bcachefs: Don't try to en/decrypt when encryption not available
authorKent Overstreet <kent.overstreet@linux.dev>
Mon, 25 Nov 2024 07:05:02 +0000 (02:05 -0500)
committerKent Overstreet <kent.overstreet@linux.dev>
Sat, 21 Dec 2024 06:36:20 +0000 (01:36 -0500)
If a btree node says it's encrypted, but the superblock never had an
encryptino key - whoops, that needs to be handled.

Reported-by: syzbot+026f1857b12f5eb3f9e9@syzkaller.appspotmail.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
fs/bcachefs/btree_io.c
fs/bcachefs/btree_node_scan.c
fs/bcachefs/checksum.c
fs/bcachefs/errcode.h
fs/bcachefs/io_read.c

index 2b5da566fbac5409a2cc46118564f2c2eb3b0dd0..3bb6db9bd4a46a41f431f977694c361b92acb5e5 100644 (file)
@@ -1045,39 +1045,51 @@ int bch2_btree_node_read_done(struct bch_fs *c, struct bch_dev *ca,
 
        while (b->written < (ptr_written ?: btree_sectors(c))) {
                unsigned sectors;
-               struct nonce nonce;
                bool first = !b->written;
-               bool csum_bad;
 
-               if (!b->written) {
+               if (first) {
+                       bne = NULL;
                        i = &b->data->keys;
+               } else {
+                       bne = write_block(b);
+                       i = &bne->keys;
 
-                       btree_err_on(!bch2_checksum_type_valid(c, BSET_CSUM_TYPE(i)),
-                                    -BCH_ERR_btree_node_read_err_want_retry,
-                                    c, ca, b, i, NULL,
-                                    bset_unknown_csum,
-                                    "unknown checksum type %llu", BSET_CSUM_TYPE(i));
-
-                       nonce = btree_nonce(i, b->written << 9);
+                       if (i->seq != b->data->keys.seq)
+                               break;
+               }
 
-                       struct bch_csum csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, b->data);
-                       csum_bad = bch2_crc_cmp(b->data->csum, csum);
-                       if (csum_bad)
-                               bch2_io_error(ca, BCH_MEMBER_ERROR_checksum);
+               struct nonce nonce = btree_nonce(i, b->written << 9);
+               bool good_csum_type = bch2_checksum_type_valid(c, BSET_CSUM_TYPE(i));
 
-                       btree_err_on(csum_bad,
-                                    -BCH_ERR_btree_node_read_err_want_retry,
-                                    c, ca, b, i, NULL,
-                                    bset_bad_csum,
-                                    "%s",
-                                    (printbuf_reset(&buf),
-                                     bch2_csum_err_msg(&buf, BSET_CSUM_TYPE(i), b->data->csum, csum),
-                                     buf.buf));
-
-                       ret = bset_encrypt(c, i, b->written << 9);
-                       if (bch2_fs_fatal_err_on(ret, c,
-                                       "decrypting btree node: %s", bch2_err_str(ret)))
-                               goto fsck_err;
+               btree_err_on(!good_csum_type,
+                            bch2_csum_type_is_encryption(BSET_CSUM_TYPE(i))
+                            ? -BCH_ERR_btree_node_read_err_must_retry
+                            : -BCH_ERR_btree_node_read_err_want_retry,
+                            c, ca, b, i, NULL,
+                            bset_unknown_csum,
+                            "unknown checksum type %llu", BSET_CSUM_TYPE(i));
+
+               if (first) {
+                       if (good_csum_type) {
+                               struct bch_csum csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, b->data);
+                               bool csum_bad = bch2_crc_cmp(b->data->csum, csum);
+                               if (csum_bad)
+                                       bch2_io_error(ca, BCH_MEMBER_ERROR_checksum);
+
+                               btree_err_on(csum_bad,
+                                            -BCH_ERR_btree_node_read_err_want_retry,
+                                            c, ca, b, i, NULL,
+                                            bset_bad_csum,
+                                            "%s",
+                                            (printbuf_reset(&buf),
+                                             bch2_csum_err_msg(&buf, BSET_CSUM_TYPE(i), b->data->csum, csum),
+                                             buf.buf));
+
+                               ret = bset_encrypt(c, i, b->written << 9);
+                               if (bch2_fs_fatal_err_on(ret, c,
+                                                        "decrypting btree node: %s", bch2_err_str(ret)))
+                                       goto fsck_err;
+                       }
 
                        btree_err_on(btree_node_type_is_extents(btree_node_type(b)) &&
                                     !BTREE_NODE_NEW_EXTENT_OVERWRITE(b->data),
@@ -1088,37 +1100,26 @@ int bch2_btree_node_read_done(struct bch_fs *c, struct bch_dev *ca,
 
