Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp2889495rwb; Mon, 15 Aug 2022 13:23:19 -0700 (PDT) X-Google-Smtp-Source: AA6agR44Ga3qJ0uwURmWtuEFeeOstW3lxKEmg0IyWqUffkAyyGFblRGr90aWTJ+AU8FVLF1cvFyI X-Received: by 2002:a05:6402:916:b0:440:9bc5:da7a with SMTP id g22-20020a056402091600b004409bc5da7amr15960187edz.323.1660594998846; Mon, 15 Aug 2022 13:23:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660594998; cv=none; d=google.com; s=arc-20160816; b=evOuo6OXDosqIzo2kZhquo7sBFGmVmTOnvtXSkcNm47vcV1nyMZacE2G6SZAznUEMJ pNvf8LSQcEltXSJ4pfLL7+MXVmo0ksDSGOH5w8q9/ECjBhwQGiazERWFmEnAd98hN6OI Wb1l1ty5lSc9NO7wN0M9FCQZphcBpVLdHVU0POpwdlfM4+B7WfwqDbCs7uiXjMgwrpFj g2wyEf7Wm9Jj8KLKy3MDFks2EOHNcd4RHxVJUi/Ovt/6hG0N7b4n3mA41AeXvhSTtTSY PSZ5J/JYNjy7UJrT/KMN/BiyQj6nIktgCTy/ZdtAYkEvZqUXDYOFuN/ssZmtObsC1kgG mFxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Jvt0d9OQgssIwbsKIr4abrCJP3T5xa407uk5nrf60Ek=; b=zwGHEJaJM+5m+y9H6mLE55brx8W7iwi7cv5jApMeR1pMPldRmp3Nqpdli8crdEoGRQ Za41vW6WmS+FJ191NTMf9pJRgW4iagiMaywKgu0OysKONTZ0bEr2Ty8/53ZFn8h9CJj4 1ds5tRkUx9LWTpeof7eoahFO1xMrn0UVNnQTDnYAiA5hi9ixnLmyai0nXfKAHSz8S7aC /zS2FNx1eriGv8aNPWSCk0tIsaMoWc/NRgDPJ3Ecdri82Wpe3LaAMQ/M5S4iqpWsgyB1 qOVGXF88Z+KSYc8kCf6p5nYkYmpL+FyCBRwlhFhFIWlr0z2/YnNmyO8SspSxzecJp79M ykqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bXcjM3GZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jg40-20020a170907972800b006feb76dbd51si9215127ejc.289.2022.08.15.13.22.48; Mon, 15 Aug 2022 13:23:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bXcjM3GZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241879AbiHOUOM (ORCPT + 99 others); Mon, 15 Aug 2022 16:14:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52778 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346870AbiHOUM3 (ORCPT ); Mon, 15 Aug 2022 16:12:29 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B821686C07; Mon, 15 Aug 2022 11:58:31 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E43FDB81082; Mon, 15 Aug 2022 18:58:29 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5103BC433D7; Mon, 15 Aug 2022 18:58:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660589908; bh=JjfQgWZfUGBd8O4hLqu/UYGvGZuqcHisNT5EruWowCw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bXcjM3GZBTrVUXgG3hPLtOf0Yn1TU72x0NsTPXU0vptJOe7HjPaswn1dk+UyO1qxa 0vbJUE6J5p3x0S399bp0GZ3nRL/04ecvwzGzPzVv1PwFnQXv0en0PMCvrBQBM5KVKU Zytf7FNoziyihec9uLUzMO+TD8HlGVxL0RpP3U1I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qu Wenruo , David Sterba Subject: [PATCH 5.18 0087/1095] btrfs: reject log replay if there is unsupported RO compat flag Date: Mon, 15 Aug 2022 19:51:26 +0200 Message-Id: <20220815180433.111113001@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220815180429.240518113@linuxfoundation.org> References: <20220815180429.240518113@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qu Wenruo commit dc4d31684974d140250f3ee612c3f0cab13b3146 upstream. [BUG] If we have a btrfs image with dirty log, along with an unsupported RO compatible flag: log_root 30474240 ... compat_flags 0x0 compat_ro_flags 0x40000003 ( FREE_SPACE_TREE | FREE_SPACE_TREE_VALID | unknown flag: 0x40000000 ) Then even if we can only mount it RO, we will still cause metadata update for log replay: BTRFS info (device dm-1): flagging fs with big metadata feature BTRFS info (device dm-1): using free space tree BTRFS info (device dm-1): has skinny extents BTRFS info (device dm-1): start tree-log replay This is definitely against RO compact flag requirement. [CAUSE] RO compact flag only forces us to do RO mount, but we will still do log replay for plain RO mount. Thus this will result us to do log replay and update metadata. This can be very problematic for new RO compat flag, for example older kernel can not understand v2 cache, and if we allow metadata update on RO mount and invalidate/corrupt v2 cache. [FIX] Just reject the mount unless rescue=nologreplay is provided: BTRFS error (device dm-1): cannot replay dirty log with unsupport optional features (0x40000000), try rescue=nologreplay instead We don't want to set rescue=nologreply directly, as this would make the end user to read the old data, and cause confusion. Since the such case is really rare, we're mostly fine to just reject the mount with an error message, which also includes the proper workaround. CC: stable@vger.kernel.org #4.9+ Signed-off-by: Qu Wenruo Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/disk-io.c | 14 ++++++++++++++ 1 file changed, 14 insertions(+) --- a/fs/btrfs/disk-io.c +++ b/fs/btrfs/disk-io.c @@ -3654,6 +3654,20 @@ int __cold open_ctree(struct super_block err = -EINVAL; goto fail_alloc; } + /* + * We have unsupported RO compat features, although RO mounted, we + * should not cause any metadata write, including log replay. + * Or we could screw up whatever the new feature requires. + */ + if (unlikely(features && btrfs_super_log_root(disk_super) && + !btrfs_test_opt(fs_info, NOLOGREPLAY))) { + btrfs_err(fs_info, +"cannot replay dirty log with unsupported compat_ro features (0x%llx), try rescue=nologreplay", + features); + err = -EINVAL; + goto fail_alloc; + } + if (sectorsize < PAGE_SIZE) { struct btrfs_subpage_info *subpage_info;