fs/hfsplus/btree.c | 68 +++++++++++++++++++++++++++++++++++++++++ fs/hfsplus/hfsplus_fs.h | 1 + fs/hfsplus/super.c | 7 +++++ 3 files changed, 76 insertions(+)
Add bitmap validation during HFS+ btree open to detect corruption where
node 0 (header node) is not marked allocated. When corruption is detected,
mount the filesystem read-only instead of failing the mount, allowing data
recovery from corrupted images.
The bitmap validation checks the node allocation bitmap in the btree header
node (record #2) and verifies that bit 7 (MSB) of the first byte is set,
indicating node 0 is allocated. This is a fundamental invariant that must
always hold.
Implementation details:
- Add 'btree_bitmap_corrupted' flag to 'struct hfsplus_sb_info' to track
corruption at superblock level
- Create and use 'hfsplus_validate_btree_bitmap()' to return bool indicating corruption
- Check corruption flag in 'hfsplus_fill_super()' after all btree opens
- Mount read-only with consolidated warning message when corruption detected
- Preserve existing btree validation logic and error handling patterns
This prevents kernel panics from corrupted syzkaller-generated HFS+ images
while enabling data recovery by mounting read-only instead of failing.
Reported-by: syzbot+1c8ff72d0cd8a50dfeaa@syzkaller.appspotmail.com
Link: https://syzkaller.appspot.com/bug?extid=1c8ff72d0cd8a50dfeaa
Link: https://lore.kernel.org/all/784415834694f39902088fa8946850fc1779a318.camel@ibm.com/
Signed-off-by: Shardul Bankar <shardul.b@mpiricsoftware.com>
---
fs/hfsplus/btree.c | 68 +++++++++++++++++++++++++++++++++++++++++
fs/hfsplus/hfsplus_fs.h | 1 +
fs/hfsplus/super.c | 7 +++++
3 files changed, 76 insertions(+)
diff --git a/fs/hfsplus/btree.c b/fs/hfsplus/btree.c
index 229f25dc7c49..c451da7eae25 100644
--- a/fs/hfsplus/btree.c
+++ b/fs/hfsplus/btree.c
@@ -129,6 +129,68 @@ u32 hfsplus_calc_btree_clump_size(u32 block_size, u32 node_size,
return clump_size;
}
+/*
+ * Validate that node 0 (header node) is marked allocated in the bitmap.
+ * This is a fundamental invariant - node 0 must always be allocated.
+ * Returns true if corruption is detected (node 0 bit is unset).
+ * Note: head must be from kmap_local_page(page) that is still mapped.
+ * This function accesses the page through head pointer, so it must be
+ * called before kunmap_local(head).
+ */
+static bool hfsplus_validate_btree_bitmap(struct hfs_btree *tree,
+ struct hfs_btree_header_rec *head)
+{
+ u8 *page_base;
+ u16 rec_off_tbl_off;
+ __be16 rec_data[2];
+ u16 bitmap_off, bitmap_len;
+ u8 *bitmap_ptr;
+ u8 first_byte;
+ unsigned int node_size = tree->node_size;
+
+ /*
+ * Get base page pointer. head points to:
+ * kmap_local_page(page) + sizeof(struct hfs_bnode_desc)
+ */
+ page_base = (u8 *)head - sizeof(struct hfs_bnode_desc);
+
+ /*
+ * Calculate offset to record 2 entry in record offset table.
+ * Record offsets are at end of node: node_size - (rec_num + 2) * 2
+ * Record 2: (2+2)*2 = 8 bytes from end
+ */
+ rec_off_tbl_off = node_size - (2 + 2) * 2;
+
+ /* Only validate if record offset table is on the first page */
+ if (rec_off_tbl_off + 4 > node_size || rec_off_tbl_off + 4 > PAGE_SIZE)
+ return false; /* Skip validation if offset table not on first page */
+
+ /* Read record 2 offset table entry (length and offset, both u16) */
+ memcpy(rec_data, page_base + rec_off_tbl_off, 4);
+ bitmap_off = be16_to_cpu(rec_data[1]);
+ bitmap_len = be16_to_cpu(rec_data[0]) - bitmap_off;
+
+ /*
+ * Validate bitmap offset is within node and after bnode_desc.
+ * Also ensure bitmap is on the first page.
