Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2547923imm; Thu, 16 Aug 2018 11:16:07 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxlQHtavfDtHo9y7dSMhQ4LYqs/TGU7DnkkJ27V/MZIVoK2WrQCKeYeprjEkNHBeBaVRfic X-Received: by 2002:a65:614a:: with SMTP id o10-v6mr29259226pgv.387.1534443367451; Thu, 16 Aug 2018 11:16:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534443367; cv=none; d=google.com; s=arc-20160816; b=YyfUULuEX+FiHo4KTIS2ZGC7J+8cfYg+CVHJDY0PPtAk10lNUmfI5kUp5wwpgCYx54 PisYzzqYqOi385nOjQukHt1N552bliPihVsmkbaFuwkSOIMv/SrKcGyE+YOfDFDImy0x WisBaBeJ46C87ti5Uklo2TKFk8cpHLv3pC9SaPrBL9XX1xibtR2gdkUylTOFrLa/uK6z tBN4kNWg55NXDMPE+5F6dVVznMJNkS3eh6bYT82p8Yb7I6SnDfzk82I3WfAFxd7lsc79 tylsD+YiP4To8pJJY37TUyXtDJRvmYpBFiyBsG64qCLUTP6hH2bWOzl4fy7Flz/LAcFY Kccw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=3VFXQOLz4DiZyK/5zVBMkoErmkjbKX8dPhVOcdv8Uuc=; b=Ot47jPIJX8e1CPVS6s1qZ9uhZ8JemF852VyezoumV2xn+umcj4ge0eUj1Vsa9w6auQ Vzy/W2sBlrJSAe4CF/wxyNaOipfFQVOllpqLO1elS2YpQQVQkHFE2JhgTTOQtBtmWMAD 3buyHbamJye1K9h3gtgc12EY+tic10UXN/CdVCDH88QSXn+GsUZ5BXVmueeC++rZmRUD 39JkdVSFh+K35Jr9JoDOftMHTb8yWgaoq/HPH7aF3Fm6ndohcQt76A1cxbm65DHiGMYX 7EPQKKB5nAvXqbgVrdsW5HiszOfEHUKjH3KIXnpw1IIXIkZzf0GyFjnfnHTjvY5PbR13 zItg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x127-v6si25652519pgb.618.2018.08.16.11.15.52; Thu, 16 Aug 2018 11:16:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391213AbeHPOWm (ORCPT + 99 others); Thu, 16 Aug 2018 10:22:42 -0400 Received: from smtp2.provo.novell.com ([137.65.250.81]:42026 "EHLO smtp2.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389028AbeHPOWm (ORCPT ); Thu, 16 Aug 2018 10:22:42 -0400 Received: from Beta.suse.asia (prv-ext-foundry1int.gns.novell.com [137.65.251.240]) by smtp2.provo.novell.com with ESMTP (NOT encrypted); Thu, 16 Aug 2018 05:24:35 -0600 From: Larry Chen To: mfasheh@versity.com, jlbec@evilplan.org Cc: linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com, akpm@linux-foundation.org Subject: [PATCH] fix crash on ocfs2_duplicate_clusters_by_page Date: Thu, 16 Aug 2018 19:24:26 +0800 Message-Id: <20180816112426.12218-1-lchen@suse.com> X-Mailer: git-send-email 2.13.7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ocfs2_duplicate_clusters_by_page may crash if an extent's page is dirty. When a page has not been written back, it is still in dirty state. If at that moment, ocfs2_duplicate_clusters_by_page is called against this page, the crash happens. To fix this bug, we can just unlock the page and wait the page until it's not dirty. I don't know whether the patch is appropriate, so I need comments, thanks. The following is the core dump: kernel BUG at /root/code/ocfs2/refcounttree.c:2961! __ocfs2_move_extent+0x80/0x450 [ocfs2] ? __ocfs2_claim_clusters+0x130/0x250 [ocfs2] ocfs2_defrag_extent+0x5b8/0x5e0 [ocfs2] __ocfs2_move_extents_range+0x2a4/0x470 [ocfs2] ocfs2_move_extents+0x180/0x3b0 [ocfs2] ? ocfs2_wait_for_recovery+0x13/0x70 [ocfs2] ocfs2_ioctl_move_extents+0x133/0x2d0 [ocfs2] ocfs2_ioctl+0x253/0x640 [ocfs2] do_vfs_ioctl+0x90/0x5f0 SyS_ioctl+0x74/0x80 do_syscall_64+0x74/0x140 entry_SYSCALL_64_after_hwframe+0x3d/0xa2 To: mfasheh@versity.com, jlbec@evilplan.org Cc: linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com, akpm@linux-foundation.org Signed-off-by: Larry Chen --- fs/ocfs2/refcounttree.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/fs/ocfs2/refcounttree.c b/fs/ocfs2/refcounttree.c index 7869622af22a..ee3b9dbbc310 100644 --- a/fs/ocfs2/refcounttree.c +++ b/fs/ocfs2/refcounttree.c @@ -2946,6 +2946,7 @@ int ocfs2_duplicate_clusters_by_page(handle_t *handle, if (map_end & (PAGE_SIZE - 1)) to = map_end & (PAGE_SIZE - 1); +retry: page = find_or_create_page(mapping, page_index, GFP_NOFS); if (!page) { ret = -ENOMEM; @@ -2957,8 +2958,13 @@ int ocfs2_duplicate_clusters_by_page(handle_t *handle, * In case PAGE_SIZE <= CLUSTER_SIZE, This page * can't be dirtied before we CoW it out. */ - if (PAGE_SIZE <= OCFS2_SB(sb)->s_clustersize) - BUG_ON(PageDirty(page)); + if (PAGE_SIZE <= OCFS2_SB(sb)->s_clustersize) { + if (PageDirty(page)) { + unlock_page(page); + cond_resched(); + goto retry; + } + } if (!PageUptodate(page)) { ret = block_read_full_page(page, ocfs2_get_block); -- 2.13.7