From patchwork Mon May 8 12:38:09 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Konstantin Komarov X-Patchwork-Id: 91118 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp2130350vqo; Mon, 8 May 2023 05:52:30 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6QeNMnyUXCQCFNZeiFvDhutLP0nqlalfzU9lRPdDqCKYsqD+WpIM1uRyRwivkRFTL9i4t6 X-Received: by 2002:a05:6a00:1a06:b0:645:e008:d7ba with SMTP id g6-20020a056a001a0600b00645e008d7bamr4118977pfv.27.1683550350245; Mon, 08 May 2023 05:52:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683550350; cv=none; d=google.com; s=arc-20160816; b=NgTjYTtZxXq2XJ20GT+Lvs0fRvpFkNgJC7H7BASjLXqJXNNk5mOlFtvQReFdkXCeh3 f+vTg4xrOXTIOi9FyjsYpnsWmnCHw8G0kiRhzXawKWw1GQi5QQU+vcXrwPGLBYThPqAD 4PCgXE2wI0SEbKl7+9oXISmFzxGqgcc/txwAOB89Kr6RFEa7MOWjoVWhlprhJA432Zf/ tvuYcXCGII6QIRnWggBbc37Iv2TZC1LaHvukvulv04x8fb5jI2UdkcWVhpRsnF3/YOQv 1aN58UNLrvXZxlwAx1CGMgqxnawqGDDamCFYbJ6bEsrhoBAnsCc7GPO/61XfX7Slsrtm oYiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=ozLaxeqLvZ1koAu7iHKobUtKETfbqwTAtHlsxw0uvGA=; b=QM9BPTQ5ZS9S65JhZtjWxUHcvhPYJWwcI57g1Ki3cgubWenOsz+c/JlV15KWYOutCR NB9+YDZ3AzA6iCsBpcISyLYH+SzxOFC+fh8wp89FukgEB16KR39XBETYZ341A1o7zJIQ O78UXkokZhuL6/mgbQrrV2hjmFXZaxaP7E2UIYeOamUqec/6Rb2x3LsLAl+JcTm8jMIS cFQcFfcLe1XKXmbpZyKyt8LB+XqHagFR6k/Uz4xs+uX6Y2q8mjls3btlJrdJIUsLvCdv yK3NAQoHK4vntFEZ4uiyd2bB5HaCGSjv5uzZhZzLDGfwJcc5bEur6ZDXji8twTwwtEs/ Gqcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paragon-software.com header.s=mail header.b=Tuy+0aG7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=paragon-software.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i28-20020aa796fc000000b0063b1739532esi8335686pfq.139.2023.05.08.05.52.14; Mon, 08 May 2023 05:52:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paragon-software.com header.s=mail header.b=Tuy+0aG7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=paragon-software.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234245AbjEHMiS (ORCPT + 99 others); Mon, 8 May 2023 08:38:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234261AbjEHMiQ (ORCPT ); Mon, 8 May 2023 08:38:16 -0400 Received: from relayaws-01.paragon-software.com (relayaws-01.paragon-software.com [35.157.23.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B318DC41; Mon, 8 May 2023 05:38:12 -0700 (PDT) Received: from dlg2.mail.paragon-software.com (vdlg-exch-02.paragon-software.com [172.30.1.105]) by relayaws-01.paragon-software.com (Postfix) with ESMTPS id 0BB2221C3; Mon, 8 May 2023 12:33:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paragon-software.com; s=mail; t=1683549204; bh=ozLaxeqLvZ1koAu7iHKobUtKETfbqwTAtHlsxw0uvGA=; h=Date:Subject:From:To:CC:References:In-Reply-To; b=Tuy+0aG7q59X0miTQqawIcroIrb0MO6DRbdAf33UgW6iBCm2NMR7pLt3UIdczne9/ bYF0sZRpzlk6eux3NkIBH9aFhnv+4IDSafaJ7AULTAArckZcq2JFYaCPiootiaRXRs 7SrXmHgkoo6zk0XSUM6pKAlIwg3+ColKFUQXF2V0= Received: from [192.168.211.146] (192.168.211.146) by vdlg-exch-02.paragon-software.com (172.30.1.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Mon, 8 May 2023 15:38:10 +0300 Message-ID: <45f18870-379f-fa88-382c-5600e31d33a6@paragon-software.com> Date: Mon, 8 May 2023 16:38:09 +0400 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.10.1 Subject: [PATCH 05/10] fs/ntfs3: Do not update primary boot in ntfs_init_from_boot() Content-Language: en-US From: Konstantin Komarov To: CC: Linux Kernel Mailing List , References: In-Reply-To: X-Originating-IP: [192.168.211.146] X-ClientProxiedBy: vobn-exch-01.paragon-software.com (172.30.72.13) To vdlg-exch-02.paragon-software.com (172.30.1.105) X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1765330491907203731?= X-GMAIL-MSGID: =?utf-8?q?1765330491907203731?