Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3562835pxb; Mon, 24 Jan 2022 12:17:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJw7E0qddQUqAdvEX/wAHgdhfhCCUpOjYMuqb9XfeuI3Xl1+vxewsAcpYOQkgif9gb9FMs/I X-Received: by 2002:a17:90b:164f:: with SMTP id il15mr8028pjb.136.1643055434849; Mon, 24 Jan 2022 12:17:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643055434; cv=none; d=google.com; s=arc-20160816; b=avKYfxP8NRkZ28RSmDzyN7RtQeWlPBYWDy3O/qsQ6iNbhp2H+6hwoa/dZ8M0WfzwnD OhYduNeUetL7Y8bNEJBAgE66rL2MBKoxvUQv+vJR4iDVwOgJ8IWDyBOqGyF9aI0Kb69/ arV0zPjkGXi3oLP1H94mwEr1xUHpJRFLKa+BPu9Ee2afr/B9ipETBbn67jmRnJDx95lw v5OG/SgJQ5NJZH6fj9yVpoLWAaYCa+k7poYQNL4fjdQfpcR8UvzVH+HPEi6a+bD3IYSI 8VEXVcxbNITaWraMQHtO61lvveG8Kpty/97tDhe3gW/FQFhfCF1RuRCLXz1ZUJ67SZxF u69Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hA/cmeB1fe04uSOU3r6hEbWyoJI+rtCHX+vYRzhutVA=; b=cUyoQfyY17xQ+WUHrO/TTJ0DegpocgV5/aq8Wl2sDeWimWCH6dmRbgN6WnAopKG50b ZFu76droG8CZbUqR8S3xakhzORt+suB/N3ex3gF8yRcI8/SC9S+9gp+wgFT/FIjTWP9w 9AeKa5xLGry7ANYpVN63YYsJw68EdufXasFhw+pg+lZFjk5NOdN6ld0tgzM4KWQQrlwl tZdsNFVSD2alQ4SMBzcnHZmpSClqldRY3kz4YNZgniZiEj7CKFswtcLX2ka0RPR9c8kn gpHuxKcW0nMllqoJSI47U8Jmtd4Q28NlKRtRBhrzziDK52LGQ8duvJ8cuvoqM96AimmI iobA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SvhKZFS0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bc3si12592429plb.22.2022.01.24.12.17.02; Mon, 24 Jan 2022 12:17:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SvhKZFS0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347407AbiAXTTH (ORCPT + 99 others); Mon, 24 Jan 2022 14:19:07 -0500 Received: from ams.source.kernel.org ([145.40.68.75]:36900 "EHLO ams.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347315AbiAXTKO (ORCPT ); Mon, 24 Jan 2022 14:10:14 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 728E4B811F9; Mon, 24 Jan 2022 19:10:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8E6BCC340E5; Mon, 24 Jan 2022 19:10:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643051412; bh=VCURiyomUVIPoWf9AU+8FLL/6YFSGAUikU9Mn+zQSdE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SvhKZFS0l6MK7HUi4sowzx45QRRf4uqBwCLai92eE/W8WNTmdTi4CLEyiaV7R2Ir3 E3on177oJ8CWIyJAiPRreeY7MvycS3MsvxTMf1vSHHcwPml01altDD4AAnpG6o+Vqy 5XFmpacqyks5PCQDnGSwi6irkD1RwSL5g49LHTjk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jeroen van Wolffelaar , =?UTF-8?q?Lu=C3=ADs=20Henriques?= , Theodore Tso , stable@kernel.org Subject: [PATCH 4.14 154/186] ext4: set csum seed in tmp inode while migrating to extents Date: Mon, 24 Jan 2022 19:43:49 +0100 Message-Id: <20220124183942.055538222@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124183937.101330125@linuxfoundation.org> References: <20220124183937.101330125@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Luís Henriques commit e81c9302a6c3c008f5c30beb73b38adb0170ff2d upstream. When migrating to extents, the temporary inode will have it's own checksum seed. This means that, when swapping the inodes data, the inode checksums will be incorrect. This can be fixed by recalculating the extents checksums again. Or simply by copying the seed into the temporary inode. Link: https://bugzilla.kernel.org/show_bug.cgi?id=213357 Reported-by: Jeroen van Wolffelaar Signed-off-by: Luís Henriques Link: https://lore.kernel.org/r/20211214175058.19511-1-lhenriques@suse.de Signed-off-by: Theodore Ts'o Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/migrate.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) --- a/fs/ext4/migrate.c +++ b/fs/ext4/migrate.c @@ -484,6 +484,17 @@ int ext4_ext_migrate(struct inode *inode ext4_journal_stop(handle); goto out_unlock; } + /* + * Use the correct seed for checksum (i.e. the seed from 'inode'). This + * is so that the metadata blocks will have the correct checksum after + * the migration. + * + * Note however that, if a crash occurs during the migration process, + * the recovery process is broken because the tmp_inode checksums will + * be wrong and the orphans cleanup will fail. + */ + ei = EXT4_I(inode); + EXT4_I(tmp_inode)->i_csum_seed = ei->i_csum_seed; i_size_write(tmp_inode, i_size_read(inode)); /* * Set the i_nlink to zero so it will be deleted later @@ -527,7 +538,6 @@ int ext4_ext_migrate(struct inode *inode goto out_tmp_inode; } - ei = EXT4_I(inode); i_data = ei->i_data; memset(&lb, 0, sizeof(lb));