+ */
+ if (bitmap_len == 0 ||
+ bitmap_off < sizeof(struct hfs_bnode_desc) ||
+ bitmap_off >= node_size ||
+ bitmap_off >= PAGE_SIZE)
+ return false; /* Skip validation if bitmap not accessible */
+
+ /* Read first byte of bitmap */
+ bitmap_ptr = page_base + bitmap_off;
+ first_byte = bitmap_ptr[0];
+
+ /* Check if node 0's bit (bit 7, MSB) is set */
+ if (!(first_byte & 0x80))
+ return true; /* Corruption detected */
+
+ return false;
+}
+
/* Get a reference to a B*Tree and do some initial checks */
struct hfs_btree *hfs_btree_open(struct super_block *sb, u32 id)
{
@@ -176,6 +238,12 @@ struct hfs_btree *hfs_btree_open(struct super_block *sb, u32 id)
tree->max_key_len = be16_to_cpu(head->max_key_len);
tree->depth = be16_to_cpu(head->depth);
+ /* Validate bitmap: node 0 must be marked allocated */
+ if (hfsplus_validate_btree_bitmap(tree, head)) {
+ struct hfsplus_sb_info *sbi = HFSPLUS_SB(sb);
+ sbi->btree_bitmap_corrupted = true;
+ }
+
/* Verify the tree and set the correct compare function */
switch (id) {
case HFSPLUS_EXT_CNID:
diff --git a/fs/hfsplus/hfsplus_fs.h b/fs/hfsplus/hfsplus_fs.h
index 45fe3a12ecba..b925878333d4 100644
--- a/fs/hfsplus/hfsplus_fs.h
+++ b/fs/hfsplus/hfsplus_fs.h
@@ -154,6 +154,7 @@ struct hfsplus_sb_info {
int part, session;
unsigned long flags;
+ bool btree_bitmap_corrupted; /* Bitmap corruption detected during btree open */
int work_queued; /* non-zero delayed work is queued */
struct delayed_work sync_work; /* FS sync delayed work */
diff --git a/fs/hfsplus/super.c b/fs/hfsplus/super.c
index aaffa9e060a0..b3facd23d758 100644
--- a/fs/hfsplus/super.c
+++ b/fs/hfsplus/super.c
@@ -534,6 +534,13 @@ static int hfsplus_fill_super(struct super_block *sb, struct fs_context *fc)
}
atomic_set(&sbi->attr_tree_state, HFSPLUS_VALID_ATTR_TREE);
}
+
+ /* Check for bitmap corruption and mount read-only if detected */
+ if (sbi->btree_bitmap_corrupted) {
+ pr_warn("HFS+ (device %s): btree bitmap corruption detected, mounting read-only; run fsck.hfsplus to repair\n",
+ sb->s_id);
+ sb->s_flags |= SB_RDONLY;
+ }
sb->s_xattr = hfsplus_xattr_handlers;
inode = hfsplus_iget(sb, HFSPLUS_ALLOC_CNID);
--
2.34.1
Hi Shardul,
kernel test robot noticed the following build warnings:
[auto build test WARNING on brauner-vfs/vfs.all]
[also build test WARNING on linus/master v6.19-rc6 next-20260123]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url: https://github.com/intel-lab-lkp/linux/commits/Shardul-Bankar/hfsplus-validate-btree-bitmap-during-mount-and-handle-corruption-gracefully/20260125-032702
base: https://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs.git vfs.all
patch link: https://lore.kernel.org/r/20260124192501.748071-1-shardul.b%40mpiricsoftware.com
patch subject: [PATCH] hfsplus: validate btree bitmap during mount and handle corruption gracefully
config: hexagon-randconfig-001-20260125 (https://download.01.org/0day-ci/archive/20260125/202601251011.kJUhBF3P-lkp@intel.com/config)
compiler: clang version 22.0.0git (https://github.com/llvm/llvm-project 9b8addffa70cee5b2acc5454712d9cf78ce45710)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260125/202601251011.kJUhBF3P-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202601251011.kJUhBF3P-lkp@intel.com/
All warnings (new ones prefixed by >>):
>> fs/hfsplus/btree.c:180:17: warning: result of comparison of constant 262144 with expression of type 'u16' (aka 'unsigned short') is always false [-Wtautological-constant-out-of-range-compare]
180 | bitmap_off >= PAGE_SIZE)
| ~~~~~~~~~~ ^ ~~~~~~~~~
1 warning generated.
vim +180 fs/hfsplus/btree.c
131
132 /*
133 * Validate that node 0 (header node) is marked allocated in the bitmap.
134 * This is a fundamental invariant - node 0 must always be allocated.
135 * Returns true if corruption is detected (node 0 bit is unset).
136 * Note: head must be from kmap_local_page(page) that is still mapped.
137 * This function accesses the page through head pointer, so it must be
138 * called before kunmap_local(head).
139 */
140 static bool hfsplus_validate_btree_bitmap(struct hfs_btree *tree,
141 struct hfs_btree_header_rec *head)
142 {
143 u8 *page_base;
144 u16 rec_off_tbl_off;
145 __be16 rec_data[2];
146 u16 bitmap_off, bitmap_len;
147 u8 *bitmap_ptr;
148 u8 first_byte;
149 unsigned int node_size = tree->node_size;
150
151 /*
152 * Get base page pointer. head points to:
153 * kmap_local_page(page) + sizeof(struct hfs_bnode_desc)
154 */
155 page_base = (u8 *)head - sizeof(struct hfs_bnode_desc);
156
157 /*
158 * Calculate offset to record 2 entry in record offset table.
159 * Record offsets are at end of node: node_size - (rec_num + 2) * 2
160 * Record 2: (2+2)*2 = 8 bytes from end
161 */
162 rec_off_tbl_off = node_size - (2 + 2) * 2;
163
164 /* Only validate if record offset table is on the first page */
165 if (rec_off_tbl_off + 4 > node_size || rec_off_tbl_off + 4 > PAGE_SIZE)
166 return false; /* Skip validation if offset table not on first page */
167
168 /* Read record 2 offset table entry (length and offset, both u16) */
169 memcpy(rec_data, page_base + rec_off_tbl_off, 4);
170 bitmap_off = be16_to_cpu(rec_data[1]);
171 bitmap_len = be16_to_cpu(rec_data[0]) - bitmap_off;
172
173 /*
174 * Validate bitmap offset is within node and after bnode_desc.
175 * Also ensure bitmap is on the first page.
176 */
177 if (bitmap_len == 0 ||
178 bitmap_off < sizeof(struct hfs_bnode_desc) ||
179 bitmap_off >= node_size ||
> 180 bitmap_off >= PAGE_SIZE)
181 return false; /* Skip validation if bitmap not accessible */
182
183 /* Read first byte of bitmap */
184 bitmap_ptr = page_base + bitmap_off;
185 first_byte = bitmap_ptr[0];
186
187 /* Check if node 0's bit (bit 7, MSB) is set */
188 if (!(first_byte & 0x80))
189 return true; /* Corruption detected */
190
191 return false;
192 }
193
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
© 2016 - 2026 Red Hat, Inc.