Patch "btrfs: avoid NULL pointer dereference if no valid extent tree" has been added to the 6.6-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    btrfs: avoid NULL pointer dereference if no valid extent tree

to the 6.6-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     btrfs-avoid-null-pointer-dereference-if-no-valid-ext.patch
and it can be found in the queue-6.6 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit 638fbd13ff8653035cf7ce52b60052c5e3cfaf8a
Author: Qu Wenruo <wqu@xxxxxxxx>
Date:   Thu Jan 2 14:44:16 2025 +1030

    btrfs: avoid NULL pointer dereference if no valid extent tree
    
    [ Upstream commit 6aecd91a5c5b68939cf4169e32bc49f3cd2dd329 ]
    
    [BUG]
    Syzbot reported a crash with the following call trace:
    
      BTRFS info (device loop0): scrub: started on devid 1
      BUG: kernel NULL pointer dereference, address: 0000000000000208
      #PF: supervisor read access in kernel mode
      #PF: error_code(0x0000) - not-present page
      PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0
      Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
      CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: loaded Tainted: G           O       6.13.0-rc4-custom+ #206
      Tainted: [O]=OOT_MODULE
      Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022
      RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs]
      Call Trace:
       <TASK>
       scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs]
       scrub_simple_mirror+0x175/0x260 [btrfs]
       scrub_stripe+0x5d4/0x6c0 [btrfs]
       scrub_chunk+0xbb/0x170 [btrfs]
       scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs]
       btrfs_scrub_dev+0x240/0x600 [btrfs]
       btrfs_ioctl+0x1dc8/0x2fa0 [btrfs]
       ? do_sys_openat2+0xa5/0xf0
       __x64_sys_ioctl+0x97/0xc0
       do_syscall_64+0x4f/0x120
       entry_SYSCALL_64_after_hwframe+0x76/0x7e
       </TASK>
    
    [CAUSE]
    The reproducer is using a corrupted image where extent tree root is
    corrupted, thus forcing to use "rescue=all,ro" mount option to mount the
    image.
    
    Then it triggered a scrub, but since scrub relies on extent tree to find
    where the data/metadata extents are, scrub_find_fill_first_stripe()
    relies on an non-empty extent root.
    
    But unfortunately scrub_find_fill_first_stripe() doesn't really expect
    an NULL pointer for extent root, it use extent_root to grab fs_info and
    triggered a NULL pointer dereference.
    
    [FIX]
    Add an extra check for a valid extent root at the beginning of
    scrub_find_fill_first_stripe().
    
    The new error path is introduced by 42437a6386ff ("btrfs: introduce
    mount option rescue=ignorebadroots"), but that's pretty old, and later
    commit b979547513ff ("btrfs: scrub: introduce helper to find and fill
    sector info for a scrub_stripe") changed how we do scrub.
    
    So for kernels older than 6.6, the fix will need manual backport.
    
    Reported-by: syzbot+339e9dbe3a2ca419b85d@xxxxxxxxxxxxxxxxxxxxxxxxx
    Link: https://lore.kernel.org/linux-btrfs/67756935.050a0220.25abdd.0a12.GAE@xxxxxxxxxx/
    Fixes: 42437a6386ff ("btrfs: introduce mount option rescue=ignorebadroots")
    Reviewed-by: Anand Jain <anand.jain@xxxxxxxxxx>
    Signed-off-by: Qu Wenruo <wqu@xxxxxxxx>
    Reviewed-by: David Sterba <dsterba@xxxxxxxx>
    Signed-off-by: David Sterba <dsterba@xxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/fs/btrfs/scrub.c b/fs/btrfs/scrub.c
index a2d91d9f8a10..6be092bb814f 100644
--- a/fs/btrfs/scrub.c
+++ b/fs/btrfs/scrub.c
@@ -1538,6 +1538,10 @@ static int scrub_find_fill_first_stripe(struct btrfs_block_group *bg,
 	u64 extent_gen;
 	int ret;
 
+	if (unlikely(!extent_root)) {
+		btrfs_err(fs_info, "no valid extent root for scrub");
+		return -EUCLEAN;
+	}
 	memset(stripe->sectors, 0, sizeof(struct scrub_sector_verification) *
 				   stripe->nr_sectors);
 	scrub_stripe_reset_bitmaps(stripe);




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux