Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1817885rwb; Sat, 19 Nov 2022 04:14:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf7S7hYQcf3dtYWNQJD7+TO2fLuaXtEJCStRfurHM75cnlW7KP08h6CJBwQXDyaFP4U0VuvP X-Received: by 2002:a05:6402:cf:b0:458:a1bb:4c9a with SMTP id i15-20020a05640200cf00b00458a1bb4c9amr9631201edu.121.1668860092790; Sat, 19 Nov 2022 04:14:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668860092; cv=none; d=google.com; s=arc-20160816; b=nAu3cisNliytItNC4MRYrOv4dGlyR+TvBtMlLBm0Twam0N0XtBcl7Qybp0quJrD120 ZFsMIa9Typ6Mm8/g4P1KOSPiZ4L8fVir12x2HuMziMT3uli+WxULN4EHBR9R/dEoGxKJ WgmDDEQwqwS9HJDf1S5XFOJRXEtj2hT4d69nupD9es9TMmhnZe+aT7eOhRC/bSWGVCUP QWHu/MmqIFZNVP8tO4tR8iD/tapA3XXxqv9CVRzuH1Nqnwpoosg7k43QlzIcGAUGN8gm GKWV6NMlmnETIwOGOoT1PMlxpa7NDp3hE4dtvG5mjjxK2M4FAPezyxwNbYm4hLmxHfB9 y0lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5PXFj1rB1pIp6QyH0AQexeQHB5YuSJsq1qsc0FeDJJY=; b=GeOOzJsbZMLkzOuDzIycDPh33Onb8eARSXBvmSWEl96hQhK7236+aCWBgPZrTuY/Yh sOz8zahL/MHJo99gUyx+X4Xd71ASBLVx5H0iab2er5Nqn6VdlM87Jf/u8Gucn85Zj7ab WGRd+y5Xz1TscY4IRWYqa5lAaeji1tdYh4gcFnzglH6eYJF95rPaa4plqVsm2QV0Ym4w UoYKnBumsZI1HiL8eLbi9ZqmLPZUMlzhAIwpXZ0eFwSwb4zGE9a1SGtLbEAi127YZguY mNKVQbfXZaP2QLXZB0WXqNle4OHDINg+HNViWWXU8pAMP//NOZmCVnf4gtxe5emgq455 8tng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=pxSuZWqM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xb1-20020a170907070100b0078d8cc2006csi5835929ejb.697.2022.11.19.04.14.30; Sat, 19 Nov 2022 04:14:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=pxSuZWqM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232799AbiKSMFw (ORCPT + 90 others); Sat, 19 Nov 2022 07:05:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48836 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230398AbiKSMFt (ORCPT ); Sat, 19 Nov 2022 07:05:49 -0500 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEA5026545; Sat, 19 Nov 2022 04:05:48 -0800 (PST) Received: by mail-pf1-x42a.google.com with SMTP id b29so7269570pfp.13; Sat, 19 Nov 2022 04:05:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=5PXFj1rB1pIp6QyH0AQexeQHB5YuSJsq1qsc0FeDJJY=; b=pxSuZWqMTJejJ1lIbOiwKO9WYxxjeuJUjsrgPMRK5pl6AH/zDzZluFy1z75nmytsWo 3UhwJecQmw2UPFZLO+WLqQ4pNrorAJr8zg4ZxY106eBwgxh3LPCsQKmCk5YSO6cJyN9S Skb6x8pHk5PLt0Qodz9rWE0AkPrTN2jBVn6LTsRabaouyXbRr0dBC83bOwGYC1xC9tNt uJQcPyYP8mJBGR+eFdDCKMwPxu8qKyspEtLaZkw90q0tPwsMBQxPC/OMFXYeKJWDwskN fNbAGbBeJHF13A+cZBAKQwgJ7vVRYNRiqdCGJ/0J64etW84jL6C0KN72X1gaxrwDRrNF d6EQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=5PXFj1rB1pIp6QyH0AQexeQHB5YuSJsq1qsc0FeDJJY=; b=iXBQmY8Y2fCJ9yEI57tD4qnH6Ln93ViM9BklKMTaDUtd/m2pkD3nV2S1sfZUZWRfFs DPxyaQG/xo6TrWrlm5d+PWWYy3sds74M3vc9qgKuqvvHxEdvRueicT/bCbmaAo/4lMhP 1Jkn8dcXtV9o9KoBoZ9KD9ElhR1Md1qcbm+OKIPJEZ3xlWPrtXf86O7szPZNaM9HquTB UlPsXdCPY4IJo/TtTCPwGR9vFzdfl4bZNEpP3JtrG6lk7+zFfzig6fvI/4qfgRnk5PUD IOQDNoGsxIU03ZpejLMp1jZMY8FAh01HhyGlKQYBiHzyGFR+QM4WRLz8u0RnySIPMzeB hGUA== X-Gm-Message-State: ANoB5pmB7ZzGLFxcQnX7BFo4N3iYWNCARi8NGZwZuB0Vwba1TQ4yabLk sqRyqdbTLkuPUIzdsmSWt74= X-Received: by 2002:a63:ee4d:0:b0:46f:75bb:cfc4 with SMTP id n13-20020a63ee4d000000b0046f75bbcfc4mr10501774pgk.403.1668859547870; Sat, 19 Nov 2022 04:05:47 -0800 (PST) Received: from carrot.. (i220-108-44-211.s42.a014.ap.plala.or.jp. [220.108.44.211]) by smtp.gmail.com with ESMTPSA id x2-20020a626302000000b0056d3b8f530csm5009967pfb.34.2022.11.19.04.05.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 19 Nov 2022 04:05:46 -0800 (PST) From: Ryusuke Konishi To: Andrew Morton Cc: linux-nilfs , syzbot , syzkaller-bugs@googlegroups.com, LKML , ZhangPeng Subject: [PATCH v2] nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() Date: Sat, 19 Nov 2022 21:05:42 +0900 Message-Id: <20221119120542.17204-1-konishi.ryusuke@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <00000000000097c20205ebaea3d6@google.com> References: <00000000000097c20205ebaea3d6@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: ZhangPeng Syzbot reported a null-ptr-deref bug: NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 1 PID: 3603 Comm: segctord Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 RIP: 0010:nilfs_palloc_commit_free_entry+0xe5/0x6b0 