ext4: avoid potential buffer_head leak in __ext4_new_inode()
authorKemeng Shi <shikemeng@huaweicloud.com>
Tue, 20 Aug 2024 13:22:29 +0000 (21:22 +0800)
committerTheodore Ts'o <tytso@mit.edu>
Wed, 4 Sep 2024 02:12:15 +0000 (22:12 -0400)
If a group is marked EXT4_GROUP_INFO_IBITMAP_CORRUPT after it's inode
bitmap buffer_head was successfully verified, then __ext4_new_inode()
will get a valid inode_bitmap_bh of a corrupted group from
ext4_read_inode_bitmap() in which case inode_bitmap_bh misses a release.
Hnadle "IS_ERR(inode_bitmap_bh)" and group corruption separately like
how ext4_free_inode() does to avoid buffer_head leak.

Fixes: 9008a58e5dce ("ext4: make the bitmap read routines return real error codes")
Signed-off-by: Kemeng Shi <shikemeng@huaweicloud.com>
Link: https://patch.msgid.link/20240820132234.2759926-3-shikemeng@huaweicloud.com
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
fs/ext4/ialloc.c

index ad7f13976dc60484d2a61d4590127fd1d7e9dbb1..9e2c08a8665f2c7d3cc3569cf54dfecdcadb9f4e 100644 (file)
@@ -1054,12 +1054,13 @@ got_group:
                brelse(inode_bitmap_bh);
                inode_bitmap_bh = ext4_read_inode_bitmap(sb, group);
                /* Skip groups with suspicious inode tables */
-               if (((!(sbi->s_mount_state & EXT4_FC_REPLAY))
-                    && EXT4_MB_GRP_IBITMAP_CORRUPT(grp)) ||
-                   IS_ERR(inode_bitmap_bh)) {
+               if (IS_ERR(inode_bitmap_bh)) {
                        inode_bitmap_bh = NULL;
                        goto next_group;
                }
+               if (!(sbi->s_mount_state & EXT4_FC_REPLAY) &&
+                   EXT4_MB_GRP_IBITMAP_CORRUPT(grp))
+                       goto next_group;
 
 repeat_in_this_group:
                ret2 = find_inode_bit(sb, group, inode_bitmap_bh, &ino);