Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp273963yba; Mon, 20 May 2019 08:29:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqwTwQndbhFgJvlbazljUWMbWLsSiUkdt7INpA+7mIxJOPeKqMMYV0OuTmGrbxqWfR1SpgLi X-Received: by 2002:a17:902:9007:: with SMTP id a7mr75438414plp.221.1558366170213; Mon, 20 May 2019 08:29:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558366170; cv=none; d=google.com; s=arc-20160816; b=tWlvtMNIOSm84xyAYTGlvJ3MH47p4BKkTX1qD6ivKl68zM/itcu3zllDnfFABU/hIv 5UAGvbDBOG7zsnt+TQa5cCf/WXgUohn1N0lZWw4993y3WwgkpxJ5SoMILFDdZazXfwJy +4ocF+1w5ZgIhO3bi7SIlRkTPExcg0G0na0voR8ltlk8xWbvRfnLiPpD0X2GZu0UnYSm 9n4pf4JICmC3OXaxwLqDzA38/M6GZB0F6ypReln+/oJQnr44AN2fUtwhvGqVHWzJBFIA M5FCuVApl5E3MQ9EQU++pfW2tgSdWn8s4l05TsV1VhFgEfsxccjQvChTjCYADCYDO5d/ b8Kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=js/Bhyp+ukbV0vJ2wG77/FDIYijGs+tWaHVPTO1jXpc=; b=TX1MXtJd63l4mbfeGVl8oyxAn5wprFHS+LWCnA3NIl01peyiTbpBG6Tb/ggRy3+m/g loFpLbuxOR0LG8agR6cafu8w+fO1GDJc+FIRUG4nput1TZXMnvNq6liYJQXWADWXeKQD ZjfzYarKGtCQhBaLo79BZPcIj3iGAlAW2TH256HkEG8lOWiTBwKAJOsLt5O9irXyfB0Q hSWziuRuqCwtfMceGEIFLRAcc4uYEtfokFrIiLAtKiNr3Ai0tptSVicu/J92JujWk19Z 9mteK30WwDc+3DHXY2x8JF1BbR3hc4r4VqsdoNSnJEoHkNzBOV/eaei/XQZOHqjxlu2i bQ4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KBiR8rsi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cj18si11771912plb.328.2019.05.20.08.29.15; Mon, 20 May 2019 08:29:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KBiR8rsi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388790AbfETMYU (ORCPT + 99 others); Mon, 20 May 2019 08:24:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:38952 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388764AbfETMYI (ORCPT ); Mon, 20 May 2019 08:24:08 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7D72520815; Mon, 20 May 2019 12:24:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558355048; bh=rbaUw09nTDaxvuLdWWQ0id19Ppq7bCyJwobak7LfE4U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KBiR8rsifdGbyiHoKwFacQdkZooBh9IL6kBV45i9pTQuTMeopW24fYu+R/onyBbGU 8KOgnk7gNZKQRiW+MapB0xvb0HQ+BAdCd1g5L4+0yhyUC6J6OTOzBnlkS9+CKavMJs 1NHtRZps7K42juwO+gfryF31MOEMS60CpxSC9l5g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Filipe Manana , David Sterba Subject: [PATCH 4.19 076/105] Btrfs: send, flush dellaloc in order to avoid data loss Date: Mon, 20 May 2019 14:14:22 +0200 Message-Id: <20190520115252.487467638@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190520115247.060821231@linuxfoundation.org> References: <20190520115247.060821231@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Filipe Manana commit 9f89d5de8631c7930898a601b6612e271aa2261c upstream. When we set a subvolume to read-only mode we do not flush dellaloc for any of its inodes (except if the filesystem is mounted with -o flushoncommit), since it does not affect correctness for any subsequent operations - except for a future send operation. The send operation will not be able to see the delalloc data since the respective file extent items, inode item updates, backreferences, etc, have not hit yet the subvolume and extent trees. Effectively this means data loss, since the send stream will not contain any data from existing delalloc. Another problem from this is that if the writeback starts and finishes while the send operation is in progress, we have the subvolume tree being being modified concurrently which can result in send failing unexpectedly with EIO or hitting runtime errors, assertion failures or hitting BUG_ONs, etc. Simple reproducer: $ mkfs.btrfs -f /dev/sdb $ mount /dev/sdb /mnt $ btrfs subvolume create /mnt/sv $ xfs_io -f -c "pwrite -S 0xea 0 108K" /mnt/sv/foo $ btrfs property set /mnt/sv ro true $ btrfs send -f /tmp/send.stream /mnt/sv $ od -t x1 -A d /mnt/sv/foo 0000000 ea ea ea ea ea ea ea ea ea ea ea ea ea ea ea ea * 0110592 $ umount /mnt $ mkfs.btrfs -f /dev/sdc $ mount /dev/sdc /mnt $ btrfs receive -f /tmp/send.stream /mnt $ echo $? 0 $ od -t x1 -A d /mnt/sv/foo 0000000 # ---> empty file Since this a problem that affects send only, fix it in send by flushing dellaloc for all the roots used by the send operation before send starts to process the commit roots. This is a problem that affects send since it was introduced (commit 31db9f7c23fbf7 ("Btrfs: introduce BTRFS_IOC_SEND for btrfs send/receive")) but backporting it to older kernels has some dependencies: - For kernels between 3.19 and 4.20, it depends on commit 3cd24c698004d2 ("btrfs: use tagged writepage to mitigate livelock of snapshot") because the function btrfs_start_delalloc_snapshot() does not exist before that commit. So one has to either pick that commit or replace the calls to btrfs_start_delalloc_snapshot() in this patch with calls to btrfs_start_delalloc_inodes(). - For kernels older than 3.19 it also requires commit e5fa8f865b3324 ("Btrfs: ensure send always works on roots without orphans") because it depends on the function ensure_commit_roots_uptodate() which that commits introduced. - No dependencies for 5.0+ kernels. A test case for fstests follows soon. CC: stable@vger.kernel.org # 3.19+ Signed-off-by: Filipe Manana Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/send.c | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) --- a/fs/btrfs/send.c +++ b/fs/btrfs/send.c @@ -6583,6 +6583,38 @@ commit_trans: return btrfs_commit_transaction(trans); } +/* + * Make sure any existing dellaloc is flushed for any root used by a send + * operation so that we do not miss any data and we do not race with writeback + * finishing and changing a tree while send is using the tree. This could + * happen if a subvolume is in RW mode, has delalloc, is turned to RO mode and + * a send operation then uses the subvolume. + * After flushing delalloc ensure_commit_roots_uptodate() must be called. + */ +static int flush_delalloc_roots(struct send_ctx *sctx) +{ + struct btrfs_root *root = sctx->parent_root; + int ret; + int i; + + if (root) { + ret = btrfs_start_delalloc_snapshot(root); + if (ret) + return ret; + btrfs_wait_ordered_extents(root, U64_MAX, 0, U64_MAX); + } + + for (i = 0; i < sctx->clone_roots_cnt; i++) { + root = sctx->clone_roots[i].root; + ret = btrfs_start_delalloc_snapshot(root); + if (ret) + return ret; + btrfs_wait_ordered_extents(root, U64_MAX, 0, U64_MAX); + } + + return 0; +} + static void btrfs_root_dec_send_in_progress(struct btrfs_root* root) { spin_lock(&root->root_item_lock); @@ -6807,6 +6839,10 @@ long btrfs_ioctl_send(struct file *mnt_f NULL); sort_clone_roots = 1; + ret = flush_delalloc_roots(sctx); + if (ret) + goto out; + ret = ensure_commit_roots_uptodate(sctx); if (ret) goto out;