Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp330032imm; Wed, 29 Aug 2018 00:49:29 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZf5Jr2IZISnubD+gC/F9rscJ96zd4S8mXC3EAefd5tu9KPe2X6YVMG5eTahTTVh4mD8Mjo X-Received: by 2002:a17:902:9693:: with SMTP id n19-v6mr4893427plp.282.1535528968996; Wed, 29 Aug 2018 00:49:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535528968; cv=none; d=google.com; s=arc-20160816; b=TrT2z1E7JDcDy9imd5MpLbhVotJaW5yKx0yNwy8IKSnlAKq1S+/yJvbY2xZkHOWsye qZU+if1FOu4qPOGDweqXObAW141yzIRqPyQI1LgbhQUqQNMa73pWBuhffpqCNRA2SEOf TARJ+CdTcILaaFM1szHO0G+Tz0wO2O1qDkN9yzSpV1EAYZl0T5crWlqRTNt7zM7I457k aeQhxhXiMP1ZDQdJMo9Uzsi6oGQOazOF8p5a2V0Y9r48hLFN3ZigtmsQC8Il6utOnHjB 8iWawqBywbTlCJDf/KQ9L952X4HwEt03KA9Tpdqgm7yUaSlO92xmqIp7XfD+XJPKJGn3 h4Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=XZ/eO1mRRWpE4eKHL4fESAeaRFYml9Q2y/rABM1WdwM=; b=GAGnjyA073dgQ+fWIBb/oKM87wTvXwb2b3GqOj2i+06bgPvYMjYKmSnMpaOQU5eH2A L9T24Fq558Zjfz4DQMQWviogrThwP8Qe1w4WnpQGtcMv5eHXwHUhM1FZ8jeXxC6FaVdk 2VjM7hZRuTfy4xU3Ho6T2NqJpNBVVWn4nruXBxgHGT41SrkjqTRtTaw/6LF/AWIoghH9 yIpGcMLuamUj0jOpLnvKsv50wdpWeWEbaJ6Y46C+iTL30nzN4WWPPaBllJ0eIdeQZhR+ C92JXkJdfxlnQy7csOS2L/rKv64GH2Ww2ETYWZ05TDrqBCyinzOdKXXGa3hA68srgivW hA2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 92-v6si3269188plw.81.2018.08.29.00.49.14; Wed, 29 Aug 2018 00:49:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727757AbeH2Lnh (ORCPT + 99 others); Wed, 29 Aug 2018 07:43:37 -0400 Received: from smtp2.provo.novell.com ([137.65.250.81]:42751 "EHLO smtp2.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727099AbeH2Lnh (ORCPT ); Wed, 29 Aug 2018 07:43:37 -0400 Received: from Beta.suse.asia (prv-ext-foundry1int.gns.novell.com [137.65.251.240]) by smtp2.provo.novell.com with ESMTP (NOT encrypted); Wed, 29 Aug 2018 01:47:52 -0600 From: Larry Chen To: mfasheh@suse.com, jlbec@evilplan.org Cc: linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com, akpm@linux-foundation.org Subject: [PATCH] fix crash on ocfs2_duplicate_clusters_by_page Date: Wed, 29 Aug 2018 15:47:40 +0800 Message-Id: <20180829074740.9438-1-lchen@suse.com> X-Mailer: git-send-email 2.13.7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ocfs2_duplicate_clusters_by_page may crash if one of extent's pages is dirty. When a page has not been written back, it is still in dirty state. If ocfs2_duplicate_clusters_by_page is called against the dirty page, the crash happens. To fix this bug, we can just unlock the page and wait the page until it's not dirty. The following is the buck trace dump: kernel BUG at /root/code/ocfs2/refcounttree.c:2961! [exception RIP: ocfs2_duplicate_clusters_by_page+822] __ocfs2_move_extent+0x80/0x450 [ocfs2] ? __ocfs2_claim_clusters+0x130/0x250 [ocfs2] ocfs2_defrag_extent+0x5b8/0x5e0 [ocfs2] __ocfs2_move_extents_range+0x2a4/0x470 [ocfs2] ocfs2_move_extents+0x180/0x3b0 [ocfs2] ? ocfs2_wait_for_recovery+0x13/0x70 [ocfs2] ocfs2_ioctl_move_extents+0x133/0x2d0 [ocfs2] ocfs2_ioctl+0x253/0x640 [ocfs2] do_vfs_ioctl+0x90/0x5f0 SyS_ioctl+0x74/0x80 do_syscall_64+0x74/0x140 entry_SYSCALL_64_after_hwframe+0x3d/0xa2 Change-log: 1. Once we founce the page is dirty, we do not wait until it's clean, but rather we use write_one_page to write it back 2. write_one_page arguments list changed, adjust and retest this patch. Signed-off-by: Larry Chen --- fs/ocfs2/refcounttree.c | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/fs/ocfs2/refcounttree.c b/fs/ocfs2/refcounttree.c index 7869622af22a..d6022e04c35a 100644 --- a/fs/ocfs2/refcounttree.c +++ b/fs/ocfs2/refcounttree.c @@ -2946,6 +2946,7 @@ int ocfs2_duplicate_clusters_by_page(handle_t *handle, if (map_end & (PAGE_SIZE - 1)) to = map_end & (PAGE_SIZE - 1); +retry: page = find_or_create_page(mapping, page_index, GFP_NOFS); if (!page) { ret = -ENOMEM; @@ -2957,8 +2958,15 @@ int ocfs2_duplicate_clusters_by_page(handle_t *handle, * In case PAGE_SIZE <= CLUSTER_SIZE, This page * can't be dirtied before we CoW it out. */ - if (PAGE_SIZE <= OCFS2_SB(sb)->s_clustersize) - BUG_ON(PageDirty(page)); + if (PAGE_SIZE <= OCFS2_SB(sb)->s_clustersize) { + if (PageDirty(page)) { + /* + * write_on_page will unlock the page on return + */ + ret = write_one_page(page); + goto retry; + } + } if (!PageUptodate(page)) { ret = block_read_full_page(page, ocfs2_get_block); -- 2.13.7