Skip to content
  1. Jun 01, 2022
  2. May 31, 2022
  3. May 30, 2022
  4. May 29, 2022
  5. May 28, 2022
  6. May 27, 2022
    • Chao Yu's avatar
      f2fs: fix to tag gcing flag on page during file defragment · 2d1fe8a8
      Chao Yu authored
      
      
      In order to garantee migrated data be persisted during checkpoint,
      otherwise out-of-order persistency between data and node may cause
      data corruption after SPOR.
      
      Signed-off-by: default avatarChao Yu <chao.yu@oppo.com>
      Signed-off-by: default avatarJaegeuk Kim <jaegeuk@kernel.org>
      2d1fe8a8
    • Yufen Yu's avatar
      f2fs: replace F2FS_I(inode) and sbi by the local variable · 054cb289
      Yufen Yu authored
      
      
      We have define 'fi' at the begin of the functions, just use it,
      rather than use F2FS_I(inode) again.
      
      Signed-off-by: default avatarYufen Yu <yuyufen@huawei.com>
      Reviewed-by: default avatarChao Yu <chao@kernel.org>
      [Jaegeuk Kim: replace sbi]
      Signed-off-by: default avatarJaegeuk Kim <jaegeuk@kernel.org>
      054cb289
    • David Howells's avatar
      pipe: Fix missing lock in pipe_resize_ring() · 189b0ddc
      David Howells authored
      
      
      pipe_resize_ring() needs to take the pipe->rd_wait.lock spinlock to
      prevent post_one_notification() from trying to insert into the ring
      whilst the ring is being replaced.
      
      The occupancy check must be done after the lock is taken, and the lock
      must be taken after the new ring is allocated.
      
      The bug can lead to an oops looking something like:
      
       BUG: KASAN: use-after-free in post_one_notification.isra.0+0x62e/0x840
       Read of size 4 at addr ffff88801cc72a70 by task poc/27196
       ...
       Call Trace:
        post_one_notification.isra.0+0x62e/0x840
        __post_watch_notification+0x3b7/0x650
        key_create_or_update+0xb8b/0xd20
        __do_sys_add_key+0x175/0x340
        __x64_sys_add_key+0xbe/0x140
        do_syscall_64+0x5c/0xc0
        entry_SYSCALL_64_after_hwframe+0x44/0xae
      
      Reported by Selim Enes Karaduman @Enesdex working with Trend Micro Zero
      Day Initiative.
      
      Fixes: c73be61c ("pipe: Add general notification queue support")
      Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-17291
      Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      189b0ddc
    • Steve French's avatar
      smb3: remove unneeded null check in cifs_readdir · 44a48081
      Steve French authored
      
      
      Coverity pointed out an unneeded check.
      
      Addresses-Coverity: 1518030 ("Null pointer dereferences")
      Reviewed-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      44a48081
    • Darrick J. Wong's avatar
      xfs: move xfs_attr_use_log_assist usage out of libxfs · efc2efeb
      Darrick J. Wong authored
      
      
      The LARP patchset added an awkward coupling point between libxfs and
      what would be libxlog, if the XFS log were actually its own library.
      Move the code that sets up logged xattr updates out of libxfs and into
      xfs_xattr.c so that libxfs no longer has to know about xlog_* functions.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      efc2efeb
    • Darrick J. Wong's avatar
      xfs: move xfs_attr_use_log_assist out of xfs_log.c · d9c61ccb
      Darrick J. Wong authored
      
      
      The LARP patchset added an awkward coupling point between libxfs and
      what would be libxlog, if the XFS log were actually its own library.
      Move the code that enables logged xattr updates out of "lib"xlog and into
      xfs_xattr.c so that it no longer has to know about xlog_* functions.
      
      While we're at it, give xfs_xattr.c its own header file.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      d9c61ccb
    • Darrick J. Wong's avatar
      xfs: warn about LARP once per mount · 202865cc
      Darrick J. Wong authored
      
      
      Since LARP is an experimental debug-only feature, we should try to warn
      about it being in use once per mount, not once per reboot.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      202865cc
    • Darrick J. Wong's avatar
      xfs: implement per-mount warnings for scrub and shrink usage · df5660cf
      Darrick J. Wong authored
      
      
      Currently, we don't have a consistent story around logging when an
      EXPERIMENTAL feature gets turned on at runtime -- online fsck and shrink
      log a message once per day across all mounts, and the recently merged
      LARP mode only ever does it once per insmod cycle or reboot.
      