fs/nilfs2/alloc.c:608 Code: 00 00 00 00 fc ff df 80 3c 02 00 0f 85 cd 05 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 73 08 49 8d 7e 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 26 05 00 00 49 8b 46 10 be a6 00 00 00 48 c7 c7 RSP: 0018:ffffc90003dff830 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff88802594e218 RCX: 000000000000000d RDX: 0000000000000002 RSI: 0000000000002000 RDI: 0000000000000010 RBP: ffff888071880222 R08: 0000000000000005 R09: 000000000000003f R10: 000000000000000d R11: 0000000000000000 R12: ffff888071880158 R13: ffff88802594e220 R14: 0000000000000000 R15: 0000000000000004 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb1c08316a8 CR3: 0000000018560000 CR4: 0000000000350ee0 Call Trace: nilfs_dat_commit_free fs/nilfs2/dat.c:114 [inline] nilfs_dat_commit_end+0x464/0x5f0 fs/nilfs2/dat.c:193 nilfs_dat_commit_update+0x26/0x40 fs/nilfs2/dat.c:236 nilfs_btree_commit_update_v+0x87/0x4a0 fs/nilfs2/btree.c:1940 nilfs_btree_commit_propagate_v fs/nilfs2/btree.c:2016 [inline] nilfs_btree_propagate_v fs/nilfs2/btree.c:2046 [inline] nilfs_btree_propagate+0xa00/0xd60 fs/nilfs2/btree.c:2088 nilfs_bmap_propagate+0x73/0x170 fs/nilfs2/bmap.c:337 nilfs_collect_file_data+0x45/0xd0 fs/nilfs2/segment.c:568 nilfs_segctor_apply_buffers+0x14a/0x470 fs/nilfs2/segment.c:1018 nilfs_segctor_scan_file+0x3f4/0x6f0 fs/nilfs2/segment.c:1067 nilfs_segctor_collect_blocks fs/nilfs2/segment.c:1197 [inline] nilfs_segctor_collect fs/nilfs2/segment.c:1503 [inline] nilfs_segctor_do_construct+0x12fc/0x6af0 fs/nilfs2/segment.c:2045 nilfs_segctor_construct+0x8e3/0xb30 fs/nilfs2/segment.c:2379 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2487 [inline] nilfs_segctor_thread+0x3c3/0xf30 fs/nilfs2/segment.c:2570 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 ... If DAT metadata file is corrupted on disk, there is a case where req->pr_desc_bh is NULL and blocknr is 0 at nilfs_dat_commit_end() during a b-tree operation that cascadingly updates ancestor nodes of the b-tree, because nilfs_dat_commit_alloc() for a lower level block can initialize the blocknr on the same DAT entry between nilfs_dat_prepare_end() and nilfs_dat_commit_end(). If this happens, nilfs_dat_commit_end() calls nilfs_dat_commit_free() without valid buffer heads in req->pr_desc_bh and req->pr_bitmap_bh, and causes the NULL pointer dereference above in nilfs_palloc_commit_free_entry() function, which leads to a crash. Fix this by adding a NULL check on req->pr_desc_bh and req->pr_bitmap_bh before nilfs_palloc_commit_free_entry() in nilfs_dat_commit_free(). This also calls nilfs_error() in that case to notify that there is a fatal flaw in the filesystem metadata and prevent further operations. Link: https://lkml.kernel.org/r/00000000000097c20205ebaea3d6@google.com Link: https://lkml.kernel.org/r/20221114040441.1649940-1-zhangpeng362@huawei.com Signed-off-by: ZhangPeng Reported-by: syzbot+ebe05ee8e98f755f61d0@syzkaller.appspotmail.com Signed-off-by: Ryusuke Konishi Tested-by: Ryusuke Konishi Cc: stable@vger.kernel.org --- Please apply this bugfix to -mm tree. This is the first time I send this to you, but I prefixed this as a v2 patch since this has the following changes from the original LKML post by ZhangPeng base on the discussion and consent with him. v1 -> v2: 1) Use "unlikely" annotation since this usually doesn't happen. 2) Call nilfs_error to notify the fatal flaw in the filesystem metadata and prevent further operations. 3) Modify changelog description base on detailed analysis. 4) Add tags ("Tested-by", cc-stable, and links). fs/nilfs2/dat.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/fs/nilfs2/dat.c b/fs/nilfs2/dat.c index 3b55e239705f..9930fa901039 100644 --- a/fs/nilfs2/dat.c +++ b/fs/nilfs2/dat.c @@ -111,6 +111,13 @@ static void nilfs_dat_commit_free(struct inode *dat, kunmap_atomic(kaddr); nilfs_dat_commit_entry(dat, req); + + if (unlikely(req->pr_desc_bh == NULL || req->pr_bitmap_bh == NULL)) { + nilfs_error(dat->i_sb, + "state inconsistency probably due to duplicate use of vblocknr = %llu", + (unsigned long long)req->pr_entry_nr); + return; + } nilfs_palloc_commit_free_entry(dat, req); } -- 2.34.1