= 'cause it may be faked boot. Let ntfs to be mounted and update boot later. Signed-off-by: Konstantin Komarov ---  fs/ntfs3/super.c | 58 ++++++++++++++++++++++++++++++++----------------  1 file changed, 39 insertions(+), 19 deletions(-)      int err; @@ -937,23 +944,11 @@ static int ntfs_init_from_boot(struct super_block *sb, u32 sector_size,      if (bh->b_blocknr && !sb_rdonly(sb)) {          /* -          * Alternative boot is ok but primary is not ok. -          * Update primary boot. -         */ -        struct buffer_head *bh0 = sb_getblk(sb, 0); -        if (bh0) { -            if (buffer_locked(bh0)) -                __wait_on_buffer(bh0); - -            lock_buffer(bh0); -            memcpy(bh0->b_data, boot, sizeof(*boot)); -            set_buffer_uptodate(bh0); -            mark_buffer_dirty(bh0); -            unlock_buffer(bh0); -            if (!sync_dirty_buffer(bh0)) -                ntfs_warn(sb, "primary boot is updated"); -            put_bh(bh0); -        } +         * Alternative boot is ok but primary is not ok. +         * Do not update primary boot here 'cause it may be faked boot. +         * Let ntfs to be mounted and update boot later. +         */ +        *boot2 = kmemdup(boot, sizeof(*boot), GFP_NOFS | __GFP_NOWARN);      }  out: @@ -1000,6 +995,7 @@ static int ntfs_fill_super(struct super_block *sb, struct fs_context *fc)      u16 *shared;      struct MFT_REF ref;      bool ro = sb_rdonly(sb); +    struct NTFS_BOOT *boot2 = NULL;      ref.high = 0; @@ -1030,7 +1026,7 @@ static int ntfs_fill_super(struct super_block *sb, struct fs_context *fc)      /* Parse boot. */      err = ntfs_init_from_boot(sb, bdev_logical_block_size(bdev), -                  bdev_nr_bytes(bdev)); +                  bdev_nr_bytes(bdev), &boot2);      if (err)          goto out; @@ -1412,6 +1408,29 @@ static int ntfs_fill_super(struct super_block *sb, struct fs_context *fc)          goto put_inode_out;      } +    if (boot2) { +        /* +         * Alternative boot is ok but primary is not ok. +         * Volume is recognized as NTFS. Update primary boot. +         */ +        struct buffer_head *bh0 = sb_getblk(sb, 0); +        if (bh0) { +            if (buffer_locked(bh0)) +                __wait_on_buffer(bh0); + +            lock_buffer(bh0); +            memcpy(bh0->b_data, boot2, sizeof(*boot2)); +            set_buffer_uptodate(bh0); +            mark_buffer_dirty(bh0); +            unlock_buffer(bh0); +            if (!sync_dirty_buffer(bh0)) +                ntfs_warn(sb, "primary boot is updated"); +            put_bh(bh0); +        } + +        kfree(boot2); +    } +      return 0;  put_inode_out: @@ -1424,6 +1443,7 @@ static int ntfs_fill_super(struct super_block *sb, struct fs_context *fc)      put_mount_options(sbi->options);      put_ntfs(sbi);      sb->s_fs_info = NULL; +    kfree(boot2);      return err;  } diff --git a/fs/ntfs3/super.c b/fs/ntfs3/super.c index ecf899d571d8..2b48b45238ea 100644 --- a/fs/ntfs3/super.c +++ b/fs/ntfs3/super.c @@ -711,9 +711,16 @@ static u32 true_sectors_per_clst(const struct NTFS_BOOT *boot)  /*   * ntfs_init_from_boot - Init internal info from on-disk boot sector. + * + * NTFS mount begins from boot - special formatted 512 bytes. + * There are two boots: the first and the last 512 bytes of volume. + * The content of boot is not changed during ntfs life. + * + * NOTE: ntfs.sys checks only first (primary) boot. + * chkdsk checks both boots.   */  static int ntfs_init_from_boot(struct super_block *sb, u32 sector_size, -                   u64 dev_size) +                   u64 dev_size, struct NTFS_BOOT **boot2)  {      struct ntfs_sb_info *sbi = sb->s_fs_info;