      Because EXPERIMENTAL tags are supposed to go away eventually, convert
      the existing daily warnings into state flags that travel with the mount,
      and warn once per mount.  Making this an opstate flag means that we'll
      be able to capture the experimental usage in the ftrace output too.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      df5660cf
    • Darrick J. Wong's avatar
      xfs: don't log every time we clear the log incompat flags · 37403796
      Darrick J. Wong authored
      
      
      There's no need to spam the logs every time we clear the log incompat
      flags -- if someone is periodically using one of these features, they'll
      be cleared every time the log tries to clean itself, which can get
      pretty chatty:
      
      $ dmesg | grep -i clear
      [ 5363.894711] XFS (sdd): Clearing log incompat feature flags.
      [ 5365.157516] XFS (sdd): Clearing log incompat feature flags.
      [ 5369.388543] XFS (sdd): Clearing log incompat feature flags.
      [ 5371.281246] XFS (sdd): Clearing log incompat feature flags.
      
      These aren't high value messages either -- nothing's gone wrong, and
      nobody's trying anything tricky.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      37403796
    • Darrick J. Wong's avatar
      xfs: convert buf_cancel_table allocation to kmalloc_array · 910bbdf2
      Darrick J. Wong authored
      
      
      While we're messing around with how recovery allocates and frees the
      buffer cancellation table, convert the allocation to use kmalloc_array
      instead of the old kmem_alloc APIs, and make it handle a null return,
      even though that's not likely.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      910bbdf2
    • Darrick J. Wong's avatar
      xfs: don't leak xfs_buf_cancel structures when recovery fails · 8db074bd
      Darrick J. Wong authored
      
      
      If log recovery fails, we free the memory used by the buffer
      cancellation buckets, but we don't actually traverse each bucket list to
      free the individual xfs_buf_cancel objects.  This leads to a memory
      leak, as reported by kmemleak in xfs/051:
      
      unreferenced object 0xffff888103629560 (size 32):
        comm "mount", pid 687045, jiffies 4296935916 (age 10.752s)
        hex dump (first 32 bytes):
          08 d3 0a 01 00 00 00 00 08 00 00 00 01 00 00 00  ................
          d0 f5 0b 92 81 88 ff ff 80 64 64 25 81 88 ff ff  .........dd%....
        backtrace:
          [<ffffffffa0317c83>] kmem_alloc+0x73/0x140 [xfs]
          [<ffffffffa03234a9>] xlog_recover_buf_commit_pass1+0x139/0x200 [xfs]
          [<ffffffffa032dc27>] xlog_recover_commit_trans+0x307/0x350 [xfs]
          [<ffffffffa032df15>] xlog_recovery_process_trans+0xa5/0xe0 [xfs]
          [<ffffffffa032e12d>] xlog_recover_process_data+0x8d/0x140 [xfs]
          [<ffffffffa032e49d>] xlog_do_recovery_pass+0x19d/0x740 [xfs]
          [<ffffffffa032f22d>] xlog_do_log_recovery+0x6d/0x150 [xfs]
          [<ffffffffa032f343>] xlog_do_recover+0x33/0x1d0 [xfs]
          [<ffffffffa032faba>] xlog_recover+0xda/0x190 [xfs]
          [<ffffffffa03194bc>] xfs_log_mount+0x14c/0x360 [xfs]
          [<ffffffffa030bfed>] xfs_mountfs+0x50d/0xa60 [xfs]
          [<ffffffffa03124b5>] xfs_fs_fill_super+0x6a5/0x950 [xfs]
          [<ffffffff812b92a5>] get_tree_bdev+0x175/0x280
          [<ffffffff812b7c3a>] vfs_get_tree+0x1a/0x80
          [<ffffffff812e366f>] path_mount+0x6ff/0xaa0
          [<ffffffff812e3b13>] __x64_sys_mount+0x103/0x140
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      8db074bd
    • Darrick J. Wong's avatar
      xfs: refactor buffer cancellation table allocation · 27232349
      Darrick J. Wong authored
      
