ACK/Cmnt: [PATCH][focal/linux-azure, focal/linux-hwe-5.8] btrfs: fix NULL pointer dereference when deleting device by invalid id
Stefan Bader
stefan.bader at canonical.com
Mon Oct 4 14:38:00 UTC 2021
On 04.10.21 14:58, Tim Gardner wrote:
> From: Qu Wenruo <wqu at suse.com>
>
> BugLink: https://bugs.launchpad.net/bugs/1945987
>
> [BUG]
> It's easy to trigger NULL pointer dereference, just by removing a
> non-existing device id:
>
> # mkfs.btrfs -f -m single -d single /dev/test/scratch1 \
> /dev/test/scratch2
> # mount /dev/test/scratch1 /mnt/btrfs
> # btrfs device remove 3 /mnt/btrfs
>
> Then we have the following kernel NULL pointer dereference:
>
> BUG: kernel NULL pointer dereference, address: 0000000000000000
> #PF: supervisor read access in kernel mode
> #PF: error_code(0x0000) - not-present page
> PGD 0 P4D 0
> Oops: 0000 [#1] PREEMPT SMP NOPTI
> CPU: 9 PID: 649 Comm: btrfs Not tainted 5.14.0-rc3-custom+ #35
> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
> RIP: 0010:btrfs_rm_device+0x4de/0x6b0 [btrfs]
> btrfs_ioctl+0x18bb/0x3190 [btrfs]
> ? lock_is_held_type+0xa5/0x120
> ? find_held_lock.constprop.0+0x2b/0x80
> ? do_user_addr_fault+0x201/0x6a0
> ? lock_release+0xd2/0x2d0
> ? __x64_sys_ioctl+0x83/0xb0
> __x64_sys_ioctl+0x83/0xb0
> do_syscall_64+0x3b/0x90
> entry_SYSCALL_64_after_hwframe+0x44/0xae
>
> [CAUSE]
> Commit a27a94c2b0c7 ("btrfs: Make btrfs_find_device_by_devspec return
> btrfs_device directly") moves the "missing" device path check into
> btrfs_rm_device().
>
> But btrfs_rm_device() itself can have case where it only receives
> @devid, with NULL as @device_path.
>
> In that case, calling strcmp() on NULL will trigger the NULL pointer
> dereference.
>
> Before that commit, we handle the "missing" case inside
> btrfs_find_device_by_devspec(), which will not check @device_path at all
> if @devid is provided, thus no way to trigger the bug.
>
> [FIX]
> Before calling strcmp(), also make sure @device_path is not NULL.
>
> Fixes: a27a94c2b0c7 ("btrfs: Make btrfs_find_device_by_devspec return btrfs_device directly")
> CC: stable at vger.kernel.org # 5.4+
> Reported-by: butt3rflyh4ck <butterflyhuangxx at gmail.com>
> Reviewed-by: Anand Jain <anand.jain at oracle.com>
> Signed-off-by: Qu Wenruo <wqu at suse.com>
> Reviewed-by: David Sterba <dsterba at suse.com>
> Signed-off-by: David Sterba <dsterba at suse.com>
> (cherry picked from commit e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091)
> Signed-off-by: Tim Gardner <tim.gardner at canonical.com>
Acked-by: Stefan Bader <stefan.bader at canonical.com>
> ---
Not sure how much effort still should go into any 5.8 but since we have some
cleaning up to be done soon and this looks simple enough lets get a second ack
quick and I can squeeze it into the run I delayed for the revocation stuff.
-Stefan
> fs/btrfs/volumes.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c
> index 3e3529c600cb7..e882c790292f9 100644
> --- a/fs/btrfs/volumes.c
> +++ b/fs/btrfs/volumes.c
> @@ -2168,7 +2168,7 @@ int btrfs_rm_device(struct btrfs_fs_info *fs_info, const char *device_path,
>
> if (IS_ERR(device)) {
> if (PTR_ERR(device) == -ENOENT &&
> - strcmp(device_path, "missing") == 0)
> + device_path && strcmp(device_path, "missing") == 0)
> ret = BTRFS_ERROR_DEV_MISSING_NOT_FOUND;
> else
> ret = PTR_ERR(device);
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20211004/cfb69db1/attachment.sig>
More information about the kernel-team
mailing list