Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp575054ybn; Thu, 3 Oct 2019 09:04:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqyX3j3UhnbnglGlu8vXYNxpVoKlt+ThXBPigFRSr3xFPyT3XEBimFybe9letLT8bSg5IFVD X-Received: by 2002:aa7:d995:: with SMTP id u21mr10375633eds.271.1570118674681; Thu, 03 Oct 2019 09:04:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570118674; cv=none; d=google.com; s=arc-20160816; b=M0NaqR4Jpq7Mn8hKlc2nhd9gzFDk7rKwK40BafBhnUCQ3ss7nydkf9b1YE2wvPx8og z36ghJL7AzS6+XRrM2LbjksAumBrHh6AwYcMS2FITN5D5m8YA5MSnddzXINQryCQPnJv xm91fGio4Y4/Jlj3oZHLm1fvbHlNNULdquyYoYCOPjFUADxKOKHeI7fkCQiJc4zl0Y8Z FJESJ6Ijaaoz++hLMF2UdKvEowagb4pB5yMmN56QPMOfsrO1SOj4LqhbkwUO2L7J+978 Y8JNSc1Jq3XpIyg5/QmnTpN5uBpjXX9FaRlnwWZRg9WfZ4LKnrDFqUP+dq1dmmdKygr3 K/lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9BlzFivwA175ixz5vFWSJ7IQiLFCRIVnrlaWw446L4o=; b=XMS4yWViLVa25CDR9hY+dbKnHv/wyGEOHw7GWuU/AoJ7tWDp9R5frBrN8/MC4FjJXt oSvlxl5bh5iRuymcF0gqWSXhx5qYNUi8cVtPOuS+Uilf9RBI9DpqW5JSx6asvw0EM0nX JDT2ZFFwoEVxJBX/tlupheAX0e0Yreloq4VcnzJQwdjJzmOnhjUXRTdybwtvDB8e1Kq4 BUX7KZyU1y2GUynEFCYvZOVEj2tTeGHZ0k9Qhn2JmNBd3l1OfLDNims1d55F1QY2tlwF XAeMM6T85S3m88aLc7x2KtEpa62WqHsx8dEfLWFJNs0EP9rgFEcDzXFAc9YHBnCFjkW0 1jqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ba8fvna/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9si1683787edt.32.2019.10.03.09.04.10; Thu, 03 Oct 2019 09:04:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ba8fvna/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728971AbfJCP7C (ORCPT + 99 others); Thu, 3 Oct 2019 11:59:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:41912 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729160AbfJCP7B (ORCPT ); Thu, 3 Oct 2019 11:59:01 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B216F20830; Thu, 3 Oct 2019 15:58:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570118340; bh=57TMLNQQ6YTr7rtXTwnbCE6W7TeG9GeUU2KIoRcYhjM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ba8fvna/3WFanRiXlS2HEf/5I5brRF8ayb6TLT3cOnWA/LSKTRAdoHdF491TOiNoN vGSmYWcl+xal9dc5bhDmQiCAlv6GMBB7nMV0c6Mtz0s75FbMKgBIvaoPHJuLC0p1WV RJDLWimTihnaJys2DZ9UTVq883EbxsZ2EVspQ4tw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jungyeon Yoon , Qu Wenruo , David Sterba , Sasha Levin Subject: [PATCH 4.4 74/99] btrfs: extent-tree: Make sure we only allocate extents from block groups with the same type Date: Thu, 3 Oct 2019 17:53:37 +0200 Message-Id: <20191003154333.343471275@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154252.297991283@linuxfoundation.org> References: <20191003154252.297991283@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qu Wenruo [ Upstream commit 2a28468e525f3924efed7f29f2bc5a2926e7e19a ] [BUG] With fuzzed image and MIXED_GROUPS super flag, we can hit the following BUG_ON(): kernel BUG at fs/btrfs/delayed-ref.c:491! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 1849 Comm: sync Tainted: G O 5.2.0-custom #27 RIP: 0010:update_existing_head_ref.cold+0x44/0x46 [btrfs] Call Trace: add_delayed_ref_head+0x20c/0x2d0 [btrfs] btrfs_add_delayed_tree_ref+0x1fc/0x490 [btrfs] btrfs_free_tree_block+0x123/0x380 [btrfs] __btrfs_cow_block+0x435/0x500 [btrfs] btrfs_cow_block+0x110/0x240 [btrfs] btrfs_search_slot+0x230/0xa00 [btrfs] ? __lock_acquire+0x105e/0x1e20 btrfs_insert_empty_items+0x67/0xc0 [btrfs] alloc_reserved_file_extent+0x9e/0x340 [btrfs] __btrfs_run_delayed_refs+0x78e/0x1240 [btrfs] ? kvm_clock_read+0x18/0x30 ? __sched_clock_gtod_offset+0x21/0x50 btrfs_run_delayed_refs.part.0+0x4e/0x180 [btrfs] btrfs_run_delayed_refs+0x23/0x30 [btrfs] btrfs_commit_transaction+0x53/0x9f0 [btrfs] btrfs_sync_fs+0x7c/0x1c0 [btrfs] ? __ia32_sys_fdatasync+0x20/0x20 sync_fs_one_sb+0x23/0x30 iterate_supers+0x95/0x100 ksys_sync+0x62/0xb0 __ia32_sys_sync+0xe/0x20 do_syscall_64+0x65/0x240 entry_SYSCALL_64_after_hwframe+0x49/0xbe [CAUSE] This situation is caused by several factors: - Fuzzed image The extent tree of this fs missed one backref for extent tree root. So we can allocated space from that slot. - MIXED_BG feature Super block has MIXED_BG flag. - No mixed block groups exists All block groups are just regular ones. This makes data space_info->block_groups[] contains metadata block groups. And when we reserve space for data, we can use space in metadata block group. Then we hit the following file operations: - fallocate We need to allocate data extents. find_free_extent() choose to use the metadata block to allocate space from, and choose the space of extent tree root, since its backref is missing. This generate one delayed ref head with is_data = 1. - extent tree update We need to update extent tree at run_delayed_ref time. This generate one delayed ref head with is_data = 0, for the same bytenr of old extent tree root. Then we trigger the BUG_ON(). [FIX] The quick fix here is to check block_group->flags before using it. The problem can only happen for MIXED_GROUPS fs. Regular filesystems won't have space_info with DATA|METADATA flag, and no way to hit the bug. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203255 Reported-by: Jungyeon Yoon Signed-off-by: Qu Wenruo Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/extent-tree.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/fs/btrfs/extent-tree.c b/fs/btrfs/extent-tree.c index df2bb4b61a00d..4c316ca3ee785 100644 --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -7168,6 +7168,14 @@ static noinline int find_free_extent(struct btrfs_root *orig_root, */ if ((flags & extra) && !(block_group->flags & extra)) goto loop; + + /* + * This block group has different flags than we want. + * It's possible that we have MIXED_GROUP flag but no + * block group is mixed. Just skip such block group. + */ + btrfs_release_block_group(block_group, delalloc); + continue; } have_block_group: -- 2.20.1