      
      Move the code that allocates and frees the buffer cancellation tables
      used by log recovery into the file that actually uses the tables.  This
      is a precursor to some cleanups and a memory leak fix.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      27232349
    • Darrick J. Wong's avatar
      xfs: don't leak btree cursor when insrec fails after a split · a54f78de
      Darrick J. Wong authored
      
      
      The recent patch to improve btree cycle checking caused a regression
      when I rebased the in-memory btree branch atop the 5.19 for-next branch,
      because in-memory short-pointer btrees do not have AG numbers.  This
      produced the following complaint from kmemleak:
      
      unreferenced object 0xffff88803d47dde8 (size 264):
        comm "xfs_io", pid 4889, jiffies 4294906764 (age 24.072s)
        hex dump (first 32 bytes):
          90 4d 0b 0f 80 88 ff ff 00 a0 bd 05 80 88 ff ff  .M..............
          e0 44 3a a0 ff ff ff ff 00 df 08 06 80 88 ff ff  .D:.............
        backtrace:
          [<ffffffffa0388059>] xfbtree_dup_cursor+0x49/0xc0 [xfs]
          [<ffffffffa029887b>] xfs_btree_dup_cursor+0x3b/0x200 [xfs]
          [<ffffffffa029af5d>] __xfs_btree_split+0x6ad/0x820 [xfs]
          [<ffffffffa029b130>] xfs_btree_split+0x60/0x110 [xfs]
          [<ffffffffa029f6da>] xfs_btree_make_block_unfull+0x19a/0x1f0 [xfs]
          [<ffffffffa029fada>] xfs_btree_insrec+0x3aa/0x810 [xfs]
          [<ffffffffa029fff3>] xfs_btree_insert+0xb3/0x240 [xfs]
          [<ffffffffa02cb729>] xfs_rmap_insert+0x99/0x200 [xfs]
          [<ffffffffa02cf142>] xfs_rmap_map_shared+0x192/0x5f0 [xfs]
          [<ffffffffa02cf60b>] xfs_rmap_map_raw+0x6b/0x90 [xfs]
          [<ffffffffa0384a85>] xrep_rmap_stash+0xd5/0x1d0 [xfs]
          [<ffffffffa0384dc0>] xrep_rmap_visit_bmbt+0xa0/0xf0 [xfs]
          [<ffffffffa0384fb6>] xrep_rmap_scan_iext+0x56/0xa0 [xfs]
          [<ffffffffa03850d8>] xrep_rmap_scan_ifork+0xd8/0x160 [xfs]
          [<ffffffffa0385195>] xrep_rmap_scan_inode+0x35/0x80 [xfs]
          [<ffffffffa03852ee>] xrep_rmap_find_rmaps+0x10e/0x270 [xfs]
      
      I noticed that xfs_btree_insrec has a bunch of debug code that return
      out of the function immediately, without freeing the "new" btree cursor
      that can be returned when _make_block_unfull calls xfs_btree_split.  Fix
      the error return in this function to free the btree cursor.
      
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      a54f78de
    • Darrick J. Wong's avatar
      xfs: purge dquots after inode walk fails during quotacheck · 86d40f1e
      Darrick J. Wong authored
      
      
      xfs/434 and xfs/436 have been reporting occasional memory leaks of
      xfs_dquot objects.  These tests themselves were the messenger, not the
      culprit, since they unload the xfs module, which trips the slub
      debugging code while tearing down all the xfs slab caches:
      
      =============================================================================
      BUG xfs_dquot (Tainted: G        W        ): Objects remaining in xfs_dquot on __kmem_cache_shutdown()
      -----------------------------------------------------------------------------
      
      Slab 0xffffea000606de00 objects=30 used=5 fp=0xffff888181b78a78 flags=0x17ff80000010200(slab|head|node=0|zone=2|lastcpupid=0xfff)
      CPU: 0 PID: 3953166 Comm: modprobe Tainted: G        W         5.18.0-rc6-djwx #rc6 d5824be9e46a2393677bda868f9b154d917ca6a7
      Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20171121_152543-x86-ol7-builder-01.us.oracle.com-4.el7.1 04/01/2014
      
