Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp829499ybn; Wed, 2 Oct 2019 06:53:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqyk8n48Ur7b8knKUeIgnfEJupGk+keOb++dV0RngiYNyYMuUNpPhlQt+48WplHmV0rSwqZO X-Received: by 2002:a17:906:19d9:: with SMTP id h25mr3152864ejd.43.1570024422015; Wed, 02 Oct 2019 06:53:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570024422; cv=none; d=google.com; s=arc-20160816; b=ypujLpYXvx+3Fz0RCr8MtUzMC8YdZz3jom/8gct47TuQUDNZqdirD5h0ikQi2i+hDK pks5pD086JLyiYj8OOYxTiQr0v4GhVIHmXkcszCqyf5KW/m1wb1MervV5bwYajCY3a2M vagvmwBlNrRYj5g/T1ZyGf1vdf/9dFAhpAJyO/q0SpFlbStCa83DN/oYkIVVzbYvR2X9 fvreViFO+41APn3noCS2i6rTzNUBcrTw6TjopMwfVp81UPjoMBVzg6XD7L+nB1WF/Uml VeUOqC97z3qRwhPelk7ruE29Q+pHCBzGAoeWyseGeU2GT61ebs5fMDAYbR9hadNNNSUd 0sRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject:cc :autocrypt:openpgp:from:to; bh=fwXcHqwxZVqWLvPW4lcdGl6ynNQEdeZSOOMZaIG+C/M=; b=SA8Wd0EyEM/uJl6Oo5WC9Q4QaU/gAX+it5WQ5bTtLLCkPGNKc1G5O82dCVz7CT27Lj H9sG9F2WsKFyozjwZWABKsBvH3DCGtk8cq5dhE0KnAOUSGotn3UmEQcW1g14VSEG5uPp 2VWLWaLKZYQZJ2k6ZiIHhxPsvaN6iAM3t/yDMT1pY8MKgrbP9I3hYBwM/1rKSPO9OvtM wiuH66ghxAMvhO0w7P62MkrQHsYhKQe4mnx4V0XBCisij08/5wibvLgkQEYHRYUsmAOh JkGeXTmBlDlaBxnJNSVwxm+vW2t1N9qJOWj3oGO+rRQfS+BqbdyBZmpImcy1uyVtEY57 1mug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z33si12598595edz.314.2019.10.02.06.53.17; Wed, 02 Oct 2019 06:53:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727656AbfJBNuy (ORCPT + 99 others); Wed, 2 Oct 2019 09:50:54 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:46439 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726289AbfJBNuy (ORCPT ); Wed, 2 Oct 2019 09:50:54 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212]) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iFf1n-0006KW-UY; Wed, 02 Oct 2019 13:50:51 +0000 To: Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org From: Colin Ian King Openpgp: preference=signencrypt Autocrypt: addr=colin.king@canonical.com; prefer-encrypt=mutual; keydata= mQINBE6TJCgBEACo6nMNvy06zNKj5tiwDsXXS+LhT+LwtEsy9EnraKYXAf2xwazcICSjX06e fanlyhB0figzQO0n/tP7BcfMVNG7n1+DC71mSyRK1ZERcG1523ajvdZOxbBCTvTitYOy3bjs +LXKqeVMhK3mRvdTjjmVpWnWqJ1LL+Hn12ysDVVfkbtuIm2NoaSEC8Ae8LSSyCMecd22d9Pn LR4UeFgrWEkQsqROq6ZDJT9pBLGe1ZS0pVGhkRyBP9GP65oPev39SmfAx9R92SYJygCy0pPv BMWKvEZS/7bpetPNx6l2xu9UvwoeEbpzUvH26PHO3DDAv0ynJugPCoxlGPVf3zcfGQxy3oty dNTWkP6Wh3Q85m+AlifgKZudjZLrO6c+fAw/jFu1UMjNuyhgShtFU7NvEzL3RqzFf9O1qM2m uj83IeFQ1FZ65QAiCdTa3npz1vHc7N4uEQBUxyXgXfCI+A5yDnjHwzU0Y3RYS52TA3nfa08y LGPLTf5wyAREkFYou20vh5vRvPASoXx6auVf1MuxokDShVhxLpryBnlKCobs4voxN54BUO7m zuERXN8kadsxGFzItAyfKYzEiJrpUB1yhm78AecDyiPlMjl99xXk0zs9lcKriaByVUv/NsyJ FQj/kmdxox3XHi9K29kopFszm1tFiDwCFr/xumbZcMY17Yi2bQARAQABtCVDb2xpbiBLaW5n IDxjb2xpbi5raW5nQGNhbm9uaWNhbC5jb20+iQI2BBMBCAAhBQJOkyQoAhsDBQsJCAcDBRUK CQgLBRYCAwEAAh4BAheAAAoJEGjCh9/GqAImsBcP9i6C/qLewfi7iVcOwqF9avfGzOPf7CVr n8CayQnlWQPchmGKk6W2qgnWI2YLIkADh53TS0VeSQ7Tetj8f1gV75eP0Sr/oT/9ovn38QZ2 vN8hpZp0GxOUrzkvvPjpH+zdmKSaUsHGp8idfPpZX7XeBO0yojAs669+3BrnBcU5wW45SjSV nfmVj1ZZj3/yBunb+hgNH1QRcm8ZPICpjvSsGFClTdB4xu2AR28eMiL/TTg9k8Gt72mOvhf0 fS0/BUwcP8qp1TdgOFyiYpI8CGyzbfwwuGANPSupGaqtIRVf+/KaOdYUM3dx/wFozZb93Kws gXR4z6tyvYCkEg3x0Xl9BoUUyn9Jp5e6FOph2t7TgUvv9dgQOsZ+V9jFJplMhN1HPhuSnkvP 5/PrX8hNOIYuT/o1AC7K5KXQmr6hkkxasjx16PnCPLpbCF5pFwcXc907eQ4+b/42k+7E3fDA Erm9blEPINtt2yG2UeqEkL+qoebjFJxY9d4r8PFbEUWMT+t3+dmhr/62NfZxrB0nTHxDVIia u8xM+23iDRsymnI1w0R78yaa0Eea3+f79QsoRW27Kvu191cU7QdW1eZm05wO8QUvdFagVVdW Zg2DE63Fiin1AkGpaeZG9Dw8HL3pJAJiDe0KOpuq9lndHoGHs3MSa3iyQqpQKzxM6sBXWGfk EkK5Ag0ETpMkKAEQAMX6HP5zSoXRHnwPCIzwz8+inMW7mJ60GmXSNTOCVoqExkopbuUCvinN 4Tg+AnhnBB3R1KTHreFGoz3rcV7fmJeut6CWnBnGBtsaW5Emmh6gZbO5SlcTpl7QDacgIUuT v1pgewVHCcrKiX0zQDJkcK8FeLUcB2PXuJd6sJg39kgsPlI7R0OJCXnvT/VGnd3XPSXXoO4K cr5fcjsZPxn0HdYCvooJGI/Qau+imPHCSPhnX3WY/9q5/WqlY9cQA8tUC+7mgzt2VMjFft1h rp/CVybW6htm+a1d4MS4cndORsWBEetnC6HnQYwuC4bVCOEg9eXMTv88FCzOHnMbE+PxxHzW 3Gzor/QYZGcis+EIiU6hNTwv4F6fFkXfW6611JwfDUQCAHoCxF3B13xr0BH5d2EcbNB6XyQb IGngwDvnTyKHQv34wE+4KtKxxyPBX36Z+xOzOttmiwiFWkFp4c2tQymHAV70dsZTBB5Lq06v 6nJs601Qd6InlpTc2mjd5mRZUZ48/Y7i+vyuNVDXFkwhYDXzFRotO9VJqtXv8iqMtvS4xPPo 2DtJx6qOyDE7gnfmk84IbyDLzlOZ3k0p7jorXEaw0bbPN9dDpw2Sh9TJAUZVssK119DJZXv5 2BSc6c+GtMqkV8nmWdakunN7Qt/JbTcKlbH3HjIyXBy8gXDaEto5ABEBAAGJAh8EGAEIAAkF Ak6TJCgCGwwACgkQaMKH38aoAiZ4lg/+N2mkx5vsBmcsZVd3ys3sIsG18w6RcJZo5SGMxEBj t1UgyIXWI9lzpKCKIxKx0bskmEyMy4tPEDSRfZno/T7p1mU7hsM4owi/ic0aGBKP025Iok9G LKJcooP/A2c9dUV0FmygecRcbIAUaeJ27gotQkiJKbi0cl2gyTRlolKbC3R23K24LUhYfx4h pWj8CHoXEJrOdHO8Y0XH7059xzv5oxnXl2SD1dqA66INnX+vpW4TD2i+eQNPgfkECzKzGj+r KRfhdDZFBJj8/e131Y0t5cu+3Vok1FzBwgQqBnkA7dhBsQm3V0R8JTtMAqJGmyOcL+JCJAca 3Yi81yLyhmYzcRASLvJmoPTsDp2kZOdGr05Dt8aGPRJL33Jm+igfd8EgcDYtG6+F8MCBOult TTAu+QAijRPZv1KhEJXwUSke9HZvzo1tNTlY3h6plBsBufELu0mnqQvHZmfa5Ay99dF+dL1H WNp62+mTeHsX6v9EACH4S+Cw9Q1qJElFEu9/1vFNBmGY2vDv14gU2xEiS2eIvKiYl/b5Y85Q QLOHWV8up73KK5Qq/6bm4BqVd1rKGI9un8kezUQNGBKre2KKs6wquH8oynDP/baoYxEGMXBg GF/qjOC6OY+U7kNUW3N/A7J3M2VdOTLu3hVTzJMZdlMmmsg74azvZDV75dUigqXcwjE= Cc: "linux-kernel@vger.kernel.org" Subject: re: Btrfs: add a extent ref verify tool (static analysis bug report) Message-ID: <3d1bcdce-16ae-d490-0a68-19d9d9d41d92@canonical.com> Date: Wed, 2 Oct 2019 14:50:51 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Static