summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorQu Wenruo <wqu@suse.com>2018-07-05 15:45:58 +0800
committerDavid Sterba <dsterba@suse.com>2018-08-06 15:03:11 +0200
commitd6f5504239b097a3904df88982882825cc32a178 (patch)
tree858e7f14d181efb9480860d987b863c7f8e69d28 /tests
parent3fcef5090633111219696b2d5a769829c366234b (diff)
btrfs-progs: test/fuzz: Add image for BUG_ON() when opening the fs by btrfs check
Link: https://bugzilla.kernel.org/show_bug.cgi?id=199839 Signed-off-by: Qu Wenruo <wqu@suse.com> Signed-off-by: David Sterba <dsterba@suse.com>
Diffstat (limited to 'tests')
-rw-r--r--tests/fuzz-tests/images/bko-199839.raw.txt198
-rw-r--r--tests/fuzz-tests/images/bko-199839.raw.xzbin0 -> 24400 bytes
2 files changed, 198 insertions, 0 deletions
diff --git a/tests/fuzz-tests/images/bko-199839.raw.txt b/tests/fuzz-tests/images/bko-199839.raw.txt
new file mode 100644
index 00000000..3e4b273d
--- /dev/null
+++ b/tests/fuzz-tests/images/bko-199839.raw.txt
@@ -0,0 +1,198 @@
+URL: https://bugzilla.kernel.org/show_bug.cgi?id=199839
+Wen Xu 2018-05-26 04:18:45 UTC
+
+Created attachment 276197 [details]
+The (compressed) crafted image which causes crash
+
+- Overview
+use-after-free in try_merge_free_space() when mounting a crafted btrfs image
+
+- Reproduce (4.17 KASAN build)
+# mkdir mnt
+# mount -t btrfs 8.img mnt
+
+- Kernel Message
+[ 449.751861] BTRFS: device fsid 12b338de-a2e9-40fa-a4b0-90e53b7c5773 devid 1 transid 8 /dev/loop0
+[ 449.757216] BTRFS info (device loop0): disk space caching is enabled
+[ 449.757221] BTRFS info (device loop0): has skinny extents
+[ 449.785096] BTRFS error (device loop0): bad tree block start 0 29396992
+[ 449.788629] BTRFS info (device loop0): read error corrected: ino 0 off 29396992 (dev /dev/loop0 sector 73800)
+[ 449.792965] BTRFS error (device loop0): bad fsid on block 29409280
+[ 449.795193] BTRFS info (device loop0): read error corrected: ino 0 off 29409280 (dev /dev/loop0 sector 73824)
+[ 449.795401] BTRFS info (device loop0): creating UUID tree
+[ 449.883426] ==================================================================
+[ 449.886228] BUG: KASAN: use-after-free in try_merge_free_space+0xc0/0x2e0
+[ 449.888344] Read of size 8 at addr ffff8801ed10f030 by task mount/1291
+
+[ 449.889947] CPU: 1 PID: 1291 Comm: mount Not tainted 4.17.0-rc5+ #6
+[ 449.889951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Ubuntu-1.8.2-1ubuntu1 04/01/2014
+[ 449.889953] Call Trace:
+[ 449.889976] dump_stack+0x7b/0xb5
+[ 449.890274] print_address_description+0x70/0x290
+[ 449.890286] kasan_report+0x291/0x390
+[ 449.890296] ? try_merge_free_space+0xc0/0x2e0
+[ 449.890303] __asan_load8+0x54/0x90
+[ 449.890310] try_merge_free_space+0xc0/0x2e0
+[ 449.890318] __btrfs_add_free_space+0x96/0x5e0
+[ 449.890324] ? kasan_check_write+0x14/0x20
+[ 449.890331] ? btrfs_get_block_group+0x1e/0x30
+[ 449.890337] ? block_group_cache_tree_search+0xef/0x150
+[ 449.890343] unpin_extent_range+0x376/0x670
+[ 449.890350] ? __exclude_logged_extent+0x160/0x160
+[ 449.890358] btrfs_finish_extent_commit+0x15b/0x490
+[ 449.890371] ? __find_get_block+0x106/0x400
+[ 449.890378] ? btrfs_prepare_extent_commit+0x1a0/0x1a0
+[ 449.890384] ? write_all_supers+0x714/0x1420
+[ 449.890394] btrfs_commit_transaction+0xaf4/0xfa0
+[ 449.890402] ? btrfs_apply_pending_changes+0xa0/0xa0
+[ 449.890407] ? start_transaction+0x153/0x640
+[ 449.890414] btrfs_create_uuid_tree+0x6a/0x170
