Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2269030iof; Wed, 8 Jun 2022 00:59:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxxdMJwvcJ38Et+oyWoeJQ4608ocvi2DNvFtTD+hfWrjtBf1KroUARSGVJ9Ijjklkk86fsL X-Received: by 2002:a05:6a00:b51:b0:51c:1219:569d with SMTP id p17-20020a056a000b5100b0051c1219569dmr15723541pfo.2.1654675198157; Wed, 08 Jun 2022 00:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654675198; cv=none; d=google.com; s=arc-20160816; b=pIinENtFNFDiXglPshpN231a9le/PVCycoRw1pNrUHWE3ENEB3Oxr1GWfFebYl33fw qN6smfR9KFEcjkRMzIkhuTEPJi8uK+b7/EQaXkzcnYOSPOzd+BuvhDtbavZVjIs6+pZ0 BA21fno3SMEiTEgMcGnqg4wprR5LqLLcYoTBstWjKjf/nE9fttJVkqswiNhkmemIaGry +rZpjsDTCG2HYNGAMqWb5jDce/pJ3W3RYFE6y8f8u7Q3uzvOPAiH0JsTcJaRZ2a9YszN RJXLi8vVh5jpqvXUWZFJu66IG/uomDpb+eAlvjZzzZf+21zsK3GxzKUMOoxkOtyLfbcm S13g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Mn7FH6K9HrGUbbXPWwfL9hBH4Ypu/m7csbz88Q2qXOw=; b=a2ZGUnhZMj2owhql0L5kS/lIvCJ9rT+V9eGHCjBojJ+lmh1o72UVluoriP00PKJDwy M9bT9HfqirTGZKgts8Fy8Ag793vVHOlGYbESIe9WmhJphsj+ZrD7CI8ikd7RtCNoIyNT ieDL8WXOQcqQXUK0/BXDhTkJudpBpznU3UaSFLUIQU6jSgoDTIT6bpTzwjqz0faE2ASP e5gr0pVkl/6Ij9xedjpe4jszwc+6buI0yxFEuHk66FXFEuVGdlBp0CbLGSa5qRAa4Bua KdtZVQNShdnE/DnFN5muBnfcS6DfMCHAaRDIOpFzFMAGqhUEJNNXPrAacRYH4Fkvqtpv GT4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=iR3A6lW8; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f9-20020a635549000000b003fc06718029si26565766pgm.324.2022.06.08.00.59.43; Wed, 08 Jun 2022 00:59:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=iR3A6lW8; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232975AbiFHGym (ORCPT + 99 others); Wed, 8 Jun 2022 02:54:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47582 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234934AbiFHGBt (ORCPT ); Wed, 8 Jun 2022 02:01:49 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3ADC0470C61 for ; Tue, 7 Jun 2022 21:51:07 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id 187so17335052pfu.9 for ; Tue, 07 Jun 2022 21:51:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=Mn7FH6K9HrGUbbXPWwfL9hBH4Ypu/m7csbz88Q2qXOw=; b=iR3A6lW8aIu+Rah6jFcQqDdTsRZvZAeoXZQnZLH6J4ePrFUfASJIkfill5LC4OnitF JtaUcotqSxg1Wj/VAsqLKaPosN9GMikbdQoEAS7LRQ+a08BvC8V/78+bhfoSi4/qHI/4 aQMp6aclP557spQuxp3NY8sCWPD9K8fU8HEO+jDDziycHJGk2c+1Pb9m9pjSr6qz67Nx /mVNizfy2tAywzdPo5Ici4AXjCbO4njZWAoQQNT+W/82uYXVFAzX2jtWUP6r0ipSpey4 EZocHgSTelLerm4tY3KROQ+01nm07nrcQZ0PicgAFwkqXwgRbcX5rh4ThBSOmcIaLZcf /AAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Mn7FH6K9HrGUbbXPWwfL9hBH4Ypu/m7csbz88Q2qXOw=; b=1nmMhfAYsPu1bh1byITx0cP+6h2ihJucGUf7SVQ/PUAh8rk9swJYMp1pqFwUl6nL1J vRdAewAPS54UfTOwtw+AK1S36eSqlY3jcFiCBq5VZdj0Kx0aHNoArU4wb/h9j99kyrHt VqdMZ8QYxfHB/HbHwLl4C15clviWMDOJqR8PNeUVwPUKyahdgJ0rf7gaphkQ/syoryng rrLFiG05ON8Ni3bJPl1OfI37wSEiPDqbJXdS8T8iDPca2hGwgUM4SqITSf8BdzZbG6SI XY2Onl3dEBNzvrcPchfZBM0ERbNIsR3boLFXubEt5CUmG93hvC55W46ao99wOX1ej7SD 0VaA== X-Gm-Message-State: AOAM533peHdw3kW0eX7YafKK9N0DncnPHXor7OXgsTM/AechEA97J+rF jJer5OXQgKcGXjmYOqxRj6w= X-Received: by 2002:a65:668b:0:b0:3f6:4026:97cd with SMTP id b11-20020a65668b000000b003f6402697cdmr28317740pgw.420.1654663866152; Tue, 07 Jun 2022 21:51:06 -0700 (PDT) Received: from localhost ([2406:7400:63:5d34:e6c2:4c64:12ae:aa11]) by smtp.gmail.com with ESMTPSA id pg11-20020a17090b1e0b00b001e88f2f3a31sm4333723pjb.57.2022.06.07.21.51.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:51:05 -0700 (PDT) Date: Wed, 8 Jun 2022 10:21:00 +0530 From: Ritesh Harjani To: Jan Kara Cc: Ted Tso , linux-ext4@vger.kernel.org Subject: Re: [PATCH 0/2] ext4: Fix possible fs corruption due to xattr races Message-ID: <20220608045100.uacl5c6usi7kl7gw@riteshh-domain> References: <20220606142215.17962-1-jack@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220606142215.17962-1-jack@suse.cz> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On 22/06/06 04:28PM, Jan Kara wrote: > Hello, > > I've tracked down the culprit of the jbd2 assertion Ritesh reported to me. In Hello Jan, Thanks for working on the problem and identifying the race. > the end it does not have much to do with jbd2 but rather points to a subtle > race in xattr code between xattr block reuse and xattr block freeing that can > result in fs corruption during journal replay. See patch 2/2 for more details. > These patches fix the problem. I have to say I'm not too happy with the special So while I was still reviewing this patch-set, I thought of giving a try with some stress test for xattrs (given that this is some sort of race which is not always easy to track down). So it seems it is easy to recreate the crash with stress-ng xattr test (even with your patches included). stress-ng --xattr 16 --timeout=10000s Hope this might help further narrow down the problem. root@qemu:/home/qemu# [ 257.862064] ------------[ cut here ]------------ [ 257.862834] kernel BUG at fs/jbd2/revoke.c:460! [ 257.863461] invalid opcode: 0000 [#1] PREEMPT SMP PTI [ 257.864084] CPU: 0 PID: 1499 Comm: stress-ng-xattr Not tainted 5.18.0-rc5+ #102 [ 257.864973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 [ 257.865972] RIP: 0010:jbd2_journal_cancel_revoke+0x12c/0x170 [ 257.866606] Code: 49 89 44 24 08 e8 b4 bf d8 00 48 8b 3d 2d f9 29 02 4c 89 e6 e8 c5 81 ea ff 48 8b 73 18 4c 89 ef e8 39 f8 [ 257.868547] RSP: 0018:ffffc9000170b9c0 EFLAGS: 00010286 [ 257.869106] RAX: ffff888101cadb00 RBX: ffff888121cb9f08 RCX: 0000000000000000 [ 257.869837] RDX: 0000000000000001 RSI: 000000000000242d RDI: 00000000ffffffff [ 257.870552] RBP: ffffc9000170b9e0 R08: ffffffff82cf2f20 R09: ffff888108831e10 [ 257.871264] R10: 00000000000000bb R11: 000000000105d68a R12: ffff888108831e10 [ 257.871977] R13: ffff888120937000 R14: ffff888108928500 R15: ffff888108831e18 [ 257.872689] FS: 00007ffff6b4dc00(0000) GS:ffff88842fc00000(0000) knlGS:0000000000000000 [ 257.873528] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 257.874101] CR2: 0000555556361220 CR3: 00000001201dc000 CR4: 00000000000006f0 [ 257.874813] Call Trace: [ 257.875077] [ 257.875313] do_get_write_access+0x3d9/0x460 [ 257.875753] jbd2_journal_get_write_access+0x54/0x80 [ 257.876260] __ext4_journal_get_write_access+0x8b/0x1b0 [ 257.876805] ? ext4_dirty_inode+0x70/0x80 [ 257.877255] ext4_xattr_block_set+0x935/0xfb0 [ 257.877709] ext4_xattr_set_handle+0x5c8/0x680 [ 257.878159] ext4_xattr_set+0xd5/0x180 [ 257.878540] ext4_xattr_user_set+0x35/0x40 [ 257.878957] __vfs_removexattr+0x5a/0x70 [ 257.879373] __vfs_removexattr_locked+0xc5/0x160 [ 257.879846] vfs_removexattr+0x5b/0x100 [ 257.880235] removexattr+0x61/0x90 [ 257.880611] ? kvm_clock_read+0x18/0x30 [ 257.881023] ? kvm_clock_get_cycles+0x9/0x10 [ 257.881492] ? ktime_get+0x3e/0xa0 [ 257.881856] ? native_apic_msr_read+0x40/0x40 [ 257.882302] ? lapic_next_event+0x21/0x30 [ 257.882716] ? clockevents_program_event+0x8f/0xe0 [ 257.883206] ? hrtimer_update_next_event+0x4b/0x70 [ 257.883698] ? debug_smp_processor_id+0x17/0x20 [ 257.884181] ? preempt_count_add+0x4d/0xc0 [ 257.884605] __x64_sys_fremovexattr+0x82/0xb0 [ 257.885063] do_syscall_64+0x3b/0x90 [ 257.885495] entry_SYSCALL_64_after_hwframe+0x44/0xae <...> [ 257.892816] -ritesh > mbcache interface I had to add because it just requires too deep knowledge of > how things work internally to get things right. If you get it wrong, you'll > have subtle races like above. But I didn't find a more transparent way to > fix this race. If someone has ideas, suggestions are welcome! > > Honza