analysis on linux-next with Coverity has picked up a potential issue in file fs/btrfs/ref-verify.c, function process_leaf() in the following commit: commit fd708b81d972a0714b02a60eb4792fdbf15868c4 Author: Josef Bacik Date: Fri Sep 29 15:43:50 2017 -0400 Btrfs: add a extent ref verify tool The potential issue is when on the unlikely event when all the items contain unknown key.types and so ret is not assigned a value. Since ret is not initialized then a garbage value is returned by this function in this unlikely scenario. In the previous function process_extent_item any unknown key types are flagged up as an error and -EINVAL is returned. I'm unsure if this kind of error handling should also be applied to function process_leaf with invalid key types too. The coverity analysis follows: 495static int process_leaf(struct btrfs_root *root, 496 struct btrfs_path *path, u64 *bytenr, u64 *num_bytes) 497{ 498 struct btrfs_fs_info *fs_info = root->fs_info; 499 struct extent_buffer *leaf = path->nodes[0]; 500 struct btrfs_extent_data_ref *dref; 501 struct btrfs_shared_data_ref *sref; 502 u32 count; 1. var_decl: Declaring variable ret without initializer. 503 int i = 0, tree_block_level = 0, ret; 504 struct btrfs_key key; 505 int nritems = btrfs_header_nritems(leaf); 506 2. Condition i < nritems, taking true branch. 507 for (i = 0; i < nritems; i++) { 508 btrfs_item_key_to_cpu(leaf, &key, i); 3. Switch case default. 509 switch (key.type) { 510 case BTRFS_EXTENT_ITEM_KEY: 511 *num_bytes = key.offset; 512 /* fall through */ 513 case BTRFS_METADATA_ITEM_KEY: 514 *bytenr = key.objectid; 515 ret = process_extent_item(fs_info, path, &key, i, 516 &tree_block_level); 517 break; 518 case BTRFS_TREE_BLOCK_REF_KEY: 519 ret = add_tree_block(fs_info, key.offset, 0, 520 key.objectid, tree_block_level); 521 break; 522 case BTRFS_SHARED_BLOCK_REF_KEY: 523 ret = add_tree_block(fs_info, 0, key.offset, 524 key.objectid, tree_block_level); 525 break; 526 case BTRFS_EXTENT_DATA_REF_KEY: 527 dref = btrfs_item_ptr(leaf, i, 528 struct btrfs_extent_data_ref); 529 ret = add_extent_data_ref(fs_info, leaf, dref, *bytenr, 530 *num_bytes); 531 break; 532 case BTRFS_SHARED_DATA_REF_KEY: 533 sref = btrfs_item_ptr(leaf, i, 534 struct btrfs_shared_data_ref); 535 count = btrfs_shared_data_ref_count(leaf, sref); 536 ret = add_shared_data_ref(fs_info, key.offset, count, 537 *bytenr, *num_bytes); 538 break; 539 default: 4. Breaking from switch. 540 break; 541 } CID 19605 (#1 of 1): Uninitialized scalar variable (UNINIT) 5. uninit_use: Using uninitialized value ret. 542 if (ret) 543 break; 544 } 545 return ret; 546} Colin