+[ 449.890419] open_ctree+0x3b26/0x3ce9
+[ 449.890429] ? close_ctree+0x4a0/0x4a0
+[ 449.890441] ? bdi_register_va+0x44/0x50
+[ 449.890451] ? super_setup_bdi_name+0x11b/0x1a0
+[ 449.890457] ? kill_block_super+0x80/0x80
+[ 449.890468] ? snprintf+0x96/0xd0
+[ 449.890479] btrfs_mount_root+0xae6/0xc60
+[ 449.890485] ? btrfs_mount_root+0xae6/0xc60
+[ 449.890491] ? pcpu_block_update_hint_alloc+0x1f5/0x2a0
+[ 449.890498] ? btrfs_decode_error+0x40/0x40
+[ 449.890510] ? find_next_bit+0x57/0x90
+[ 449.890517] ? cpumask_next+0x1a/0x20
+[ 449.890522] ? pcpu_alloc+0x449/0x8c0
+[ 449.890528] ? pcpu_free_area+0x410/0x410
+[ 449.890534] ? memcg_kmem_put_cache+0x1b/0xa0
+[ 449.890540] ? memcpy+0x45/0x50
+[ 449.890547] mount_fs+0x60/0x1a0
+[ 449.890553] ? btrfs_decode_error+0x40/0x40
+[ 449.890558] ? mount_fs+0x60/0x1a0
+[ 449.890565] ? alloc_vfsmnt+0x309/0x360
+[ 449.890570] vfs_kern_mount+0x6b/0x1a0
+[ 449.890576] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
+[ 449.890583] btrfs_mount+0x209/0xb71
+[ 449.890589] ? pcpu_block_update_hint_alloc+0x1f5/0x2a0
+[ 449.890595] ? btrfs_remount+0x8e0/0x8e0
+[ 449.890601] ? find_next_zero_bit+0x2c/0xa0
+[ 449.890608] ? find_next_bit+0x57/0x90
+[ 449.890613] ? cpumask_next+0x1a/0x20
+[ 449.890617] ? pcpu_alloc+0x449/0x8c0
+[ 449.890624] ? pcpu_free_area+0x410/0x410
+[ 449.890629] ? memcg_kmem_put_cache+0x1b/0xa0
+[ 449.890634] ? memcpy+0x45/0x50
+[ 449.890641] mount_fs+0x60/0x1a0
+[ 449.890646] ? btrfs_remount+0x8e0/0x8e0
+[ 449.890652] ? mount_fs+0x60/0x1a0
+[ 449.890656] ? alloc_vfsmnt+0x309/0x360
+[ 449.890662] vfs_kern_mount+0x6b/0x1a0
+[ 449.890668] do_mount+0x34a/0x18a0
+[ 449.890673] ? lockref_put_or_lock+0xcf/0x160
+[ 449.890680] ? copy_mount_string+0x20/0x20
+[ 449.890685] ? memcg_kmem_put_cache+0x1b/0xa0
+[ 449.890691] ? kasan_check_write+0x14/0x20
+[ 449.890696] ? _copy_from_user+0x6a/0x90
+[ 449.890702] ? memdup_user+0x42/0x60
+[ 449.890708] ksys_mount+0x83/0xd0
+[ 449.890714] __x64_sys_mount+0x67/0x80
+[ 449.890723] do_syscall_64+0x78/0x170
+[ 449.890729] entry_SYSCALL_64_after_hwframe+0x44/0xa9
+[ 449.890734] RIP: 0033:0x7fc36964fb9a
+[ 449.890737] RSP: 002b:00007ffd268892f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
+[ 449.890744] RAX: ffffffffffffffda RBX: 0000000000e7f030 RCX: 00007fc36964fb9a
+[ 449.890747] RDX: 0000000000e7f210 RSI: 0000000000e80f30 RDI: 0000000000e87ec0
+[ 449.890750] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000014
+[ 449.890753] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000000000e87ec0
+[ 449.890756] R13: 0000000000e7f210 R14: 0000000000000000 R15: 0000000000000003
+
+[ 449.891109] Allocated by task 1291:
+[ 449.891832] save_stack+0x46/0xd0
+[ 449.891838] kasan_kmalloc+0xad/0xe0
+[ 449.891843] kasan_slab_alloc+0x11/0x20
+[ 449.891848] kmem_cache_alloc+0xd1/0x1e0
+[ 449.891854] __btrfs_add_free_space+0x43/0x5e0
+[ 449.891859] add_new_free_space+0x22b/0x240
+[ 449.891864] btrfs_read_block_groups+0xae3/0xc60
+[ 449.891868] open_ctree+0x2cfc/0x3ce9
+[ 449.891873] btrfs_mount_root+0xae6/0xc60
+[ 449.891878] mount_fs+0x60/0x1a0
+[ 449.891883] vfs_kern_mount+0x6b/0x1a0
+[ 449.891888] btrfs_mount+0x209/0xb71
+[ 449.891893] mount_fs+0x60/0x1a0
+[ 449.891897] vfs_kern_mount+0x6b/0x1a0
+[ 449.891902] do_mount+0x34a/0x18a0
+[ 449.891906] ksys_mount+0x83/0xd0
+[ 449.891911] __x64_sys_mount+0x67/0x80
+[ 449.891916] do_syscall_64+0x78/0x170
+[ 449.891921] entry_SYSCALL_64_after_hwframe+0x44/0xa9
+
