From: Eric Biggers <ebiggers@xxxxxxxxxx> e2fsck is validating the target (requiring that it be NUL-terminated at i_size, or something a bit different for encrypted symlinks) of slow symlinks that use a traditional block list but not ones that use an extent tree. As far as I can tell this is simply a bug: there's no reason for the representation of the block list to affect how the symlink target is validated. And either way the kernel won't create symlinks with embedded NULs and will always add a terminating NUL. Thus, make e2fsck_pass1_check_symlink() start validating the targets of extent-based symlinks. Fixes: 7cadc57780f3 ("e2fsck: Support long symlinks which use extents") Signed-off-by: Eric Biggers <ebiggers@xxxxxxxxxx> --- e2fsck/pass1.c | 74 ++++++++++++++++++++++++++------------------------ 1 file changed, 39 insertions(+), 35 deletions(-) diff --git a/e2fsck/pass1.c b/e2fsck/pass1.c index 3a49e020..46d70d14 100644 --- a/e2fsck/pass1.c +++ b/e2fsck/pass1.c @@ -185,42 +185,16 @@ int e2fsck_pass1_check_symlink(ext2_filsys fs, ext2_ino_t ino, { unsigned int buflen; unsigned int len; - int i; - ext2_extent_handle_t handle; - struct ext2_extent_info info; - struct ext2fs_extent extent; if ((inode->i_size_high || inode->i_size == 0) || (inode->i_flags & EXT2_INDEX_FL)) return 0; - if (inode->i_flags & EXT4_EXTENTS_FL) { - if (inode->i_flags & EXT4_INLINE_DATA_FL) - return 0; - if (inode->i_size > fs->blocksize) - return 0; - if (ext2fs_extent_open2(fs, ino, inode, &handle)) - return 0; - i = 0; - if (ext2fs_extent_get_info(handle, &info) || - (info.num_entries != 1) || - (info.max_depth != 0)) - goto exit_extent; - if (ext2fs_extent_get(handle, EXT2_EXTENT_ROOT, &extent) || - (extent.e_lblk != 0) || - (extent.e_len != 1) || - (extent.e_pblk < fs->super->s_first_data_block) || - (extent.e_pblk >= ext2fs_blocks_count(fs->super))) - goto exit_extent; - i = 1; - exit_extent: - ext2fs_extent_free(handle); - return i; - } - if (inode->i_flags & EXT4_INLINE_DATA_FL) { size_t inline_size; + if (inode->i_flags & EXT4_EXTENTS_FL) + return 0; if (ext2fs_inline_data_size(fs, ino, &inline_size)) return 0; if (inode->i_size != inline_size) @@ -229,19 +203,49 @@ int e2fsck_pass1_check_symlink(ext2_filsys fs, ext2_ino_t ino, return 1; } - if (ext2fs_is_fast_symlink(inode)) { + if (ext2fs_is_fast_symlink(inode) && + !(inode->i_flags & EXT4_EXTENTS_FL)) { + buf = (char *)inode->i_block; buflen = sizeof(inode->i_block); } else { - if ((inode->i_block[0] < fs->super->s_first_data_block) || - (inode->i_block[0] >= ext2fs_blocks_count(fs->super))) - return 0; + ext2_extent_handle_t handle; + struct ext2_extent_info info; + struct ext2fs_extent extent; + blk64_t blk; + int i; - for (i = 1; i < EXT2_N_BLOCKS; i++) - if (inode->i_block[i]) + if (inode->i_flags & EXT4_EXTENTS_FL) { + if (ext2fs_extent_open2(fs, ino, inode, &handle)) + return 0; + if (ext2fs_extent_get_info(handle, &info) || + (info.num_entries != 1) || + (info.max_depth != 0)) { + ext2fs_extent_free(handle); + return 0; + } + if (ext2fs_extent_get(handle, EXT2_EXTENT_ROOT, + &extent) || + (extent.e_lblk != 0) || + (extent.e_len != 1)) { + ext2fs_extent_free(handle); return 0; + } + blk = extent.e_pblk; + ext2fs_extent_free(handle); + } else { + blk = inode->i_block[0]; + + for (i = 1; i < EXT2_N_BLOCKS; i++) + if (inode->i_block[i]) + return 0; + } + + if (blk < fs->super->s_first_data_block || + blk >= ext2fs_blocks_count(fs->super)) + return 0; - if (io_channel_read_blk64(fs->io, inode->i_block[0], 1, buf)) + if (io_channel_read_blk64(fs->io, blk, 1, buf)) return 0; buflen = fs->blocksize; -- 2.16.2.395.g2e18187dfd-goog