      Since we don't generally rmmod the xfs module between fstests, this
      means that xfs/434 is really just the canary in the coal mine --
      something leaked a dquot, but we don't know who.  After days of pounding
      on fstests with kmemleak enabled, I finally got it to spit this out:
      
      unreferenced object 0xffff8880465654c0 (size 536):
        comm "u10:4", pid 88, jiffies 4294935810 (age 29.512s)
        hex dump (first 32 bytes):
          60 4a 56 46 80 88 ff ff 58 ea e4 5c 80 88 ff ff  `JVF....X..\....
          00 e0 52 49 80 88 ff ff 01 00 01 00 00 00 00 00  ..RI............
        backtrace:
          [<ffffffffa0740f6c>] xfs_dquot_alloc+0x2c/0x530 [xfs]
          [<ffffffffa07443df>] xfs_qm_dqread+0x6f/0x330 [xfs]
          [<ffffffffa07462a2>] xfs_qm_dqget+0x132/0x4e0 [xfs]
          [<ffffffffa0756bb0>] xfs_qm_quotacheck_dqadjust+0xa0/0x3e0 [xfs]
          [<ffffffffa075724d>] xfs_qm_dqusage_adjust+0x35d/0x4f0 [xfs]
          [<ffffffffa06c9068>] xfs_iwalk_ag_recs+0x348/0x5d0 [xfs]
          [<ffffffffa06c95d3>] xfs_iwalk_run_callbacks+0x273/0x540 [xfs]
          [<ffffffffa06c9e8d>] xfs_iwalk_ag+0x5ed/0x890 [xfs]
          [<ffffffffa06ca22f>] xfs_iwalk_ag_work+0xff/0x170 [xfs]
          [<ffffffffa06d22c9>] xfs_pwork_work+0x79/0x130 [xfs]
          [<ffffffff81170bb2>] process_one_work+0x672/0x1040
          [<ffffffff81171b1b>] worker_thread+0x59b/0xec0
          [<ffffffff8118711e>] kthread+0x29e/0x340
          [<ffffffff810032bf>] ret_from_fork+0x1f/0x30
      
      Now we know that quotacheck is at fault, but even this report was
      canaryish -- it was triggered by xfs/494, which doesn't actually mount
      any filesystems.  (kmemleak can be a little slow to notice leaks, even
      with fstests repeatedly whacking it to look for them.)  Looking at the
      *previous* fstest, however, showed that the test run before xfs/494 was
      xfs/117.  The tipoff to the problem is in this excerpt from dmesg:
      
      XFS (sda4): Quotacheck needed: Please wait.
      XFS (sda4): Metadata corruption detected at xfs_dinode_verify.part.0+0xdb/0x7b0 [xfs], inode 0x119 dinode
      XFS (sda4): Unmount and run xfs_repair
      XFS (sda4): First 128 bytes of corrupted metadata buffer:
      00000000: 49 4e 81 a4 03 02 00 00 00 00 00 00 00 00 00 00  IN..............
      00000010: 00 00 00 01 00 00 00 00 00 90 57 54 54 1a 4c 68  ..........WTT.Lh
      00000020: 81 f9 7d e1 6d ee 16 00 34 bd 7d e1 6d ee 16 00  ..}.m...4.}.m...
      00000030: 34 bd 7d e1 6d ee 16 00 00 00 00 00 00 00 00 00  4.}.m...........
      00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      00000050: 00 00 00 02 00 00 00 00 00 00 00 00 96 80 f3 ab  ................
      00000060: ff ff ff ff da 57 7b 11 00 00 00 00 00 00 00 03  .....W{.........
      00000070: 00 00 00 01 00 00 00 10 00 00 00 00 00 00 00 08  ................
      XFS (sda4): Quotacheck: Unsuccessful (Error -117): Disabling quotas.
      
      The dinode verifier decided that the inode was corrupt, which causes
      iget to return with EFSCORRUPTED.  Since this happened during
      quotacheck, it is obvious that the kernel aborted the inode walk on
      account of the corruption error and disabled quotas.  Unfortunately, we
      neglect to purge the dquot cache before doing that, which is how the
      dquots leaked.
      