+[ 449.892235] Freed by task 1291:
+[ 449.892866] save_stack+0x46/0xd0
+[ 449.892872] __kasan_slab_free+0x13c/0x1a0
+[ 449.892877] kasan_slab_free+0xe/0x10
+[ 449.892882] kmem_cache_free+0x89/0x1e0
+[ 449.892888] try_merge_free_space+0x274/0x2e0
+[ 449.892894] __btrfs_add_free_space+0x96/0x5e0
+[ 449.892898] unpin_extent_range+0x376/0x670
+[ 449.892904] btrfs_finish_extent_commit+0x15b/0x490
+[ 449.892909] btrfs_commit_transaction+0xaf4/0xfa0
+[ 449.892913] btrfs_create_uuid_tree+0x6a/0x170
+[ 449.892917] open_ctree+0x3b26/0x3ce9
+[ 449.892922] btrfs_mount_root+0xae6/0xc60
+[ 449.892927] mount_fs+0x60/0x1a0
+[ 449.892932] vfs_kern_mount+0x6b/0x1a0
+[ 449.892937] btrfs_mount+0x209/0xb71
+[ 449.892942] mount_fs+0x60/0x1a0
+[ 449.892946] vfs_kern_mount+0x6b/0x1a0
+[ 449.892951] do_mount+0x34a/0x18a0
+[ 449.892955] ksys_mount+0x83/0xd0
+[ 449.892960] __x64_sys_mount+0x67/0x80
+[ 449.892965] do_syscall_64+0x78/0x170
+[ 449.892970] entry_SYSCALL_64_after_hwframe+0x44/0xa9
+
+[ 449.893286] The buggy address belongs to the object at ffff8801ed10f000
+ which belongs to the cache btrfs_free_space of size 72
+[ 449.895793] The buggy address is located 48 bytes inside of
+ 72-byte region [ffff8801ed10f000, ffff8801ed10f048)
+[ 449.898035] The buggy address belongs to the page:
+[ 449.898979] page:ffffea0007b443c0 count:1 mapcount:0 mapping:0000000000000000 index:0x0
+[ 449.900562] flags: 0x2ffff0000000100(slab)
+[ 449.901379] raw: 02ffff0000000100 0000000000000000 0000000000000000 0000000180270027
+[ 449.902881] raw: dead000000000100 dead000000000200 ffff8801e0a676c0 0000000000000000
+[ 449.904396] page dumped because: kasan: bad access detected
+
+[ 449.905800] Memory state around the buggy address:
+[ 449.906748] ffff8801ed10ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+[ 449.908165] ffff8801ed10ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+[ 449.909577] >ffff8801ed10f000: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
+[ 449.910969] ^
+[ 449.911933] ffff8801ed10f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[ 449.913328] ffff8801ed10f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[ 449.914720] ==================================================================
+[ 449.916119] Disabling lock debugging due to kernel taint
+
+No kernel crash on plain kernel.
+
+- Reason
+https://elixir.bootlin.com/linux/v4.17-rc5/source/fs/btrfs/free-space-cache.c#L2161
+
+ if (left_info && !left_info->bitmap &&
+ left_info->offset + left_info->bytes == offset) {
+ if (update_stat)
+ unlink_free_space(ctl, left_info);
+ else
+ __unlink_free_space(ctl, left_info);
+ info->offset = left_info->offset;
+ info->bytes += left_info->bytes;
+ kmem_cache_free(btrfs_free_space_cachep, left_info);
+ merged = true;
+ }
+
+ return merged;
+
+Regarding KASAN report, left_info is already freed but referenced (->bitmap). It is in fact freed just several lines after, namely kmem_cache_free(btrfs_free_space_cachep, left_info);
+
+Found by Wen Xu and Po-Ning Tseng from SSLab, Gatech.
+
+===== Extra info for btrfs-progs =====
+This image could cause btrfs-progs to BUG_ON() when opening the image.
+Fixed by "btrfs-progs: Don't BUG_ON() if we failed to load one device or one
+chunk".
diff --git a/tests/fuzz-tests/images/bko-199839.raw.xz b/tests/fuzz-tests/images/bko-199839.raw.xz
new file mode 100644
index 00000000..c06d9540
--- /dev/null
+++ b/tests/fuzz-tests/images/bko-199839.raw.xz
Binary files differ