qKuuL85tjoq4sbNVPHCn00752SjQ65FWLuYq+uq2RD2W6HRHZCf X-Received: by 2002:a17:906:2c0c:: with SMTP id e12mr25241160ejh.408.1615832371273; Mon, 15 Mar 2021 11:19:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615832371; cv=none; d=google.com; s=arc-20160816; b=fEUG2DWfir484IfjdjF035TIP779DemR10NXAyQqsKqiDyL3w9vjBdAD17VrqmyjVC 0/FV0MZ9f6EzsIhwBSQWyBW/NwtbshnWzPfTcBiBYsjzkAMQl5LOR5ZHxNVdjh8MH/pz hSNiFF6QNkm8VsCDuo69ZY9J9p4qx9A7qaNlB8DpS5Ibje8A1KywMBssQ6aL42/sgMNr FYZ5jTYwud4LmaFXvEroVwPCtQ6k1HItgoACA4mPJ9VqPqIC+TvupsBmCgh9wEId1tTP g3paSFU7QjKaieDoFK0IrnVFeAXmaATxUj4mwA601fWbkaj7UUomY999lbi7OeLNMzHa BosQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OHLM529I4XomoV0qJpS18xdVe+zKr0lUlPUJOaHMRI0=; b=n4tYFhoCdwhGkaZMCXj6RiHZaOA34BZ3ACUexhvv+xRI2p7SJIoIyuMNii4iD4odwS xCL7kMbqWTtllcLhmCl/NaO45YeGwnO9vSVEaqPXHgs7zk4YTXi1w7sHD9YalyQPz7OD orIbsO6raWmVPJrahT2fsqEzw4vzvK/o7BhSBRvQn/EfzwvoscfFPgFQK2QniYtzXBOb u5qvh361zk21sYCGHu3IPP0zB7OcGAMHbwQVVLi/LywXTqovRqXJIlh1tpWBlPChkiAV dH9a17O7xH0FGNoxNEuoTxS/oC/hbwiZv/7ZFnjr7c+xbdrf8Zky0wLC8cEvXjopofOP 3oMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bkf3CiwH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si11129926edz.154.2021.03.15.11.19.09; Mon, 15 Mar 2021 11:19:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bkf3CiwH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236926AbhCOOQy (ORCPT + 99 others); Mon, 15 Mar 2021 10:16:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:34900 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232664AbhCON71 (ORCPT ); Mon, 15 Mar 2021 09:59:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A4E3B64EF3; Mon, 15 Mar 2021 13:59:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615816743; bh=SFbf1cAXb28Jkh91bhM6Fp6dX9YLIV9CBTgWSUyxwy8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bkf3CiwHYX4wW8mS7gNoVxgv4HvY24PMrtLJQtMPG72pT7r3Z2arTs/JSpQm+iKjp gTFneKlPjY31kwAKbPYelegnFAH9f5A+CuW2LKN4rjCgJUyMlqwZ85ltFRxl6bdFWZ kRs70S/O1BYqRCi7ESARNW+jYrCLrihxYo9KbqP8= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven J. Magnani" , Jan Kara , Sasha Levin Subject: [PATCH 4.14 32/95] udf: fix silent AED tagLocation corruption Date: Mon, 15 Mar 2021 14:57:02 +0100 Message-Id: <20210315135741.330948404@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210315135740.245494252@linuxfoundation.org> References: <20210315135740.245494252@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Steven J. Magnani [ Upstream commit 63c9e47a1642fc817654a1bc18a6ec4bbcc0f056 ] When extending a file, udf_do_extend_file() may enter following empty indirect extent. At the end of udf_do_extend_file() we revert prev_epos to point to the last written extent. However if we end up not adding any further extent in udf_do_extend_file(), the reverting points prev_epos into the header area of the AED and following updates of the extents (in udf_update_extents()) will corrupt the header. Make sure that we do not follow indirect extent if we are not going to add any more extents so that returning back to the last written extent works correctly. Link: https://lore.kernel.org/r/20210107234116.6190-2-magnani@ieee.org Signed-off-by: Steven J. Magnani Signed-off-by: Jan Kara Signed-off-by: Sasha Levin --- fs/udf/inode.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/fs/udf/inode.c b/fs/udf/inode.c index dd57bd446340..e0e2bc19c929 100644 --- a/fs/udf/inode.c +++ b/fs/udf/inode.c @@ -540,11 +540,14 @@ static int udf_do_extend_file(struct inode *inode, udf_write_aext(inode, last_pos, &last_ext->extLocation, last_ext->extLength, 1); + /* - * We've rewritten the last extent but there may be empty - * indirect extent after it - enter it. + * We've rewritten the last extent. If we are going to add + * more extents, we may need to enter possible following + * empty indirect extent. */ - udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); + if (new_block_bytes || prealloc_len) + udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); } /* Managed to do everything necessary? */ -- 2.30.1