Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3658986pxb; Mon, 24 Jan 2022 14:40:05 -0800 (PST) X-Google-Smtp-Source: ABdhPJzop1Y9gYqkxF0Z6Q+gjWVflmfGN7ruiH3WBLKroP3euHOA69oaDJG4EUsNRgN2v3vVA2vE X-Received: by 2002:a63:525a:: with SMTP id s26mr12989351pgl.178.1643064004914; Mon, 24 Jan 2022 14:40:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643064004; cv=none; d=google.com; s=arc-20160816; b=m2BnPwC+0o9/MEMNhSXcV6TJIUPK7WS6yRUOFsph3xUsSyf10yd2fymUzNoS9ttnLu 8b5skFhNQI+zjJVQ+V4a/gDUCVM7fgdTRM/UGUPFu8+FFp2+IzUY7Ourh78F2DA9V7A5 ji5bR2G3Orn/hP6fs27ntXR72XO7lIvQ4IHz0je6U56iXbuq7C2ixun+RM8f2WByxpTC RC0z64FFUTnHe3G/QBq3Sw55Zjbp5SxqaIOMvK1sFebBLGJxbkXA1jqSkwXsZNYfN4ne sN0BfAv+8HMEeKCkJtJ7NF/x/A7z2vxMNn0pXphm6HH3OPhfHToEDpICM7T7YZCG4g95 BX1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jsB46dr5CUNIynH22aq4YtgMmDYOSvYFv7WmfDPEOcw=; b=qzAn2Af6G6X6bNLm3O4V/LNECOU0MmtkaCSxOxvhy/UU9w/n74OXdukftoby3b7/NT rIJBg0USunCODBbC2Y4fxO9fYw/t9Suw0ILP5JvqvQ5ZWkE3D9BL13hrGAaUsW62ez2h BcVOvyYaufV2hubK/uikHh0tvRi33K+e1Yjfq52+JUneTsGo1E8tTQzyoWmd/A7Utw7d LYmWHIt+vZjHE9OeNuxXvAmIb/F8Fv41hRTJKUFqpcdeN3LNprpcII2ymfl7e/HXAurU mdqF4oMykbXt5dt7lU9usF6sRwJDy5PIk9oOOvqY7EskVjwn87iNhm1CEE41thyu3FfR 3iIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="oIjF/J5m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 12si10395892pgk.292.2022.01.24.14.39.53; Mon, 24 Jan 2022 14:40:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="oIjF/J5m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1835096AbiAXWfr (ORCPT + 99 others); Mon, 24 Jan 2022 17:35:47 -0500 Received: from ams.source.kernel.org ([145.40.68.75]:47836 "EHLO ams.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1456141AbiAXVhy (ORCPT ); Mon, 24 Jan 2022 16:37:54 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6F1F6B81057; Mon, 24 Jan 2022 21:37:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9D14AC340E4; Mon, 24 Jan 2022 21:37:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643060271; bh=PBfU0sjDKHjPEXXIWzNxqIfWzz3fkDv5Yi5PMouzK2E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oIjF/J5mId3BnWPHmy6wSoJ8S7tr0LInJNen2iOvYe8bSEEGm8nVOXPMZiWort9wQ HzxK+ekBFsAHxT7MBkN4v3Mcv6dQoHMWyJqiqKcF9Vipt/uz0dyoJ9UJJmafKf+Z1F LeztVQFN+HNH5l8ZQ0eewuYa9XMb9BmsIPeRQa4g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jeroen van Wolffelaar , =?UTF-8?q?Lu=C3=ADs=20Henriques?= , Theodore Tso , stable@kernel.org Subject: [PATCH 5.16 0894/1039] ext4: set csum seed in tmp inode while migrating to extents Date: Mon, 24 Jan 2022 19:44:43 +0100 Message-Id: <20220124184155.332890868@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184125.121143506@linuxfoundation.org> References: <20220124184125.121143506@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Luís Henriques commit e81c9302a6c3c008f5c30beb73b38adb0170ff2d upstream. When migrating to extents, the temporary inode will have it's own checksum seed. This means that, when swapping the inodes data, the inode checksums will be incorrect. This can be fixed by recalculating the extents checksums again. Or simply by copying the seed into the temporary inode. Link: https://bugzilla.kernel.org/show_bug.cgi?id=213357 Reported-by: Jeroen van Wolffelaar Signed-off-by: Luís Henriques Link: https://lore.kernel.org/r/20211214175058.19511-1-lhenriques@suse.de Signed-off-by: Theodore Ts'o Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/migrate.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) --- a/fs/ext4/migrate.c +++ b/fs/ext4/migrate.c @@ -459,6 +459,17 @@ int ext4_ext_migrate(struct inode *inode ext4_journal_stop(handle); goto out_unlock; } + /* + * Use the correct seed for checksum (i.e. the seed from 'inode'). This + * is so that the metadata blocks will have the correct checksum after + * the migration. + * + * Note however that, if a crash occurs during the migration process, + * the recovery process is broken because the tmp_inode checksums will + * be wrong and the orphans cleanup will fail. + */ + ei = EXT4_I(inode); + EXT4_I(tmp_inode)->i_csum_seed = ei->i_csum_seed; i_size_write(tmp_inode, i_size_read(inode)); /* * Set the i_nlink to zero so it will be deleted later @@ -502,7 +513,6 @@ int ext4_ext_migrate(struct inode *inode goto out_tmp_inode; } - ei = EXT4_I(inode); i_data = ei->i_data; memset(&lb, 0, sizeof(lb));