Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1472170pxj; Fri, 21 May 2021 15:29:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuARhoIxI3EkC3wfh6ecuZgHwvM0IYP2zxn9k1m5B+7XTkVplkQCO4CBQJm4A5SQ5vLpGY X-Received: by 2002:a50:fd0d:: with SMTP id i13mr13438961eds.163.1621636164650; Fri, 21 May 2021 15:29:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621636164; cv=none; d=google.com; s=arc-20160816; b=yFaR7QtzChPAVCQqKA3y+9y7gitLapDRv4jcRdbERu1u9HcnAwjvSp6AA5I8wlYIBn 1xRwLLco333VzAOlb9qfKk3137osWpJpMo3aXIcud0ZsgqDAqYwfSQoP9QMsozxz+ZWS bsZfgAayf/1+j9QQsQx4U3okS4PQlNLETx6OP+0QBgpyljN4p/KdD9FQMf9aXt+pSAEn xHXg9vkPzUvc341/cFSsvsliNQoaUzKqpvPzRyTycRSL9IYGIIv3vtIju6onpY4btJSb CpIa1UE4RC6qcgBgeHjNNst9P7z2zBrddsUGArK91bXi4yueQPj7/j4f7sMgLRm2uvMh CGlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=uK670Kyag1+Cf//4DdIrBYpfB8iAZ9e0XixK+8zvpHM=; b=tSvDgO1Tl005yTk2zRfa8Lvoh1V6RpKETEs26k7RajcEEUpGNAEQezyPt3qI99/Vld 4MpgiFIvq9dUBR40k8x/VQSXzVU0e7wUAMOk324/jhgrQLietWwLYArdLhD++PzweS5I 9wcqdM1/rF+TZUNW1SHzW8evyKDM9yKjQ1nkbdLIfR/FISYsiV1OSnHKeUpBo3uqLoBF ejsG7uXU+aNzhiet0y6nJCrxNdfbWKSvNZ5WT3c3G30m4OdLgdSd+LFFWG1Q1G6nR8y3 UwqsjWLVyNBYHmEeKPq51r4Li8rIp4O1hRAXYm9EhRQvhG9DQmh5g5uF4wqctU3uiiRQ SUlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mh9rSZb5; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i14si8001968eje.519.2021.05.21.15.28.56; Fri, 21 May 2021 15:29:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mh9rSZb5; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229979AbhEUWaA (ORCPT + 99 others); Fri, 21 May 2021 18:30:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:56390 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229526AbhEUWaA (ORCPT ); Fri, 21 May 2021 18:30:00 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 92AAC61176; Fri, 21 May 2021 22:28:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1621636116; bh=VUdBfGxFYo+S3qttMHWfMxhCSVNMRVH7saVfarsg1vA=; h=From:To:Cc:Subject:Date:From; b=Mh9rSZb5f8D1Jci4xNsWkaX6Hw39gWjMkfDVHqFpPGJDviKH/4lsqtsUhA6MJrxMD 8DKa+YuZk7s5KRKlE/6XP1X3bFGoxCBfkul1vJRWAdoTpUCYv/HWGz3/qVn10cELI4 /Xbu6SIF9CTg1PzRBG666+enKfPd/m+OOqdicemjgLKY5VQEe96kiXxPpamc5bb0+t lV0s8AvZDBFkz+2xE+JtB/VkTsa2J5gw/K1I5IKXAL23sn5tgCpQQfrTgd23BLf1X3 HcCfJZQBzt9C00mR3i+YZ2XPYsRSIgG8zwNS1898WY5FRsrZLZdpd7e5NGvioq4V/N DOZNgqCB3E1Qw== From: Eric Biggers To: stable@vger.kernel.org Cc: linux-ext4@vger.kernel.org, Yunlei He , Theodore Ts'o Subject: [PATCH 5.4] ext4: fix error handling in ext4_end_enable_verity() Date: Fri, 21 May 2021 15:27:25 -0700 Message-Id: <20210521222725.812825-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.31.1.818.g46aad6cb9e-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Eric Biggers commit f053cf7aa66cd9d592b0fc967f4d887c2abff1b7 upstream. [Please apply to 5.4-stable.] ext4 didn't properly clean up if verity failed to be enabled on a file: - It left verity metadata (pages past EOF) in the page cache, which would be exposed to userspace if the file was later extended. - It didn't truncate the verity metadata at all (either from cache or from disk) if an error occurred while setting the verity bit. Fix these bugs by adding a call to truncate_inode_pages() and ensuring that we truncate the verity metadata (both from cache and from disk) in all error paths. Also rework the code to cleanly separate the success path from the error paths, which makes it much easier to understand. Reported-by: Yunlei He Fixes: c93d8f885809 ("ext4: add basic fs-verity support") Cc: stable@vger.kernel.org # v5.4+ Signed-off-by: Eric Biggers Link: https://lore.kernel.org/r/20210302200420.137977-2-ebiggers@kernel.org Signed-off-by: Theodore Ts'o --- fs/ext4/verity.c | 89 ++++++++++++++++++++++++++++++------------------ 1 file changed, 55 insertions(+), 34 deletions(-) diff --git a/fs/ext4/verity.c b/fs/ext4/verity.c index d0d8a9795dd6..6a30e54c1128 100644 --- a/fs/ext4/verity.c +++ b/fs/ext4/verity.c @@ -198,55 +198,76 @@ static int ext4_end_enable_verity(struct file *filp, const void *desc, struct inode *inode = file_inode(filp); const int credits = 2; /* superblock and inode for ext4_orphan_del() */ handle_t *handle; + struct ext4_iloc iloc; int err = 0; - int err2; - if (desc != NULL) { - /* Succeeded; write the verity descriptor. */ - err = ext4_write_verity_descriptor(inode, desc, desc_size, - merkle_tree_size); - - /* Write all pages before clearing VERITY_IN_PROGRESS. */ - if (!err) - err = filemap_write_and_wait(inode->i_mapping); - } + /* + * If an error already occurred (which fs/verity/ signals by passing + * desc == NULL), then only clean-up is needed. + */ + if (desc == NULL) + goto cleanup; - /* If we failed, truncate anything we wrote past i_size. */ - if (desc == NULL || err) - ext4_truncate(inode); + /* Append the verity descriptor. */ + err = ext4_write_verity_descriptor(inode, desc, desc_size, + merkle_tree_size); + if (err) + goto cleanup; /* - * We must always clean up by clearing EXT4_STATE_VERITY_IN_PROGRESS and - * deleting the inode from the orphan list, even if something failed. - * If everything succeeded, we'll also set the verity bit in the same - * transaction. + * Write all pages (both data and verity metadata). Note that this must + * happen before clearing EXT4_STATE_VERITY_IN_PROGRESS; otherwise pages + * beyond i_size won't be written properly. For crash consistency, this + * also must happen before the verity inode flag gets persisted. */ + err = filemap_write_and_wait(inode->i_mapping); + if (err) + goto cleanup; - ext4_clear_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS); + /* + * Finally, set the verity inode flag and remove the inode from the + * orphan list (in a single transaction). + */ handle = ext4_journal_start(inode, EXT4_HT_INODE, credits); if (IS_ERR(handle)) { - ext4_orphan_del(NULL, inode); - return PTR_ERR(handle); + err = PTR_ERR(handle); + goto cleanup; } - err2 = ext4_orphan_del(handle, inode); - if (err2) - goto out_stop; + err = ext4_orphan_del(handle, inode); + if (err) + goto stop_and_cleanup; - if (desc != NULL && !err) { - struct ext4_iloc iloc; + err = ext4_reserve_inode_write(handle, inode, &iloc); + if (err) + goto stop_and_cleanup; - err = ext4_reserve_inode_write(handle, inode, &iloc); - if (err) - goto out_stop; - ext4_set_inode_flag(inode, EXT4_INODE_VERITY); - ext4_set_inode_flags(inode); - err = ext4_mark_iloc_dirty(handle, inode, &iloc); - } -out_stop: + ext4_set_inode_flag(inode, EXT4_INODE_VERITY); + ext4_set_inode_flags(inode); + err = ext4_mark_iloc_dirty(handle, inode, &iloc); + if (err) + goto stop_and_cleanup; + + ext4_journal_stop(handle); + + ext4_clear_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS); + return 0; + +stop_and_cleanup: ext4_journal_stop(handle); - return err ?: err2; +cleanup: + /* + * Verity failed to be enabled, so clean up by truncating any verity + * metadata that was written beyond i_size (both from cache and from + * disk), removing the inode from the orphan list (if it wasn't done + * already), and clearing EXT4_STATE_VERITY_IN_PROGRESS. + */ + truncate_inode_pages(inode->i_mapping, inode->i_size); + ext4_truncate(inode); + ext4_orphan_del(NULL, inode); + ext4_clear_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS); + return err; } static int ext4_get_verity_descriptor_location(struct inode *inode, -- 2.31.1.818.g46aad6cb9e-goog