* [PATCH] block: fix infinite loop in badblocks_clear()
@ 2026-04-26 14:55 Ramesh Adhikari
2026-04-26 17:11 ` [PATCH v2] " Ramesh Adhikari
2026-04-26 17:26 ` [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check() Ramesh Adhikari
0 siblings, 2 replies; 4+ messages in thread
From: Ramesh Adhikari @ 2026-04-26 14:55 UTC (permalink / raw)
To: gregkh; +Cc: axboe, linux-block, security, Ramesh Adhikari
An infinite loop can occur in _badblocks_clear() when BB_OFFSET(p[prev + 1])
equals bad.start, resulting in len = 0. This causes the update_sectors loop
to spin forever without making progress:
s += 0; // no advancement
sectors -= 0; // stays positive
goto re_clear; // infinite loop
After approximately 21 seconds, the RCU stall detector triggers and the
system becomes completely unresponsive, requiring a hard reboot.
Add a check to ensure len is non-zero before entering the loop.
Signed-off-by: Ramesh Adhikari <adhikari.resume@gmail.com>
---
block/badblocks.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/block/badblocks.c b/block/badblocks.c
index ece64e76fe8..9ea4a067710 100644
--- a/block/badblocks.c
+++ b/block/badblocks.c
@@ -1151,6 +1151,10 @@ static bool _badblocks_clear(struct badblocks *bb, sector_t s, sector_t sectors)
/* Not front overlap, but behind overlap */
if ((prev + 1) < bb->count && overlap_behind(bb, &bad, prev + 1)) {
len = BB_OFFSET(p[prev + 1]) - bad.start;
+ if (len == 0) {
+ pr_warn_once("badblocks_clear: zero-length segment detected\n");
+ len = 1;
+ }
hint = prev + 1;
/* Clear non-bad range should be treated as successful */
cleared++;
--
2.43.0
^ permalink raw reply related [flat|nested] 4+ messages in thread* [PATCH v2] block: fix infinite loop in badblocks_clear()
2026-04-26 14:55 [PATCH] block: fix infinite loop in badblocks_clear() Ramesh Adhikari
@ 2026-04-26 17:11 ` Ramesh Adhikari
2026-04-26 17:26 ` [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check() Ramesh Adhikari
1 sibling, 0 replies; 4+ messages in thread
From: Ramesh Adhikari @ 2026-04-26 17:11 UTC (permalink / raw)
To: gregkh; +Cc: axboe, linux-block, security, Ramesh Adhikari
An infinite loop can occur in _badblocks_clear() when BB_OFFSET(p[prev + 1])
equals bad.start, resulting in len = 0. This causes the update_sectors loop
to spin forever without making progress:
s += 0; // no advancement
sectors -= 0; // stays positive
goto re_clear; // infinite loop
The bug exists in two code paths:
1. _badblocks_clear() at line 1153 (behind overlap check)
2. _badblocks_check() at line 1240 (behind overlap check)
Add checks in both functions to ensure len is non-zero before entering
the loop.
Signed-off-by: Ramesh Adhikari <adhikari.resume@gmail.com>
---
block/badblocks.c | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/block/badblocks.c b/block/badblocks.c
index ece64e76fe8..1c6728866f9 100644
--- a/block/badblocks.c
+++ b/block/badblocks.c
@@ -1151,6 +1151,10 @@ static bool _badblocks_clear(struct badblocks *bb, sector_t s, sector_t sectors)
/* Not front overlap, but behind overlap */
if ((prev + 1) < bb->count && overlap_behind(bb, &bad, prev + 1)) {
len = BB_OFFSET(p[prev + 1]) - bad.start;
+ if (len == 0) {
+ pr_warn_once("badblocks_clear: zero-length segment detected\n");
+ len = 1;
+ }
hint = prev + 1;
/* Clear non-bad range should be treated as successful */
cleared++;
@@ -1234,6 +1238,10 @@ static int _badblocks_check(struct badblocks *bb, sector_t s, sector_t sectors,
/* Not front overlap, but behind overlap */
if ((prev + 1) < bb->count && overlap_behind(bb, &bad, prev + 1)) {
len = BB_OFFSET(p[prev + 1]) - bad.start;
+ if (len == 0) {
+ pr_warn_once("badblocks_check: zero-length segment detected\n");
+ len = 1;
+ }
hint = prev + 1;
goto update_sectors;
}
--
2.43.0
^ permalink raw reply related [flat|nested] 4+ messages in thread* [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check()
2026-04-26 14:55 [PATCH] block: fix infinite loop in badblocks_clear() Ramesh Adhikari
2026-04-26 17:11 ` [PATCH v2] " Ramesh Adhikari
@ 2026-04-26 17:26 ` Ramesh Adhikari
2026-04-26 17:30 ` Jens Axboe
1 sibling, 1 reply; 4+ messages in thread
From: Ramesh Adhikari @ 2026-04-26 17:26 UTC (permalink / raw)
To: gregkh; +Cc: axboe, linux-block, security, Ramesh Adhikari
An infinite loop can occur in both _badblocks_clear() and _badblocks_check()
when BB_OFFSET() equals the start position, resulting in len = 0. This causes
the update_sectors loop to spin forever without making progress:
s += 0; // no advancement
sectors -= 0; // stays positive
goto re_clear; // infinite loop
The bug exists in three code paths:
1. _badblocks_clear() at line 1100 (start before all badblocks)
2. _badblocks_clear() at line 1153 (behind overlap check)
3. _badblocks_check() at line 1240 (behind overlap check)
Add checks in all three locations to ensure len is non-zero before
entering the loop.