      The problems started 10 years ago in commit b84a3a, when the dquot lists
      were converted to a radix tree, but the error handling behavior was not
      correctly preserved -- in that commit, if the bulkstat failed and
      usrquota was enabled, the bulkstat failure code would be overwritten by
      the result of flushing all the dquots to disk.  As long as that
      succeeds, we'd continue the quota mount as if everything were ok, but
      instead we're now operating with a corrupt inode and incorrect quota
      usage counts.  I didn't notice this bug in 2019 when I wrote commit
      ebd126a6, which changed quotacheck to skip the dqflush when the scan
      doesn't complete due to inode walk failures.
      
      Introduced-by: b84a3a96 ("xfs: remove the per-filesystem list of dquots")
      Fixes: ebd126a6 ("xfs: convert quotacheck to use the new iwalk functions")
      Signed-off-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Reviewed-by: default avatarDave Chinner <dchinner@redhat.com>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      86d40f1e
    • Dave Chinner's avatar
      xfs: assert in xfs_btree_del_cursor should take into account error · 56486f30
      Dave Chinner authored
      
      
      xfs/538 on a 1kB block filesystem failed with this assert:
      
      XFS: Assertion failed: cur->bc_btnum != XFS_BTNUM_BMAP || cur->bc_ino.allocated == 0 || xfs_is_shutdown(cur->bc_mp), file: fs/xfs/libxfs/xfs_btree.c, line: 448
      
      The problem was that an allocation failed unexpectedly in
      xfs_bmbt_alloc_block() after roughly 150,000 minlen allocation error
      injections, resulting in an EFSCORRUPTED error being returned to
      xfs_bmapi_write(). The error occurred on extent-to-btree format
      conversion allocating the new root block:
      
       RIP: 0010:xfs_bmbt_alloc_block+0x177/0x210
       Call Trace:
        <TASK>
        xfs_btree_new_iroot+0xdf/0x520
        xfs_btree_make_block_unfull+0x10d/0x1c0
        xfs_btree_insrec+0x364/0x790
        xfs_btree_insert+0xaa/0x210
        xfs_bmap_add_extent_hole_real+0x1fe/0x9a0
        xfs_bmapi_allocate+0x34c/0x420
        xfs_bmapi_write+0x53c/0x9c0
        xfs_alloc_file_space+0xee/0x320
        xfs_file_fallocate+0x36b/0x450
        vfs_fallocate+0x148/0x340
        __x64_sys_fallocate+0x3c/0x70
        do_syscall_64+0x35/0x80
        entry_SYSCALL_64_after_hwframe+0x44/0xa
      
      Why the allocation failed at this point is unknown, but is likely
      that we ran the transaction out of reserved space and filesystem out
      of space with bmbt blocks because of all the minlen allocations
      being done causing worst case fragmentation of a large allocation.
      
      Regardless of the cause, we've then called xfs_bmapi_finish() which
      calls xfs_btree_del_cursor(cur, error) to tear down the cursor.
      
      So we have a failed operation, error != 0, cur->bc_ino.allocated > 0
      and the filesystem is still up. The assert fails to take into
      account that allocation can fail with an error and the transaction
      teardown will shut the filesystem down if necessary. i.e. the
      assert needs to check "|| error != 0" as well, because at this point
      shutdown is pending because the current transaction is dirty....
      
      Signed-off-by: default avatarDave Chinner <dchinner@redhat.com>
      Reviewed-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      56486f30
    • Dave Chinner's avatar
      xfs: don't assert fail on perag references on teardown · 5b55cbc2
      Dave Chinner authored
      
      
      Not fatal, the assert is there to catch developer attention. I'm
      seeing this occasionally during recoveryloop testing after a
      shutdown, and I don't want this to stop an overnight recoveryloop
      run as it is currently doing.
      
      Convert the ASSERT to a XFS_IS_CORRUPT() check so it will dump a
      corruption report into the log and cause a test failure that way,
      but it won't stop the machine dead.
      
      Signed-off-by: default avatarDave Chinner <dchinner@redhat.com>
      Reviewed-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      5b55cbc2
    • Dave Chinner's avatar
      xfs: avoid unnecessary runtime sibling pointer endian conversions · 5672225e
      Dave Chinner authored
      
      
      Commit dc04db2a has caused a small aim7 regression, showing a
      small increase in CPU usage in __xfs_btree_check_sblock() as a
      result of the extra checking.
      
