Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

hfsplus: prevent corruption in shrinking truncate

I believe there are some issues introduced by commit 31651c607151
("hfsplus: avoid deadlock on file truncation")

HFS+ has extent records which always contains 8 extents. In case the
first extent record in catalog file gets full, new ones are allocated from
extents overflow file.

In case shrinking truncate happens to middle of an extent record which
locates in extents overflow file, the logic in hfsplus_file_truncate() was
changed so that call to hfs_brec_remove() is not guarded any more.

Right action would be just freeing the extents that exceed the new size
inside extent record by calling hfsplus_free_extents(), and then check if
the whole extent record should be removed. However since the guard
(blk_cnt > start) is now after the call to hfs_brec_remove(), this has
unfortunate effect that the last matching extent record is removed
unconditionally.

To reproduce this issue, create a file which has at least 10 extents, and
then perform shrinking truncate into middle of the last extent record, so
that the number of remaining extents is not under or divisible by 8. This
causes the last extent record (8 extents) to be removed totally instead of
truncating into middle of it. Thus this causes corruption, and lost data.

Fix for this is simply checking if the new truncated end is below the
start of this extent record, making it safe to remove the full extent
record. However call to hfs_brec_remove() can't be moved to it's previous
place since we're dropping ->tree_lock and it can cause a race condition
and the cached info being invalidated possibly corrupting the node data.

Another issue is related to this one. When entering into the block
(blk_cnt > start) we are not holding the ->tree_lock. We break out from
the loop not holding the lock, but hfs_find_exit() does unlock it. Not
sure if it's possible for someone else to take the lock under our feet,
but it can cause hard to debug errors and premature unlocking. Even if
there's no real risk of it, the locking should still always be kept in
balance. Thus taking the lock now just before the check.

Link: https://lkml.kernel.org/r/20210429165139.3082828-1-jouni.roivas@tuxera.com
Fixes: 31651c607151f ("hfsplus: avoid deadlock on file truncation")
Signed-off-by: Jouni Roivas <jouni.roivas@tuxera.com>
Reviewed-by: Anton Altaparmakov <anton@tuxera.com>
Cc: Anatoly Trosinenko <anatoly.trosinenko@gmail.com>
Cc: Viacheslav Dubeyko <slava@dubeyko.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>

authored by

Jouni Roivas and committed by
Linus Torvalds
c3187cf3 076171a6

+4 -3
+4 -3
fs/hfsplus/extents.c
··· 598 598 res = __hfsplus_ext_cache_extent(&fd, inode, alloc_cnt); 599 599 if (res) 600 600 break; 601 - hfs_brec_remove(&fd); 602 601 603 - mutex_unlock(&fd.tree->tree_lock); 604 602 start = hip->cached_start; 603 + if (blk_cnt <= start) 604 + hfs_brec_remove(&fd); 605 + mutex_unlock(&fd.tree->tree_lock); 605 606 hfsplus_free_extents(sb, hip->cached_extents, 606 607 alloc_cnt - start, alloc_cnt - blk_cnt); 607 608 hfsplus_dump_extent(hip->cached_extents); 609 + mutex_lock(&fd.tree->tree_lock); 608 610 if (blk_cnt > start) { 609 611 hip->extent_state |= HFSPLUS_EXT_DIRTY; 610 612 break; ··· 614 612 alloc_cnt = start; 615 613 hip->cached_start = hip->cached_blocks = 0; 616 614 hip->extent_state &= ~(HFSPLUS_EXT_DIRTY | HFSPLUS_EXT_NEW); 617 - mutex_lock(&fd.tree->tree_lock); 618 615 } 619 616 hfs_find_exit(&fd); 620 617