Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp72777ybp; Thu, 3 Oct 2019 10:20:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqwinKun66sRz5r2UD3OftC87qlScfrGHSmAPXYwGrneSXz/hrsrc0zFpc/kocDJsrfufeEA X-Received: by 2002:a50:918d:: with SMTP id g13mr10722985eda.64.1570123209596; Thu, 03 Oct 2019 10:20:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570123209; cv=none; d=google.com; s=arc-20160816; b=RigFWsx2JZ+q5qMuhgYvtAXj6b+BxbDu9R1OJGVmTwiDQFx1pNyyVETQ2sNlVPnMpx KX10nD02MW91oWgq7jju/dLsfvV7Yw8tEo9y0vdyyxU6HwNQKekk0XkkZFn0wX3WN/id T7aM0fm5K70K0vSG3OaMO8BOTrBNncM4DY6UUjlXrSBctXgmzMhoDePvkg1SO12OmBK3 jXg8XrwcwiDprJGZ2wNBlP92KiR5IRaVH2JpU8hsbnD4W2IqfJVOVTOjVrF3NSeoWqrZ xywb9AAYiQRZ57+KXs0OwhlSNs6oXTPTbMElRwxMLhnygY+q+5+kgNDtheWpSimZiJ7I SiFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pX6uvHY592sIxgmaLQAApdAxlnfk/HoGMUprmz0rjPY=; b=Zb210rnmc8hPeIHBIWMZGitgPlPnXSKQgu4MmGVOSCSt6k9CsWBV3LS6BlpW5QH2/V cQyMc0QuF58ExNImMU7vq/sTcBmX/9oksyKNHgNjixpZuDY/ILY2QtZ+QC7yBaJsPh50 ElQJAVtlwC5USc3hJZjd5FhfFqIJ/E+L2iLMVUbctBDE8dpauMmt8ur1wyHbyWR+ezSd x2AJKaB9ibs24e8NxCC8fgZHGeKUe5SDFYTZAk8HNq4RFXeu8mydZb8X8q55b0U25arg JW4rOKVDib5ENW4dnL7yPjVDyov5I1agMvRpH8eDjn2eEwEG7EkGmEqs0P8qhWZ6diTo Yz6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2F5vFVfB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n26si1593446eja.273.2019.10.03.10.19.45; Thu, 03 Oct 2019 10:20:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2F5vFVfB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390072AbfJCQVJ (ORCPT + 99 others); Thu, 3 Oct 2019 12:21:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:49142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389203AbfJCQVB (ORCPT ); Thu, 3 Oct 2019 12:21:01 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A08C2054F; Thu, 3 Oct 2019 16:21:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570119660; bh=u4jJoFxstkACUpvEvOQXcOr7ujV/T47HCtoPgXtVEIA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2F5vFVfBad8htHcvYJQaY2RGo672YTfOhUvWrpmqz8akW30FSktoW6tdyIRbFUVYs niCSevcGWMSuW9uaYMGFdwPuGZbs6mfMZ1Cp3lm3sM8NUC40cQZOUsHHY6PoUiQgc3 Fv03ZDL/HG48uXSxcJS4t16hJaK72sgoxb1NMNp8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jungyeon Yoon , Qu Wenruo , David Sterba , Sasha Levin Subject: [PATCH 4.19 145/211] btrfs: extent-tree: Make sure we only allocate extents from block groups with the same type Date: Thu, 3 Oct 2019 17:53:31 +0200 Message-Id: <20191003154520.635706085@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154447.010950442@linuxfoundation.org> References: <20191003154447.010950442@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qu Wenruo [ Upstream commit 2a28468e525f3924efed7f29f2bc5a2926e7e19a ] [BUG] With fuzzed image and MIXED_GROUPS super flag, we can hit the following BUG_ON(): kernel BUG at fs/btrfs/delayed-ref.c:491! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 1849 Comm: sync Tainted: G O 5.2.0-custom #27 RIP: 0010:update_existing_head_ref.cold+0x44/0x46 [btrfs] Call Trace: add_delayed_ref_head+0x20c/0x2d0 [btrfs] btrfs_add_delayed_tree_ref+0x1fc/0x490 [btrfs] btrfs_free_tree_block+0x123/0x380 [btrfs] __btrfs_cow_block+0x435/0x500 [btrfs] btrfs_cow_block+0x110/0x240 [btrfs] btrfs_search_slot+0x230/0xa00 [btrfs] ? __lock_acquire+0x105e/0x1e20 btrfs_insert_empty_items+0x67/0xc0 [btrfs] alloc_reserved_file_extent+0x9e/0x340 [btrfs] __btrfs_run_delayed_refs+0x78e/0x1240 [btrfs] ? kvm_clock_read+0x18/0x30 ? __sched_clock_gtod_offset+0x21/0x50 btrfs_run_delayed_refs.part.0+0x4e/0x180 [btrfs] btrfs_run_delayed_refs+0x23/0x30 [btrfs] btrfs_commit_transaction+0x53/0x9f0 [btrfs] btrfs_sync_fs+0x7c/0x1c0 [btrfs] ? __ia32_sys_fdatasync+0x20/0x20 sync_fs_one_sb+0x23/0x30 iterate_supers+0x95/0x100 ksys_sync+0x62/0xb0 __ia32_sys_sync+0xe/0x20 do_syscall_64+0x65/0x240 entry_SYSCALL_64_after_hwframe+0x49/0xbe [CAUSE] This situation is caused by several factors: - Fuzzed image The extent tree of this fs missed one backref for extent tree root. So we can allocated space from that slot. - MIXED_BG feature Super block has MIXED_BG flag. - No mixed block groups exists All block groups are just regular ones. This makes data space_info->block_groups[] contains metadata block groups. And when we reserve space for data, we can use space in metadata block group. Then we hit the following file operations: - fallocate We need to allocate data extents. find_free_extent() choose to use the metadata block to allocate space from, and choose the space of extent tree root, since its backref is missing. This generate one delayed ref head with is_data = 1. - extent tree update We need to update extent tree at run_delayed_ref time. This generate one delayed ref head with is_data = 0, for the same bytenr of old extent tree root. Then we trigger the BUG_ON(). [FIX] The quick fix here is to check block_group->flags before using it. The problem can only happen for MIXED_GROUPS fs. Regular filesystems won't have space_info with DATA|METADATA flag, and no way to hit the bug. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203255 Reported-by: Jungyeon Yoon Signed-off-by: Qu Wenruo Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/extent-tree.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/fs/btrfs/extent-tree.c b/fs/btrfs/extent-tree.c index 88c939f7aad96..e49e29288049a 100644 --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -7367,6 +7367,14 @@ static noinline int find_free_extent(struct btrfs_fs_info *fs_info, */ if ((flags & extra) && !(block_group->flags & extra)) goto loop; + + /* + * This block group has different flags than we want. + * It's possible that we have MIXED_GROUP flag but no + * block group is mixed. Just skip such block group. + */ + btrfs_release_block_group(block_group, delalloc); + continue; } have_block_group: -- 2.20.1