      This is likely due to the endian conversion of the sibling poitners
      being unconditional instead of relying on the compiler to endian
      convert the NULL pointer at compile time and avoiding the runtime
      conversion for this common case.
      
      Rework the checks so that endian conversion of the sibling pointers
      is only done if they are not null as the original code did.
      
      .... and these need to be "inline" because the compiler completely
      fails to inline them automatically like it should be doing.
      
      $ size fs/xfs/libxfs/xfs_btree.o*
         text	   data	    bss	    dec	    hex	filename
        51874	    240	      0	  52114	   cb92 fs/xfs/libxfs/xfs_btree.o.orig
        51562	    240	      0	  51802	   ca5a fs/xfs/libxfs/xfs_btree.o.inline
      
      Just when you think the tools have advanced sufficiently we don't
      have to care about stuff like this anymore, along comes a reminder
      that *our tools still suck*.
      
      Fixes: dc04db2a ("xfs: detect self referencing btree sibling pointers")
      Reported-by: default avatarkernel test robot <oliver.sang@intel.com>
      Signed-off-by: default avatarDave Chinner <dchinner@redhat.com>
      Reviewed-by: default avatarDarrick J. Wong <djwong@kernel.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Signed-off-by: default avatarDave Chinner <david@fromorbit.com>
      5672225e
  7. May 26, 2022
  8. May 25, 2022
    • Junxiao Bi via Ocfs2-devel's avatar
      ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock · 863e0d81
      Junxiao Bi via Ocfs2-devel authored
      When user_dlm_destroy_lock failed, it didn't clean up the flags it set
      before exit.  For USER_LOCK_IN_TEARDOWN, if this function fails because of
      lock is still in used, next time when unlink invokes this function, it
      will return succeed, and then unlink will remove inode and dentry if lock
      is not in used(file closed), but the dlm lock is still linked in dlm lock
      resource, then when bast come in, it will trigger a panic due to
      user-after-free.  See the following panic call trace.  To fix this,
      USER_LOCK_IN_TEARDOWN should be reverted if fail.  And also error should
      be returned if USER_LOCK_IN_TEARDOWN is set to let user know that unlink
      fail.
      
      For the case of ocfs2_dlm_unlock failure, besides USER_LOCK_IN_TEARDOWN,
      USER_LOCK_BUSY is also required to be cleared.  Even though spin lock is
      released in between, but USER_LOCK_IN_TEARDOWN is still set, for
      USER_LOCK_BUSY, if before every place that waits on this flag,
      USER_LOCK_IN_TEARDOWN is checked to bail out, that will make sure no flow
      waits on the busy flag set by user_dlm_destroy_lock(), then we can
      simplely revert USER_LOCK_BUSY when ocfs2_dlm_unlock fails.  Fix
      user_dlm_cluster_lock() which is the only function not following this.
      
