URL: https://bugzilla.kernel.org/show_bug.cgi?id=97271 Lukas Lueg 2015-04-25 20:34:39 UTC The attached btrfs-image causes "btrfs check" to write outside of allocated memory locations and ultimately die due to a segfault. An adjacent heap block's control structure is overwritten with a `struct extent_buffer *`, which is not controllable by the user. "btrfs version" is v3.19.1. Running "btrfs check" immediately dies with *** Error in `btrfs': double free or corruption (!prev): 0x0000000002396ec0 *** *** Error in `btrfs': malloc(): memory corruption: 0x0000000002396f60 *** Debugging with valgrind and gdb gives ==11670== Invalid write of size 8 ==11670== at 0x4386FB: btrfs_search_slot (ctree.c:1119) ==11670== by 0x44E16E: btrfs_read_chunk_tree (volumes.c:1814) ==11670== by 0x43D654: btrfs_setup_chunk_tree_and_device_map (disk-io.c:1115) ==11670== by 0x43D7D0: __open_ctree_fd (disk-io.c:1190) ==11670== by 0x43D964: open_ctree_fs_info (disk-io.c:1231) ==11670== by 0x427BF4: cmd_check (cmds-check.c:9326) ==11670== by 0x40E5A1: main (btrfs.c:245) ==11670== Address 0x4c3bb98 is 8 bytes after a block of size 144 alloc'd ==11670== at 0x4A08946: calloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==11670== by 0x44E133: btrfs_read_chunk_tree (volumes.c:1801) ==11670== by 0x43D654: btrfs_setup_chunk_tree_and_device_map (disk-io.c:1115) ==11670== by 0x43D7D0: __open_ctree_fd (disk-io.c:1190) ==11670== by 0x43D964: open_ctree_fs_info (disk-io.c:1231) ==11670== by 0x427BF4: cmd_check (cmds-check.c:9326) ==11670== by 0x40E5A1: main (btrfs.c:245) Program received signal SIGTRAP, Trace/breakpoint trap. btrfs_search_slot (trans=trans@entry=0x0, root=root@entry=0x4c36d30, key=key@entry=0xffefff830, p=p@entry=0x4c3bb00, ins_len=ins_len@entry=0, cow=cow@entry=0) at ctree.c:1119 1119 p->nodes[level] = b; (gdb) p p->nodes $1 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0} (gdb) p p $2 = (struct btrfs_path *) 0x4c3bb00 (gdb) p b $3 = (struct extent_buffer *) 0x4c3a990 The corresponding part in ctree.c:btrfs_search_slot() seems to fail to check if `level` overflows outside of `node`: level = btrfs_header_level(b); ... if (level != btrfs_header_level(b)) WARN_ON(1); level = btrfs_header_level(b); p->nodes[level] = b; // <- Illegal write Maybe the repeated calls to btrfs_header_level() were meant to do something once, they seem to be noise.