Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3521716pxf; Mon, 15 Mar 2021 11:24:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyi8vgxDzcG3GlTR7DUipC5wdc2v/zB1VkOBev7oOmCNco9ZjfQHHT/hDtay4xQGyBeY4FG X-Received: by 2002:a17:907:2d89:: with SMTP id gt9mr25380300ejc.226.1615832694085; Mon, 15 Mar 2021 11:24:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615832694; cv=none; d=google.com; s=arc-20160816; b=PGP4fchN1IJib3/Zfw+M4TxI5lzjlsUSzgJFBN5YRP37tcYYJ4WWmFbHtSKfKUGesT BlvCiCBnLBy1WrgvJVpDtW2+80ba/o1Zm0NdUwBLtiEIf4W5imaXXNUkHFo8DEm9SeSO llJw0eHqzGpRFJMlmAVna4/9vWFpUl0VTfYBSxur3Hs/Zu7MmmrJnA3jt5YQFacY31aM 20n2KRqmvPw1WWIbClnhwafTsVhQ+3gTFfKeluawU/qwRlPKcq5O6INeT8bsHXIPD+6i CswJvrFVButIZDeQ0J97eae5jeZbeZTkboovPt6WxRZS0mWP5EkZpsbJMz1oILsYl9WT GDpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jDJw1pFHgI3eNOEt5OXNheiDSiyVOlTkQFBc7XtrqKQ=; b=HRwHtkSoNKeen63i0OazQaBlpON+jqknWw3gJYTWkA8WqN49zmkihFzBjNlUzd4nNb 0z0SDnMUUARQlf4lfz4Z2UX40JQjcGzBkcmmyTbVjob0SgFq5buiJCKHznIl8QNxZScN AfWQ6Kq+hr7igTQoLb7Q7SE+l8X5dTAbB+pPJ4nWuv0yTn8KNWabDtxfEyGhDlfFwtk4 fdDZs60uOT+TqgPCp62FkF7zPe8kVEpL6Lg8Z0hYg/Em8ykImIxtBm1WMbT3y0x9fptH 1wOxT2kqHvD/2Z0mx5eec9vWiu2yyUrFtJeP9cRkW36Ja9gYrk3QRol9RD26MXTzGCSj iTZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DH4HfDRC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c1si11211042edt.469.2021.03.15.11.24.31; Mon, 15 Mar 2021 11:24:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DH4HfDRC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233947AbhCOOYU (ORCPT + 99 others); Mon, 15 Mar 2021 10:24:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:37820 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231881AbhCON7a (ORCPT ); Mon, 15 Mar 2021 09:59:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 35FA964F13; Mon, 15 Mar 2021 13:59:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615816748; bh=ks+NMZU2/LAZXxCFiim3GlUgldnetiPx30oQ4PA5Sj0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DH4HfDRC7zdLPSXjUOF6yqeoBd6pD1YicWNrKxTQRq1mbNzDOGzlvJ2V9SXrJ1ZgN CtPr7GaS6Dh9DVYJ4F7d/YMfux9hbPh+pd/CqvqW/56um60LAsIYy09oHKbHgKopOi G49Xk8Am7IccDVM3L3En9QpwJLjZhRQFqzuclocQ= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven J. Magnani" , Jan Kara , Sasha Levin Subject: [PATCH 4.19 043/120] udf: fix silent AED tagLocation corruption Date: Mon, 15 Mar 2021 14:56:34 +0100 Message-Id: <20210315135721.405719273@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210315135720.002213995@linuxfoundation.org> References: <20210315135720.002213995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Steven J. Magnani [ Upstream commit 63c9e47a1642fc817654a1bc18a6ec4bbcc0f056 ] When extending a file, udf_do_extend_file() may enter following empty indirect extent. At the end of udf_do_extend_file() we revert prev_epos to point to the last written extent. However if we end up not adding any further extent in udf_do_extend_file(), the reverting points prev_epos into the header area of the AED and following updates of the extents (in udf_update_extents()) will corrupt the header. Make sure that we do not follow indirect extent if we are not going to add any more extents so that returning back to the last written extent works correctly. Link: https://lore.kernel.org/r/20210107234116.6190-2-magnani@ieee.org Signed-off-by: Steven J. Magnani Signed-off-by: Jan Kara Signed-off-by: Sasha Levin --- fs/udf/inode.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/fs/udf/inode.c b/fs/udf/inode.c index 3bf89a633836..f5500d2a3879 100644 --- a/fs/udf/inode.c +++ b/fs/udf/inode.c @@ -540,11 +540,14 @@ static int udf_do_extend_file(struct inode *inode, udf_write_aext(inode, last_pos, &last_ext->extLocation, last_ext->extLength, 1); + /* - * We've rewritten the last extent but there may be empty - * indirect extent after it - enter it. + * We've rewritten the last extent. If we are going to add + * more extents, we may need to enter possible following + * empty indirect extent. */ - udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); + if (new_block_bytes || prealloc_len) + udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); } /* Managed to do everything necessary? */ -- 2.30.1