      [  941.336392] (python,26174,16):dlmfs_unlink:562 ERROR: unlink
      004fb0000060000b5a90b8c847b72e1, error -16 from destroy
      [  989.757536] ------------[ cut here ]------------
      [  989.757709] kernel BUG at fs/ocfs2/dlmfs/userdlm.c:173!
      [  989.757876] invalid opcode: 0000 [#1] SMP
      [  989.758027] Modules linked in: ksplice_2zhuk2jr_ib_ipoib_new(O)
      ksplice_2zhuk2jr(O) mptctl mptbase xen_netback xen_blkback xen_gntalloc
      xen_gntdev xen_evtchn cdc_ether usbnet mii ocfs2 jbd2 rpcsec_gss_krb5
      auth_rpcgss nfsv4 nfsv3 nfs_acl nfs fscache lockd grace ocfs2_dlmfs
      ocfs2_stack_o2cb ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue configfs bnx2fc
      fcoe libfcoe libfc scsi_transport_fc sunrpc ipmi_devintf bridge stp llc
      rds_rdma rds bonding ib_sdp ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad
      rdma_cm ib_cm iw_cm falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE)
      mlx4_vnic falcon_kal(E) falcon_lsm_pinned_13402(E) mlx4_ib ib_sa ib_mad
      ib_core ib_addr xenfs xen_privcmd dm_multipath iTCO_wdt iTCO_vendor_support
      pcspkr sb_edac edac_core i2c_i801 lpc_ich mfd_core ipmi_ssif i2c_core ipmi_si
      ipmi_msghandler
      [  989.760686]  ioatdma sg ext3 jbd mbcache sd_mod ahci libahci ixgbe dca ptp
      pps_core vxlan udp_tunnel ip6_udp_tunnel megaraid_sas mlx4_core crc32c_intel
      be2iscsi bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi ipv6 cxgb3 mdio
      libiscsi_tcp qla4xxx iscsi_boot_sysfs libiscsi scsi_transport_iscsi wmi
      dm_mirror dm_region_hash dm_log dm_mod [last unloaded:
      ksplice_2zhuk2jr_ib_ipoib_old]
      [  989.761987] CPU: 10 PID: 19102 Comm: dlm_thread Tainted: P           OE
      4.1.12-124.57.1.el6uek.x86_64 #2
      [  989.762290] Hardware name: Oracle Corporation ORACLE SERVER
      X5-2/ASM,MOTHERBOARD,1U, BIOS 30350100 06/17/2021
      [  989.762599] task: ffff880178af6200 ti: ffff88017f7c8000 task.ti:
      ffff88017f7c8000
      [  989.762848] RIP: e030:[<ffffffffc07d4316>]  [<ffffffffc07d4316>]
      __user_dlm_queue_lockres.part.4+0x76/0x80 [ocfs2_dlmfs]
      [  989.763185] RSP: e02b:ffff88017f7cbcb8  EFLAGS: 00010246
      [  989.763353] RAX: 0000000000000000 RBX: ffff880174d48008 RCX:
      0000000000000003
      [  989.763565] RDX: 0000000000120012 RSI: 0000000000000003 RDI:
      ffff880174d48170
      [  989.763778] RBP: ffff88017f7cbcc8 R08: ffff88021f4293b0 R09:
      0000000000000000
      [  989.763991] R10: ffff880179c8c000 R11: 0000000000000003 R12:
      ffff880174d48008
      [  989.764204] R13: 0000000000000003 R14: ffff880179c8c000 R15:
      ffff88021db7a000
      [  989.764422] FS:  0000000000000000(0000) GS:ffff880247480000(0000)
      knlGS:ffff880247480000
      [  989.764685] CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  989.764865] CR2: ffff8000007f6800 CR3: 0000000001ae0000 CR4:
      0000000000042660
      [  989.765081] Stack:
      [  989.765167]  0000000000000003 ffff880174d48040 ffff88017f7cbd18
      ffffffffc07d455f
      [  989.765442]  ffff88017f7cbd88 ffffffff816fb639 ffff88017f7cbd38
      ffff8800361b5600
      [  989.765717]  ffff88021db7a000 ffff88021f429380 0000000000000003
      ffffffffc0453020
      [  989.765991] Call Trace:
      [  989.766093]  [<ffffffffc07d455f>] user_bast+0x5f/0xf0 [ocfs2_dlmfs]
      [  989.766287]  [<ffffffff816fb639>] ? schedule_timeout+0x169/0x2d0
      [  989.766475]  [<ffffffffc0453020>] ? o2dlm_lock_ast_wrapper+0x20/0x20
      [ocfs2_stack_o2cb]
      [  989.766738]  [<ffffffffc045303a>] o2dlm_blocking_ast_wrapper+0x1a/0x20
      [ocfs2_stack_o2cb]
      [  989.767010]  [<ffffffffc0864ec6>] dlm_do_local_bast+0x46/0xe0 [ocfs2_dlm]
      [  989.767217]  [<ffffffffc084f5cc>] ? dlm_lockres_calc_usage+0x4c/0x60
      [ocfs2_dlm]
      [  989.767466]  [<ffffffffc08501f1>] dlm_thread+0xa31/0x1140 [ocfs2_dlm]
      [  989.767662]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.767834]  [<ffffffff816f78ce>] ? __schedule+0x23e/0x810
      [  989.768006]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.768178]  [<ffffffff816f78ce>] ? __schedule+0x23e/0x810
      [  989.768349]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.768521]  [<ffffffff816f78ce>] ? __schedule+0x23e/0x810
      [  989.768693]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.768893]  [<ffffffff816f78ce>] ? __schedule+0x23e/0x810
      [  989.769067]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.769241]  [<ffffffff810ce4d0>] ? wait_woken+0x90/0x90
      [  989.769411]  [<ffffffffc084f7c0>] ? dlm_kick_thread+0x80/0x80 [ocfs2_dlm]
      [  989.769617]  [<ffffffff810a8bbb>] kthread+0xcb/0xf0
      [  989.769774]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.769945]  [<ffffffff816f78da>] ? __schedule+0x24a/0x810
      [  989.770117]  [<ffffffff810a8af0>] ? kthread_create_on_node+0x180/0x180
      [  989.770321]  [<ffffffff816fdaa1>] ret_from_fork+0x61/0x90
      [  989.770492]  [<ffffffff810a8af0>] ? kthread_create_on_node+0x180/0x180
      [  989.770689] Code: d0 00 00 00 f0 45 7d c0 bf 00 20 00 00 48 89 83 c0 00 00
      00 48 89 83 c8 00 00 00 e8 55 c1 8c c0 83 4b 04 10 48 83 c4 08 5b 5d c3 <0f>
      0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 55 41 54 53 48 83
      [  989.771892] RIP  [<ffffffffc07d4316>]
      __user_dlm_queue_lockres.part.4+0x76/0x80 [ocfs2_dlmfs]
      [  989.772174]  RSP <ffff88017f7cbcb8>
      [  989.772704] ---[ end trace ebd1e38cebcc93a8 ]---
      [  989.772907] Kernel panic - not syncing: Fatal exception
      [  989.773173] Kernel Offset: disabled
      
