Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3407063rwa; Tue, 23 Aug 2022 04:22:49 -0700 (PDT) X-Google-Smtp-Source: AA6agR7T5Ro0hlbWghpZPoRvDNT8BoguPr4GBfxgM9ozqi4hiqZGhfDMPgQF/VxrObAAb0aWmnv9 X-Received: by 2002:a17:90b:3b46:b0:1fb:5993:f893 with SMTP id ot6-20020a17090b3b4600b001fb5993f893mr2860552pjb.229.1661253768823; Tue, 23 Aug 2022 04:22:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661253768; cv=none; d=google.com; s=arc-20160816; b=fccFZtoLTDrowoxcb37tt0oUY3bRce0skYLHdD25U3ZufXHaWAXBlB5rR+h1Y4t90T SBHPBV4HPUlLpj9wtHPxA4UElEXqN7dlkxni443oHTgeCk0KCUHoMo+fmHZtx8ubs2Pc /tHm/obHrzTOxzOj8I8flkChkM+8pXucP+WnvjNAnKtgLgtHcEvZRQjKLxxpVWtB7qYE 7Glvr5CmRS4Hlev4YatkwEFAd3WTdCQriUfKla1AJcR0hjXYhNrYtdZSEoXK8Mr2NFrz FfKCwyiLAbd+St7crDBGv6B8kjobshEPnOxAgVI69FJNYP5t1O7gLzrboHrFmmE3XO4/ VcSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UG+XYlGfqdqdqnvdCFgK7oqUJmj63694nkosKaLGhHM=; b=kCt5c81M5lnsw7GaziO81z98lVSb1Q3GzBYl6HbKicOjH6ECIsHaubqgX3Tu86ahn2 tyLxt8cceG8eZftsJDqggBWST+RWSzo/75a02XxXv63FVcDn9SJwaeZUzurTaotNeMhS P/SA+GqKw7inDr0CjurSYKAGxe22W2sqZfuqjf1MlSJALACBevKhbu9lC9HKji0YZMrl 8VhJz1v1IN7+qohgbLpMmhTID5/tJUvqxChjMhe/ZpZRHq6TyLYuBQu7ytBc9NI2KtyK D/1Gs64RZe1AE8A8QJHISqohA1lXj7xMlYGAJeyEErjhJPi1zURtKEG8YfybQoSuyxvx fN4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CQHOkOIV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id rm2-20020a17090b3ec200b001f3e54ca93asi13065687pjb.76.2022.08.23.04.22.38; Tue, 23 Aug 2022 04:22:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CQHOkOIV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356808AbiHWKwN (ORCPT + 99 others); Tue, 23 Aug 2022 06:52:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54380 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1355770AbiHWKoR (ORCPT ); Tue, 23 Aug 2022 06:44:17 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 99C2B868B6; Tue, 23 Aug 2022 02:10:32 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 884E260DF6; Tue, 23 Aug 2022 09:10:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 93645C433D6; Tue, 23 Aug 2022 09:10:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661245831; bh=3fugVo6TbpnGxFPfuFIJRDl1aYklh6ri5IkSSvgTZ0c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CQHOkOIVX9OMZXd9YEy3B2rZRFgWpYTvp4avVKAQOtSFi1Yr3z6Ibsa9z+8wHfXO5 1+fhsmk29k3M4qdbyS9ea3J/6fqj0XxAY+NdfWmR0Firt4q5CxaWvnXHNS2EiL2I4z JDMYoUsNrlTcXs4brKy+B7+CQKsvTlybxlGX46wk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qu Wenruo , David Sterba Subject: [PATCH 4.19 202/287] btrfs: reject log replay if there is unsupported RO compat flag Date: Tue, 23 Aug 2022 10:26:11 +0200 Message-Id: <20220823080107.675539451@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080100.268827165@linuxfoundation.org> References: <20220823080100.268827165@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qu Wenruo commit dc4d31684974d140250f3ee612c3f0cab13b3146 upstream. [BUG] If we have a btrfs image with dirty log, along with an unsupported RO compatible flag: log_root 30474240 ... compat_flags 0x0 compat_ro_flags 0x40000003 ( FREE_SPACE_TREE | FREE_SPACE_TREE_VALID | unknown flag: 0x40000000 ) Then even if we can only mount it RO, we will still cause metadata update for log replay: BTRFS info (device dm-1): flagging fs with big metadata feature BTRFS info (device dm-1): using free space tree BTRFS info (device dm-1): has skinny extents BTRFS info (device dm-1): start tree-log replay This is definitely against RO compact flag requirement. [CAUSE] RO compact flag only forces us to do RO mount, but we will still do log replay for plain RO mount. Thus this will result us to do log replay and update metadata. This can be very problematic for new RO compat flag, for example older kernel can not understand v2 cache, and if we allow metadata update on RO mount and invalidate/corrupt v2 cache. [FIX] Just reject the mount unless rescue=nologreplay is provided: BTRFS error (device dm-1): cannot replay dirty log with unsupport optional features (0x40000000), try rescue=nologreplay instead We don't want to set rescue=nologreply directly, as this would make the end user to read the old data, and cause confusion. Since the such case is really rare, we're mostly fine to just reject the mount with an error message, which also includes the proper workaround. CC: stable@vger.kernel.org #4.9+ Signed-off-by: Qu Wenruo Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/disk-io.c | 14 ++++++++++++++ 1 file changed, 14 insertions(+) --- a/fs/btrfs/disk-io.c +++ b/fs/btrfs/disk-io.c @@ -2920,6 +2920,20 @@ int open_ctree(struct super_block *sb, err = -EINVAL; goto fail_alloc; } + /* + * We have unsupported RO compat features, although RO mounted, we + * should not cause any metadata write, including log replay. + * Or we could screw up whatever the new feature requires. + */ + if (unlikely(features && btrfs_super_log_root(disk_super) && + !btrfs_test_opt(fs_info, NOLOGREPLAY))) { + btrfs_err(fs_info, +"cannot replay dirty log with unsupported compat_ro features (0x%llx), try rescue=nologreplay", + features); + err = -EINVAL; + goto fail_alloc; + } + ret = btrfs_init_workqueues(fs_info, fs_devices); if (ret) {