Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3522042pxf; Mon, 15 Mar 2021 11:25:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLQdsyaNSyssZv2c5EmbqD/AIe86j5XLCaYr4kRotvwLQZMnfE9Vh4kevKI5qr+4aK8tep X-Received: by 2002:a17:907:f97:: with SMTP id kb23mr24932426ejc.33.1615832724320; Mon, 15 Mar 2021 11:25:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615832724; cv=none; d=google.com; s=arc-20160816; b=i/GFe4NlHY8SGePst3nlQlVVgj7hIiq2OXr96j3DLglz3ARcXykT27jI3ZldRhu3FL XJgfpDsZQqyp+kNyEz2q4cw6Spsope12mMUK+u9DLbb563MmbHLZx1udBp99ixtCoqnG LknUUjO7lhrooziNJSh+iBFzb3mkckgp+kIYL2bI5B5VnTAkBNx1yzicSMWVbJLHZsNq WmndDoNuNPc4hn8KUn/lokFTGPIiS+uRoAXxm+5qRgJ50FmyYcbyklpKVlQ32oFtyHAe CRV9o98kTbWl2+eIfNkfQW3t3yA+FQIJRt/rf8EsFLhYbbdqBW0UC8JrjJPd+9crPUxU RJOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nVih2mQv7f/Im406lKPh65I0esG26vwfHGvFUjMvgpo=; b=gCzWON5iCO/Z/pON8QPbgNgUUp3HLMQRyb/VKwxXVVWX/BuFy6/I24w5PiOIQU+Feo rIlSx1qme3gug3T8jwfx/0oYsMat5Ws7vxaIQWz4YYge+FNG2SqPCA6SxuVp6RgEidY+ Crp6MRm7Xg5GzJTWHO6Y963qkwQ0vgJ27ZwXUYUiU/sOp7gfCFVSfJVVBMIkj7EsM0M3 A/hsU/qQnkPuy7Hv7y7v1ylMFJ/0OYbVRcXaiuCh/TOCVZkd6wYS/ZnqPupmXoLzh2em BXG6Fj6ptFpnY+wbk/Tph7aRjLKzbySWX8nQOjc5vZCRj3AcnAev3i4cY1ZC8TAlMi+9 pndQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="etCXWsT/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kl9si7026562ejc.271.2021.03.15.11.25.01; Mon, 15 Mar 2021 11:25:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="etCXWsT/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234325AbhCOOZj (ORCPT + 99 others); Mon, 15 Mar 2021 10:25:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:37612 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232439AbhCON64 (ORCPT ); Mon, 15 Mar 2021 09:58:56 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7B4D664F67; Mon, 15 Mar 2021 13:58:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615816716; bh=cTCcqjAgZ6qafVuRaBnDcK0mfscnNi/ZxMD8CcZIYc4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=etCXWsT/CgVHGPHA/EVeiBLthXH9wIN9cK8zhv5Hpp+QYS0HmpVWQvleFti+uwhkr VK0rfmFIJScxGaoYAgmEak9s/EOcgUKvar/bAT/ZQbNExBXtnAF12hG2QxPQqvfQ4y 16n/DXOkAvY2DkUHaleiNl/rFwegfpLkBxjP2Rbk= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven J. Magnani" , Jan Kara , Sasha Levin Subject: [PATCH 5.4 064/168] udf: fix silent AED tagLocation corruption Date: Mon, 15 Mar 2021 14:54:56 +0100 Message-Id: <20210315135552.476165869@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210315135550.333963635@linuxfoundation.org> References: <20210315135550.333963635@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Steven J. Magnani [ Upstream commit 63c9e47a1642fc817654a1bc18a6ec4bbcc0f056 ] When extending a file, udf_do_extend_file() may enter following empty indirect extent. At the end of udf_do_extend_file() we revert prev_epos to point to the last written extent. However if we end up not adding any further extent in udf_do_extend_file(), the reverting points prev_epos into the header area of the AED and following updates of the extents (in udf_update_extents()) will corrupt the header. Make sure that we do not follow indirect extent if we are not going to add any more extents so that returning back to the last written extent works correctly. Link: https://lore.kernel.org/r/20210107234116.6190-2-magnani@ieee.org Signed-off-by: Steven J. Magnani Signed-off-by: Jan Kara Signed-off-by: Sasha Levin --- fs/udf/inode.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/fs/udf/inode.c b/fs/udf/inode.c index 97a192eb9949..507f8f910327 100644 --- a/fs/udf/inode.c +++ b/fs/udf/inode.c @@ -547,11 +547,14 @@ static int udf_do_extend_file(struct inode *inode, udf_write_aext(inode, last_pos, &last_ext->extLocation, last_ext->extLength, 1); + /* - * We've rewritten the last extent but there may be empty - * indirect extent after it - enter it. + * We've rewritten the last extent. If we are going to add + * more extents, we may need to enter possible following + * empty indirect extent. */ - udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); + if (new_block_bytes || prealloc_len) + udf_next_aext(inode, last_pos, &tmploc, &tmplen, 0); } /* Managed to do everything necessary? */ -- 2.30.1