Signed-off-by: Ramesh Adhikari <adhikari.resume@gmail.com>
---
block/badblocks.c | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/block/badblocks.c b/block/badblocks.c
index ece64e76fe8..9dd2d921e1b 100644
--- a/block/badblocks.c
+++ b/block/badblocks.c
@@ -1098,6 +1098,10 @@ static bool _badblocks_clear(struct badblocks *bb, sector_t s, sector_t sectors)
if (prev < 0) {
if (overlap_behind(bb, &bad, 0)) {
len = BB_OFFSET(p[0]) - s;
+ if (len == 0) {
+ pr_warn_once("badblocks_clear: zero-length at start\n");
+ len = 1;
+ }
hint = 0;
} else {
len = sectors;
@@ -1151,6 +1155,10 @@ static bool _badblocks_clear(struct badblocks *bb, sector_t s, sector_t sectors)
/* Not front overlap, but behind overlap */
if ((prev + 1) < bb->count && overlap_behind(bb, &bad, prev + 1)) {
len = BB_OFFSET(p[prev + 1]) - bad.start;
+ if (len == 0) {
+ pr_warn_once("badblocks_clear: zero-length segment detected\n");
+ len = 1;
+ }
hint = prev + 1;
/* Clear non-bad range should be treated as successful */
cleared++;
@@ -1234,6 +1242,10 @@ static int _badblocks_check(struct badblocks *bb, sector_t s, sector_t sectors,
/* Not front overlap, but behind overlap */
if ((prev + 1) < bb->count && overlap_behind(bb, &bad, prev + 1)) {
len = BB_OFFSET(p[prev + 1]) - bad.start;
+ if (len == 0) {
+ pr_warn_once("badblocks_check: zero-length segment detected\n");
+ len = 1;
+ }
hint = prev + 1;
goto update_sectors;
}
--
2.43.0
^ permalink raw reply related [flat|nested] 4+ messages in thread* Re: [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check()
2026-04-26 17:26 ` [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check() Ramesh Adhikari
@ 2026-04-26 17:30 ` Jens Axboe
0 siblings, 0 replies; 4+ messages in thread
From: Jens Axboe @ 2026-04-26 17:30 UTC (permalink / raw)
To: Ramesh Adhikari, gregkh; +Cc: linux-block, security
On 4/26/26 11:26 AM, Ramesh Adhikari wrote:
> An infinite loop can occur in both _badblocks_clear() and _badblocks_check()
> when BB_OFFSET() equals the start position, resulting in len = 0. This causes
> the update_sectors loop to spin forever without making progress:
>
> s += 0; // no advancement
> sectors -= 0; // stays positive
> goto re_clear; // infinite loop
>
> The bug exists in three code paths:
> 1. _badblocks_clear() at line 1100 (start before all badblocks)
> 2. _badblocks_clear() at line 1153 (behind overlap check)
> 3. _badblocks_check() at line 1240 (behind overlap check)
1) please calm down with the repostings
2) sit back, actually take your time, and find all the spots. this
drive-by-development is not useful.
--
Jens Axboe
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2026-04-26 17:30 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-26 14:55 [PATCH] block: fix infinite loop in badblocks_clear() Ramesh Adhikari
2026-04-26 17:11 ` [PATCH v2] " Ramesh Adhikari
2026-04-26 17:26 ` [PATCH v3] block: fix infinite loop in badblocks_clear() and badblocks_check() Ramesh Adhikari
2026-04-26 17:30 ` Jens Axboe
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox