Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp601947pxj; Tue, 18 May 2021 10:02:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwKodvthRg7wJUg9m+0rg99SZsAmWRkXZ53lXWWzgFVHuDOJJKZ/amrlTstL907c6onmU1 X-Received: by 2002:a05:6402:19a7:: with SMTP id o7mr7984727edz.22.1621357362021; Tue, 18 May 2021 10:02:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621357362; cv=none; d=google.com; s=arc-20160816; b=uPaUF4ajSwyA4gPDADtDzrvfTWhJ3dIS5lygi172M+lNQrHqMaJpiF5kXS2wetLA2X lWNBBPGk7/D22ufI7sMWw8908px+eomKUW54NT/OjfXWwQcmXAmSIZn7rLnu9Qt5DVZS YWx3MhKjA9Q6z48RY1voYqbGXMCNmijk5zDZwk9uRpDe1jz76J1dTztPY/O4KMx0P5VO 3jHJ2Ix6eeoB42I6Pll7RJQr6TBeWxBxpsYmu1j+URVBPGkupLB/Q+oyV10v0DtfUk7r CVP29dvpGkahDCyC7msF03RjwFmSTuCDPIr6yIvFFM1BaWyFoQgw2o5VgpVrxGAIjk9m TNaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4dc4TsB5Q6fMRnbjs1TA7y85d7qD53l8h6xuRxT1Fm4=; b=K2Lcs9WWpAJRjGSR9IgKOT3YHIhIjbrJnvQ9CSQoZ1qhQyLIppZXTBCW2PN38S75io wAfwssfW+JFvZ057wOCgh/1Ewkzm9sYIVl442a56OEW7qNXT6vDXHNcEWqg791ijVk5i GX8jJg7iHzFmjLrU7TmEW2RImj4XJMkJOKcNTul4H7KCImW211/dYSM0ZjU3WuQInZ6E 6OCo5Ysghty2JH+p+eIikHG56yNyT1HT5WXDkVTYrmSs9Qo2BZKTwPjs+CrmJb2g523r oDgYDa7YR6iHIZE0Ybqo7Gsvs7WtCkGjKYeFsAe4fLqRDP9JotGZ3Nz6NkEFr5HyDj8A Bx1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MUDf3EmR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u10si17972516ejh.112.2021.05.18.10.02.14; Tue, 18 May 2021 10:02:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MUDf3EmR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243729AbhEQQHe (ORCPT + 99 others); Mon, 17 May 2021 12:07:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:35610 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344611AbhEQPpF (ORCPT ); Mon, 17 May 2021 11:45:05 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7735961D2C; Mon, 17 May 2021 14:43:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621262611; bh=e6rbGkevxH80htg2S1pnTYsN/VIFVvqRPI21soQ99II=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MUDf3EmRXmdxhGWlCf5oNsOGY51B1LcUyy4SrtMpv1sgitT4cCsGb43n8CYL+mtp2 lNdjYsxLkZR7s4oicRIc5GU5p5mpP6so9RGowTjgeaEAiAXcLj6FjQ8ezlt1OBU1hl LJ10kTRbEN6komoHtaRtSRAaJum41R6Bl6KaK8bw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jouni Roivas , Anton Altaparmakov , Anatoly Trosinenko , Viacheslav Dubeyko , Andrew Morton , Linus Torvalds Subject: [PATCH 5.10 199/289] hfsplus: prevent corruption in shrinking truncate Date: Mon, 17 May 2021 16:02:04 +0200 Message-Id: <20210517140311.817424574@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140305.140529752@linuxfoundation.org> References: <20210517140305.140529752@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jouni Roivas commit c3187cf32216313fb316084efac4dab3a8459b1d upstream. I believe there are some issues introduced by commit 31651c607151 ("hfsplus: avoid deadlock on file truncation") HFS+ has extent records which always contains 8 extents. In case the first extent record in catalog file gets full, new ones are allocated from extents overflow file. In case shrinking truncate happens to middle of an extent record which locates in extents overflow file, the logic in hfsplus_file_truncate() was changed so that call to hfs_brec_remove() is not guarded any more. Right action would be just freeing the extents that exceed the new size inside extent record by calling hfsplus_free_extents(), and then check if the whole extent record should be removed. However since the guard (blk_cnt > start) is now after the call to hfs_brec_remove(), this has unfortunate effect that the last matching extent record is removed unconditionally. To reproduce this issue, create a file which has at least 10 extents, and then perform shrinking truncate into middle of the last extent record, so that the number of remaining extents is not under or divisible by 8. This causes the last extent record (8 extents) to be removed totally instead of truncating into middle of it. Thus this causes corruption, and lost data. Fix for this is simply checking if the new truncated end is below the start of this extent record, making it safe to remove the full extent record. However call to hfs_brec_remove() can't be moved to it's previous place since we're dropping ->tree_lock and it can cause a race condition and the cached info being invalidated possibly corrupting the node data. Another issue is related to this one. When entering into the block (blk_cnt > start) we are not holding the ->tree_lock. We break out from the loop not holding the lock, but hfs_find_exit() does unlock it. Not sure if it's possible for someone else to take the lock under our feet, but it can cause hard to debug errors and premature unlocking. Even if there's no real risk of it, the locking should still always be kept in balance. Thus taking the lock now just before the check. Link: https://lkml.kernel.org/r/20210429165139.3082828-1-jouni.roivas@tuxera.com Fixes: 31651c607151f ("hfsplus: avoid deadlock on file truncation") Signed-off-by: Jouni Roivas Reviewed-by: Anton Altaparmakov Cc: Anatoly Trosinenko Cc: Viacheslav Dubeyko Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/hfsplus/extents.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/fs/hfsplus/extents.c +++ b/fs/hfsplus/extents.c @@ -598,13 +598,15 @@ void hfsplus_file_truncate(struct inode res = __hfsplus_ext_cache_extent(&fd, inode, alloc_cnt); if (res) break; - hfs_brec_remove(&fd); - mutex_unlock(&fd.tree->tree_lock); start = hip->cached_start; + if (blk_cnt <= start) + hfs_brec_remove(&fd); + mutex_unlock(&fd.tree->tree_lock); hfsplus_free_extents(sb, hip->cached_extents, alloc_cnt - start, alloc_cnt - blk_cnt); hfsplus_dump_extent(hip->cached_extents); + mutex_lock(&fd.tree->tree_lock); if (blk_cnt > start) { hip->extent_state |= HFSPLUS_EXT_DIRTY; break; @@ -612,7 +614,6 @@ void hfsplus_file_truncate(struct inode alloc_cnt = start; hip->cached_start = hip->cached_blocks = 0; hip->extent_state &= ~(HFSPLUS_EXT_DIRTY | HFSPLUS_EXT_NEW); - mutex_lock(&fd.tree->tree_lock); } hfs_find_exit(&fd);