Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8103497imu; Tue, 4 Dec 2018 03:04:11 -0800 (PST) X-Google-Smtp-Source: AFSGD/VyiABPHxKOOGmFe+Os6df7k7arLiksNGGIFKeVlRFyLmfHtaG7NDT5X3yLbhqqdcGEB/92 X-Received: by 2002:a62:7dcb:: with SMTP id y194mr19740725pfc.113.1543921451704; Tue, 04 Dec 2018 03:04:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543921451; cv=none; d=google.com; s=arc-20160816; b=r1LAEdUAIIvEp5URAYFB9JxO7r2Zc/yPrG5zaSSj32YJe2ot/p0IWZQg20ZDOBuBdE XklRzY/v4XulZd+ohb+oGDpYDyPcYF9PS03Al0BbZZoSC8kqEfZlZTcUTFY6usRJb6KT gcXveSKPT/gropLCZMBzMQuVKdRAJDxzpsm6j4QhlR+ehs1lViDxESTZRafIm/RQLiih S1QRy4s8MS4pdTJdpNtBnH7BicXalxjuR16L/tBHfczCYG38ji0bYR/uyWPlwyP7nM1J KfAaLcenMmJAo9DCecHWWy+HGEE9xg0Y2tatxnfV8oP8RKhjE6whdi5c22QVrF3Nr5lg GgZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hAxlCTc7BMfqn3/suYiSeTXc9H/ub7ht6yiIqjWiQps=; b=1KAJk0CP+taDYpGndf66chiTc1K2KMam82Mys/P/zj+OqemavjP0RSpebbLrZKNVNl 145Qya14M0H6YCVkjNY9yOoCMC8QP4XsHghdeARiIM2jfDzuqUBrSpLvqV5vsRMXGT9+ qlnkRfSqAut1PyYY4J9lIYhcmixo+WBd2Ztk4iMwJk2Sv+qsVkQoFs4oNuyTV1MGMeqt BgexBCEtYjJk/izO1eQ/8JrAhzAbVWpu97Gkm5lBqGUtOY81zaVyyn2AcIWiXFhSrZIF il07o85AFle+WG9JIHlrsmsalUqio5M99e4KUDEUEPceTwQSGX2gYOZ0nagOrIOYWStY zlMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PunfKxgU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q20si15333003pgl.268.2018.12.04.03.03.56; Tue, 04 Dec 2018 03:04:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PunfKxgU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727672AbeLDLCm (ORCPT + 99 others); Tue, 4 Dec 2018 06:02:42 -0500 Received: from mail.kernel.org ([198.145.29.99]:48702 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727645AbeLDLCh (ORCPT ); Tue, 4 Dec 2018 06:02:37 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C708E214DE; Tue, 4 Dec 2018 11:02:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921356; bh=ruVAxiGuJ65EF5ZwxUgltLbCsYIIEWCQo6Fz8fa3H0k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PunfKxgU68n4Uy20K1Tb4otoKJfZ05AZI6vUhFzf8URwaK22EDDOdtlRLu3xhDSeL eWlk10AL39pYKf04fDEFYRdBmMgRhsvLx5wThRxiujeDkcsOHTozTEG84WiR+ZjUA6 dC3VNLA4HQiGUdcYYJORrXfkPz8UdLYdJIN/7OL0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xu Wen , Qu Wenruo , Gu Jinxiang , David Sterba , Ben Hutchings , Sasha Levin Subject: [PATCH 4.14 040/146] btrfs: tree-checker: Detect invalid and empty essential trees Date: Tue, 4 Dec 2018 11:48:46 +0100 Message-Id: <20181204103728.477493119@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103726.750894136@linuxfoundation.org> References: <20181204103726.750894136@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ commit ba480dd4db9f1798541eb2d1c423fc95feee8d36 upstream. A crafted image has empty root tree block, which will later cause NULL pointer dereference. The following trees should never be empty: 1) Tree root Must contain at least root items for extent tree, device tree and fs tree 2) Chunk tree Or we can't even bootstrap as it contains the mapping. 3) Fs tree At least inode item for top level inode (.). 4) Device tree Dev extents for chunks 5) Extent tree Must have corresponding extent for each chunk. If any of them is empty, we are sure the fs is corrupted and no need to mount it. Link: https://bugzilla.kernel.org/show_bug.cgi?id=199847 Reported-by: Xu Wen Signed-off-by: Qu Wenruo Tested-by: Gu Jinxiang Reviewed-by: David Sterba Signed-off-by: David Sterba [bwh: Backported to 4.14: Pass root instead of fs_info to generic_err()] Signed-off-by: Ben Hutchings Signed-off-by: Sasha Levin --- fs/btrfs/tree-checker.c | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/fs/btrfs/tree-checker.c b/fs/btrfs/tree-checker.c index cf9b10a07134..31756bac75b4 100644 --- a/fs/btrfs/tree-checker.c +++ b/fs/btrfs/tree-checker.c @@ -456,9 +456,22 @@ static int check_leaf(struct btrfs_root *root, struct extent_buffer *leaf, * skip this check for relocation trees. */ if (nritems == 0 && !btrfs_header_flag(leaf, BTRFS_HEADER_FLAG_RELOC)) { + u64 owner = btrfs_header_owner(leaf); struct btrfs_root *check_root; - key.objectid = btrfs_header_owner(leaf); + /* These trees must never be empty */ + if (owner == BTRFS_ROOT_TREE_OBJECTID || + owner == BTRFS_CHUNK_TREE_OBJECTID || + owner == BTRFS_EXTENT_TREE_OBJECTID || + owner == BTRFS_DEV_TREE_OBJECTID || + owner == BTRFS_FS_TREE_OBJECTID || + owner == BTRFS_DATA_RELOC_TREE_OBJECTID) { + generic_err(root, leaf, 0, + "invalid root, root %llu must never be empty", + owner); + return -EUCLEAN; + } + key.objectid = owner; key.type = BTRFS_ROOT_ITEM_KEY; key.offset = (u64)-1; -- 2.17.1