Skip to content

Commit 775c173

Browse files
josephhzakpm00
authored andcommitted
ocfs2: validate dx_root extent list fields during block read
Patch series "ocfs2: consolidate extent list validation into block read callbacks". ocfs2 validates extent list fields (l_count, l_next_free_rec) at various points during extent tree traversal. This is fragile because each caller must remember to check for corrupted on-disk data before using it. This series moves those checks into the block read validation callbacks (ocfs2_validate_dx_root and ocfs2_validate_extent_block), so corrupted fields are caught early at block read time. Redundant post-read checks are then removed. This patch (of 4): Move the extent list l_count validation from ocfs2_dx_dir_lookup_rec() into ocfs2_validate_dx_root(), so that corrupted on-disk fields are caught early at block read time rather than during directory lookups. Additionally, add a l_next_free_rec <= l_count check to prevent out-of-bounds access when iterating over extent records. Both checks are skipped for inline dx roots (OCFS2_DX_FLAG_INLINE), which use dr_entries instead of dr_list. Link: https://lkml.kernel.org/r/20260403090803.3860971-1-joseph.qi@linux.alibaba.com Link: https://lkml.kernel.org/r/20260403090803.3860971-2-joseph.qi@linux.alibaba.com Signed-off-by: Joseph Qi <joseph.qi@linux.alibaba.com> Reviewed-by: Heming Zhao <heming.zhao@suse.com> Cc: Mark Fasheh <mark@fasheh.com> Cc: Joel Becker <jlbec@evilplan.org> Cc: Junxiao Bi <junxiao.bi@oracle.com> Cc: Changwei Ge <gechangwei@live.cn> Cc: Jun Piao <piaojun@huawei.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
1 parent 7de554c commit 775c173

1 file changed

Lines changed: 25 additions & 9 deletions

File tree

fs/ocfs2/dir.c

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -593,16 +593,40 @@ static int ocfs2_validate_dx_root(struct super_block *sb,
593593
mlog(ML_ERROR,
594594
"Checksum failed for dir index root block %llu\n",
595595
(unsigned long long)bh->b_blocknr);
596-
return ret;
596+
goto bail;
597597
}
598598

599599
if (!OCFS2_IS_VALID_DX_ROOT(dx_root)) {
600600
ret = ocfs2_error(sb,
601601
"Dir Index Root # %llu has bad signature %.*s\n",
602602
(unsigned long long)le64_to_cpu(dx_root->dr_blkno),
603603
7, dx_root->dr_signature);
604+
goto bail;
605+
}
606+
607+
if (!(dx_root->dr_flags & OCFS2_DX_FLAG_INLINE)) {
608+
struct ocfs2_extent_list *el = &dx_root->dr_list;
609+
610+
if (le16_to_cpu(el->l_count) != ocfs2_extent_recs_per_dx_root(sb)) {
611+
ret = ocfs2_error(sb,
612+
"Dir Index Root # %llu has invalid l_count %u (expected %u)\n",
613+
(unsigned long long)le64_to_cpu(dx_root->dr_blkno),
614+
le16_to_cpu(el->l_count),
615+
ocfs2_extent_recs_per_dx_root(sb));
616+
goto bail;
617+
}
618+
619+
if (le16_to_cpu(el->l_next_free_rec) > le16_to_cpu(el->l_count)) {
620+
ret = ocfs2_error(sb,
621+
"Dir Index Root # %llu has invalid l_next_free_rec %u (l_count %u)\n",
622+
(unsigned long long)le64_to_cpu(dx_root->dr_blkno),
623+
le16_to_cpu(el->l_next_free_rec),
624+
le16_to_cpu(el->l_count));
625+
goto bail;
626+
}
604627
}
605628

629+
bail:
606630
return ret;
607631
}
608632

@@ -791,14 +815,6 @@ static int ocfs2_dx_dir_lookup_rec(struct inode *inode,
791815
struct ocfs2_extent_block *eb;
792816
struct ocfs2_extent_rec *rec = NULL;
793817

794-
if (le16_to_cpu(el->l_count) !=
795-
ocfs2_extent_recs_per_dx_root(inode->i_sb)) {
796-
ret = ocfs2_error(inode->i_sb,
797-
"Inode %lu has invalid extent list length %u\n",
798-
inode->i_ino, le16_to_cpu(el->l_count));
799-
goto out;
800-
}
801-
802818
if (el->l_tree_depth) {
803819
ret = ocfs2_find_leaf(INODE_CACHE(inode), el, major_hash,
804820
&eb_bh);

0 commit comments

Comments
 (0)