                        sectors = vstruct_sectors(b->data, c->block_bits);
                } else {
-                       bne = write_block(b);
-                       i = &bne->keys;
-
-                       if (i->seq != b->data->keys.seq)
-                               break;
-
-                       btree_err_on(!bch2_checksum_type_valid(c, BSET_CSUM_TYPE(i)),
-                                    -BCH_ERR_btree_node_read_err_want_retry,
-                                    c, ca, b, i, NULL,
-                                    bset_unknown_csum,
-                                    "unknown checksum type %llu", BSET_CSUM_TYPE(i));
-
-                       nonce = btree_nonce(i, b->written << 9);
-                       struct bch_csum csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, bne);
-                       csum_bad = bch2_crc_cmp(bne->csum, csum);
-                       if (ca && csum_bad)
-                               bch2_io_error(ca, BCH_MEMBER_ERROR_checksum);
-
-                       btree_err_on(csum_bad,
-                                    -BCH_ERR_btree_node_read_err_want_retry,
-                                    c, ca, b, i, NULL,
-                                    bset_bad_csum,
-                                    "%s",
-                                    (printbuf_reset(&buf),
-                                     bch2_csum_err_msg(&buf, BSET_CSUM_TYPE(i), bne->csum, csum),
-                                     buf.buf));
-
-                       ret = bset_encrypt(c, i, b->written << 9);
-                       if (bch2_fs_fatal_err_on(ret, c,
-                                       "decrypting btree node: %s", bch2_err_str(ret)))
-                               goto fsck_err;
+                       if (good_csum_type) {
+                               struct bch_csum csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, bne);
+                               bool csum_bad = bch2_crc_cmp(bne->csum, csum);
+                               if (ca && csum_bad)
+                                       bch2_io_error(ca, BCH_MEMBER_ERROR_checksum);
+
+                               btree_err_on(csum_bad,
+                                            -BCH_ERR_btree_node_read_err_want_retry,
+                                            c, ca, b, i, NULL,
+                                            bset_bad_csum,
+                                            "%s",
+                                            (printbuf_reset(&buf),
+                                             bch2_csum_err_msg(&buf, BSET_CSUM_TYPE(i), bne->csum, csum),
+                                             buf.buf));
+
+                               ret = bset_encrypt(c, i, b->written << 9);
+                               if (bch2_fs_fatal_err_on(ret, c,
+                                               "decrypting btree node: %s", bch2_err_str(ret)))
+                                       goto fsck_err;
+                       }
 
                        sectors = vstruct_sectors(bne, c->block_bits);
                }
index 4b4df31d4b95967ca6e2bedc0268e522040cf3c1..327f1a1859b943caf135eec58b7f7a706a66b857 100644 (file)
@@ -159,6 +159,9 @@ static void try_read_btree_node(struct find_btree_nodes *f, struct bch_dev *ca,
                return;
 
        if (bch2_csum_type_is_encryption(BSET_CSUM_TYPE(&bn->keys))) {
+               if (!c->chacha20)
+                       return;
+
                struct nonce nonce = btree_nonce(&bn->keys, 0);
                unsigned bytes = (void *) &bn->keys - (void *) &bn->flags;
 
index ce8fc677bef900ead76ee61acb9e746f857b2d88..23a383577d4c7908fbe1aed9d035531d1b46e447 100644 (file)
@@ -2,6 +2,7 @@
 #include "bcachefs.h"
 #include "checksum.h"
 #include "errcode.h"
+#include "error.h"
 #include "super.h"
 #include "super-io.h"
 
@@ -252,6 +253,10 @@ int bch2_encrypt(struct bch_fs *c, unsigned type,
        if (!bch2_csum_type_is_encryption(type))
                return 0;
 
+       if (bch2_fs_inconsistent_on(!c->chacha20,
+                                   c, "attempting to encrypt without encryption key"))
+               return -BCH_ERR_no_encryption_key;
+
        return do_encrypt(c->chacha20, nonce, data, len);
 }
 
@@ -337,8 +342,9 @@ int __bch2_encrypt_bio(struct bch_fs *c, unsigned type,
        size_t sgl_len = 0;
        int ret = 0;
 
-       if (!bch2_csum_type_is_encryption(type))
-               return 0;
+       if (bch2_fs_inconsistent_on(!c->chacha20,
+                                   c, "attempting to encrypt without encryption key"))
+               return -BCH_ERR_no_encryption_key;
 
        darray_init(&sgl);
 
index c989ce4f715fa1018f9b227c16559a4c74e892f5..a12050e9c1913dc05c529d8a0bec01c5a89c878d 100644 (file)
        x(EIO,                          no_device_to_read_from)                 \
        x(EIO,                          missing_indirect_extent)                \
        x(EIO,                          invalidate_stripe_to_dev)               \
+       x(EIO,                          no_encryption_key)                      \
        x(BCH_ERR_btree_node_read_err,  btree_node_read_err_fixable)            \
        x(BCH_ERR_btree_node_read_err,  btree_node_read_err_want_retry)         \
        x(BCH_ERR_btree_node_read_err,  btree_node_read_err_must_retry)         \
index eb8d12fd6398482714dacf692e390d25a6f7be76..4b6b6d25725bb020db7bfb5ed831013cab9af3e6 100644 (file)
@@ -830,7 +830,7 @@ retry_pick:
        if (!pick_ret)
                goto hole;
 
-       if (pick_ret < 0) {
+       if (unlikely(pick_ret < 0)) {
                struct printbuf buf = PRINTBUF;
                bch2_bkey_val_to_text(&buf, c, k);
 
@@ -843,6 +843,18 @@ retry_pick:
                goto err;
        }
 
+       if (unlikely(bch2_csum_type_is_encryption(pick.crc.csum_type)) && !c->chacha20) {
+               struct printbuf buf = PRINTBUF;
+               bch2_bkey_val_to_text(&buf, c, k);
+
+               bch_err_inum_offset_ratelimited(c,
+                               read_pos.inode, read_pos.offset << 9,
+                               "attempting to read encrypted data without encryption key\n  %s",
+                               buf.buf);
+               printbuf_exit(&buf);
+               goto err;
+       }
+
        struct bch_dev *ca = bch2_dev_get_ioref(c, pick.ptr.dev, READ);
 
        /*