]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
hfsplus: fix uninit-value by validating catalog record size
authorDeepanshu Kartikey <kartikey406@gmail.com>
Fri, 8 May 2026 23:59:59 +0000 (19:59 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 14 May 2026 13:31:20 +0000 (15:31 +0200)
[ Upstream commit b6b592275aeff184aa82fcf6abccd833fb71b393 ]

Syzbot reported a KMSAN uninit-value issue in hfsplus_strcasecmp(). The
root cause is that hfs_brec_read() doesn't validate that the on-disk
record size matches the expected size for the record type being read.

When mounting a corrupted filesystem, hfs_brec_read() may read less data
than expected. For example, when reading a catalog thread record, the
debug output showed:

  HFSPLUS_BREC_READ: rec_len=520, fd->entrylength=26
  HFSPLUS_BREC_READ: WARNING - entrylength (26) < rec_len (520) - PARTIAL READ!

hfs_brec_read() only validates that entrylength is not greater than the
buffer size, but doesn't check if it's less than expected. It successfully
reads 26 bytes into a 520-byte structure and returns success, leaving 494
bytes uninitialized.

This uninitialized data in tmp.thread.nodeName then gets copied by
hfsplus_cat_build_key_uni() and used by hfsplus_strcasecmp(), triggering
the KMSAN warning when the uninitialized bytes are used as array indices
in case_fold().

Fix by introducing hfsplus_brec_read_cat() wrapper that:
1. Calls hfs_brec_read() to read the data
2. Validates the record size based on the type field:
   - Fixed size for folder and file records
   - Variable size for thread records (depends on string length)
3. Returns -EIO if size doesn't match expected

For thread records, check against HFSPLUS_MIN_THREAD_SZ before reading
nodeName.length to avoid reading uninitialized data at call sites that
don't zero-initialize the entry structure.

Also initialize the tmp variable in hfsplus_find_cat() as defensive
programming to ensure no uninitialized data even if validation is
bypassed.

Reported-by: syzbot+d80abb5b890d39261e72@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=d80abb5b890d39261e72
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Tested-by: syzbot+d80abb5b890d39261e72@syzkaller.appspotmail.com
Reviewed-by: Viacheslav Dubeyko <slava@dubeyko.com>
Tested-by: Viacheslav Dubeyko <slava@dubeyko.com>
Suggested-by: Charalampos Mitrodimas <charmitro@posteo.net>
Link: https://lore.kernel.org/all/20260120051114.1281285-1-kartikey406@gmail.com/
Link: https://lore.kernel.org/all/20260121063109.1830263-1-kartikey406@gmail.com/
Link: https://lore.kernel.org/all/20260212014233.2422046-1-kartikey406@gmail.com/
Link: https://lore.kernel.org/all/20260214002100.436125-1-kartikey406@gmail.com/T/
Link: https://lore.kernel.org/all/20260221061626.15853-1-kartikey406@gmail.com/T/
Signed-off-by: Deepanshu Kartikey <kartikey406@gmail.com>
Signed-off-by: Viacheslav Dubeyko <slava@dubeyko.com>
Link: https://lore.kernel.org/r/20260307010302.41547-1-kartikey406@gmail.com
Signed-off-by: Viacheslav Dubeyko <slava@dubeyko.com>
Stable-dep-of: 90c500e4fd83 ("hfsplus: fix held lock freed on hfsplus_fill_super()")
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
fs/hfsplus/bfind.c
fs/hfsplus/catalog.c
fs/hfsplus/dir.c
fs/hfsplus/hfsplus_fs.h
fs/hfsplus/super.c

index 336d654861c5974e55a8e751044c4e0ac0c66a86..9a55fa6d529429b806e5947a4b751486ce0678e1 100644 (file)
@@ -287,3 +287,54 @@ out:
        fd->bnode = bnode;
        return res;
 }
+
+/**
+ * hfsplus_brec_read_cat - read and validate a catalog record
+ * @fd: find data structure
+ * @entry: pointer to catalog entry to read into
+ *
+ * Reads a catalog record and validates its size matches the expected
+ * size based on the record type.
+ *
+ * Returns 0 on success, or negative error code on failure.
+ */
+int hfsplus_brec_read_cat(struct hfs_find_data *fd, hfsplus_cat_entry *entry)
+{
+       int res;
+       u32 expected_size;
+
+       res = hfs_brec_read(fd, entry, sizeof(hfsplus_cat_entry));
+       if (res)
+               return res;
+
+       /* Validate catalog record size based on type */
+       switch (be16_to_cpu(entry->type)) {
+       case HFSPLUS_FOLDER:
+               expected_size = sizeof(struct hfsplus_cat_folder);
+               break;
+       case HFSPLUS_FILE:
+               expected_size = sizeof(struct hfsplus_cat_file);
+               break;
+       case HFSPLUS_FOLDER_THREAD:
+       case HFSPLUS_FILE_THREAD:
+               /* Ensure we have at least the fixed fields before reading nodeName.length */
+               if (fd->entrylength < HFSPLUS_MIN_THREAD_SZ) {
+                       pr_err("thread record too short (got %u)\n", fd->entrylength);
+                       return -EIO;
+               }
+               expected_size = hfsplus_cat_thread_size(&entry->thread);
+               break;
+       default:
+               pr_err("unknown catalog record type %d\n",
+                      be16_to_cpu(entry->type));
+               return -EIO;
+       }
+
+       if (fd->entrylength != expected_size) {
+               pr_err("catalog record size mismatch (type %d, got %u, expected %u)\n",
+                      be16_to_cpu(entry->type), fd->entrylength, expected_size);
+               return -EIO;
+       }
+
+       return 0;
+}
index 02c1eee4a4b86059ceaab7a7c68ab65adba6fa26..6c8380f7208df4e4ff8ffc65ca4455bf67ba5b1f 100644 (file)
@@ -194,12 +194,12 @@ static int hfsplus_fill_cat_thread(struct super_block *sb,
 int hfsplus_find_cat(struct super_block *sb, u32 cnid,
                     struct hfs_find_data *fd)
 {
-       hfsplus_cat_entry tmp;
+       hfsplus_cat_entry tmp = {0};
        int err;
        u16 type;
 
        hfsplus_cat_build_key_with_cnid(sb, fd->search_key, cnid);
-       err = hfs_brec_read(fd, &tmp, sizeof(hfsplus_cat_entry));
+       err = hfsplus_brec_read_cat(fd, &tmp);
        if (err)
                return err;
 
index d559bf8625f853d50fd316d157cf8afe22069565..25535592234c9b7fee9f3b029337990dd2f33874 100644 (file)
@@ -49,7 +49,7 @@ static struct dentry *hfsplus_lookup(struct inode *dir, struct dentry *dentry,
        if (unlikely(err < 0))
                goto fail;
 again:
-       err = hfs_brec_read(&fd, &entry, sizeof(entry));
+       err = hfsplus_brec_read_cat(&fd, &entry);
        if (err) {
                if (err == -ENOENT) {
                        hfs_find_exit(&fd);
index 5f891b73a64677bfb1d132df94c95beabd0be3cf..61d52091dd28d7c1590dc49bb1c76f573e327b09 100644 (file)
@@ -509,6 +509,15 @@ int hfsplus_submit_bio(struct super_block *sb, sector_t sector, void *buf,
                       void **data, blk_opf_t opf);
 int hfsplus_read_wrapper(struct super_block *sb);
 
+static inline u32 hfsplus_cat_thread_size(const struct hfsplus_cat_thread *thread)
+{
+       return offsetof(struct hfsplus_cat_thread, nodeName) +
+              offsetof(struct hfsplus_unistr, unicode) +
+              be16_to_cpu(thread->nodeName.length) * sizeof(hfsplus_unichr);
+}
+
+int hfsplus_brec_read_cat(struct hfs_find_data *fd, hfsplus_cat_entry *entry);
+
 /*
  * time helpers: convert between 1904-base and 1970-base timestamps
  *
index 7229a8ae89f9469109b1c3a317ee9b7705a83f8b..5ef0f71b1a330eaaf16913d64e3b340cf5e84aca 100644 (file)
@@ -571,7 +571,7 @@ static int hfsplus_fill_super(struct super_block *sb, struct fs_context *fc)
        err = hfsplus_cat_build_key(sb, fd.search_key, HFSPLUS_ROOT_CNID, &str);
        if (unlikely(err < 0))
                goto out_put_root;
-       if (!hfs_brec_read(&fd, &entry, sizeof(entry))) {
+       if (!hfsplus_brec_read_cat(&fd, &entry)) {
                hfs_find_exit(&fd);
                if (entry.type != cpu_to_be16(HFSPLUS_FOLDER)) {
                        err = -EIO;