From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AA2DB78B4F; Wed, 21 Feb 2024 13:22:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708521740; cv=none; b=Z1SrxMQ1jE31D4BiXwax6/PPnfQgYgsxEIvhlHXKT4mi7IpoBXec2P5+A+8CUmpmxcYi6HPBBhgq+LyVak2wq0Uod1NihNeaJQA/UxfsLO2ZBg6nIpExK+0kQMLge2O+TJYY1+ywmlQefTP3CmR7c2BgTecnopABhPlGT/HQeyQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708521740; c=relaxed/simple; bh=8UuMs9t6bbfy3pTzbfhnGdSLPqbh1IwOMxvnAXWP2wY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=KWFIQ7cYeILoqJnF4NZTpH0peXs9ix38LIRRsZLylEZswEBqv/U2z7OKIswRiDbawVk46C2zj+AQ+zxL0LrZCjjWsuQCzEwVUv+9cXgsG3bQu76Gvs9V3pZVM/AXoSQRH7w/dO2WsW/vj8rWwX0Irg9293G7PV78QBhVUAITPlU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=KwlrRv/l; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="KwlrRv/l" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 323B8C433F1; Wed, 21 Feb 2024 13:22:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1708521740; bh=8UuMs9t6bbfy3pTzbfhnGdSLPqbh1IwOMxvnAXWP2wY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KwlrRv/lS2M9meW42NlOika+5WLOVesNEESKa+I1pfPkWysJVIZ0GHAzE3S5z7H/3 PqmHLIV/gNn9//VR38aKPN8J/4gbnl7XgjeGW5SVywrTVHFCyRsVqGtbuIT+1DF1me kXQteTLKFuDXw28WQhnu/XvLWxE9RbTHVFwuly8M= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Ryusuke Konishi , Andrew Morton Subject: [PATCH 4.19 192/202] nilfs2: fix data corruption in dsync block recovery for small block sizes Date: Wed, 21 Feb 2024 14:08:13 +0100 Message-ID: <20240221125937.997594051@linuxfoundation.org> X-Mailer: git-send-email 2.43.2 In-Reply-To: <20240221125931.742034354@linuxfoundation.org> References: <20240221125931.742034354@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ryusuke Konishi commit 67b8bcbaed4777871bb0dcc888fb02a614a98ab1 upstream. The helper function nilfs_recovery_copy_block() of nilfs_recovery_dsync_blocks(), which recovers data from logs created by data sync writes during a mount after an unclean shutdown, incorrectly calculates the on-page offset when copying repair data to the file's page cache. In environments where the block size is smaller than the page size, this flaw can cause data corruption and leak uninitialized memory bytes during the recovery process. Fix these issues by correcting this byte offset calculation on the page. Link: https://lkml.kernel.org/r/20240124121936.10575-1-konishi.ryusuke@gmail.com Signed-off-by: Ryusuke Konishi Tested-by: Ryusuke Konishi Cc: Signed-off-by: Andrew Morton Signed-off-by: Greg Kroah-Hartman --- fs/nilfs2/recovery.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/fs/nilfs2/recovery.c +++ b/fs/nilfs2/recovery.c @@ -472,9 +472,10 @@ static int nilfs_prepare_segment_for_rec static int nilfs_recovery_copy_block(struct the_nilfs *nilfs, struct nilfs_recovery_block *rb, - struct page *page) + loff_t pos, struct page *page) { struct buffer_head *bh_org; + size_t from = pos & ~PAGE_MASK; void *kaddr; bh_org = __bread(nilfs->ns_bdev, rb->blocknr, nilfs->ns_blocksize); @@ -482,7 +483,7 @@ static int nilfs_recovery_copy_block(str return -EIO; kaddr = kmap_atomic(page); - memcpy(kaddr + bh_offset(bh_org), bh_org->b_data, bh_org->b_size); + memcpy(kaddr + from, bh_org->b_data, bh_org->b_size); kunmap_atomic(kaddr); brelse(bh_org); return 0; @@ -521,7 +522,7 @@ static int nilfs_recover_dsync_blocks(st goto failed_inode; } - err = nilfs_recovery_copy_block(nilfs, rb, page); + err = nilfs_recovery_copy_block(nilfs, rb, pos, page); if (unlikely(err)) goto failed_page;