mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-02-19 13:38:24 -05:00
btrfs: fix invalid inode pointer dereferences during log replay
In a few places where we call read_one_inode(), if we get a NULL pointer
we end up jumping into an error path, or fallthrough in case of
__add_inode_ref(), where we then do something like this:
iput(&inode->vfs_inode);
which results in an invalid inode pointer that triggers an invalid memory
access, resulting in a crash.
Fix this by making sure we don't do such dereferences.
Fixes: b4c50cbb01 ("btrfs: return a btrfs_inode from read_one_inode()")
CC: stable@vger.kernel.org # 6.15+
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
This commit is contained in:
committed by
David Sterba
parent
e5b5596011
commit
2dcf838cf5
@@ -668,15 +668,12 @@ static noinline int replay_one_extent(struct btrfs_trans_handle *trans,
|
||||
extent_end = ALIGN(start + size,
|
||||
fs_info->sectorsize);
|
||||
} else {
|
||||
ret = 0;
|
||||
goto out;
|
||||
return 0;
|
||||
}
|
||||
|
||||
inode = read_one_inode(root, key->objectid);
|
||||
if (!inode) {
|
||||
ret = -EIO;
|
||||
goto out;
|
||||
}
|
||||
if (!inode)
|
||||
return -EIO;
|
||||
|
||||
/*
|
||||
* first check to see if we already have this extent in the
|
||||
@@ -961,7 +958,8 @@ static noinline int drop_one_dir_item(struct btrfs_trans_handle *trans,
|
||||
ret = unlink_inode_for_log_replay(trans, dir, inode, &name);
|
||||
out:
|
||||
kfree(name.name);
|
||||
iput(&inode->vfs_inode);
|
||||
if (inode)
|
||||
iput(&inode->vfs_inode);
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -1176,8 +1174,8 @@ static inline int __add_inode_ref(struct btrfs_trans_handle *trans,
|
||||
ret = unlink_inode_for_log_replay(trans,
|
||||
victim_parent,
|
||||
inode, &victim_name);
|
||||
iput(&victim_parent->vfs_inode);
|
||||
}
|
||||
iput(&victim_parent->vfs_inode);
|
||||
kfree(victim_name.name);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
Reference in New Issue
Block a user