      Link: https://lkml.kernel.org/r/20220518235224.87100-2-junxiao.bi@oracle.com
      
      
      Signed-off-by: default avatarJunxiao Bi <junxiao.bi@oracle.com>
      Reviewed-by: default avatarJoseph Qi <joseph.qi@linux.alibaba.com>
      Cc: Mark Fasheh <mark@fasheh.com>
      Cc: Joel Becker <jlbec@evilplan.org>
      Cc: Joseph Qi <jiangqi903@gmail.com>
      Cc: Changwei Ge <gechangwei@live.cn>
      Cc: Gang He <ghe@suse.com>
      Cc: Jun Piao <piaojun@huawei.com>
      Cc: <stable@vger.kernel.org>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      863e0d81
    • Junxiao Bi's avatar
      ocfs2: dlmfs: don't clear USER_LOCK_ATTACHED when destroying lock · 0b6d14e3
      Junxiao Bi authored
      The following function is the only place that checks USER_LOCK_ATTACHED. 
      This flag is set when lock request is granted through user_ast() and only
      the following function will clear it.
      
      Checking of this flag here is to make sure ocfs2_dlm_unlock is not issued
      if this lock is never granted.  For example, lock file is created and then
      get removed, open file never happens.
      
      Clearing the flag here is not necessary because this is the only function
      that checks it, if another flow is executing user_dlm_destroy_lock(), it
      will bail out at the beginning because of USER_LOCK_IN_TEARDOWN and never
      check USER_LOCK_ATTACHED.  Drop the clear, so we don't need take care of
      it for the following error handling patch.
      
      int user_dlm_destroy_lock(struct user_lock_res *lockres)
      {
          ...
      
          status = 0;
          if (!(lockres->l_flags & USER_LOCK_ATTACHED)) {
              spin_unlock(&lockres->l_lock);
              goto bail;
          }
      
          lockres->l_flags &= ~USER_LOCK_ATTACHED;
          lockres->l_flags |= USER_LOCK_BUSY;
          spin_unlock(&lockres->l_lock);
      
      	status = ocfs2_dlm_unlock(conn, &lockres->l_lksb, DLM_LKF_VALBLK);
          if (status) {
              user_log_dlm_error("ocfs2_dlm_unlock", status, lockres);
              goto bail;
          }
      	...
      }
      
      V1 discussion with Joseph:
      https://lore.kernel.org/all/7b620c53-0c45-da2c-829e-26195cbe7d4e@linux.alibaba.com/T/
      
      Link: https://lkml.kernel.org/r/20220518235224.87100-1-junxiao.bi@oracle.com
      
      
      Signed-off-by: default avatarJunxiao Bi <junxiao.bi@oracle.com>
      Reviewed-by: default avatarJoseph Qi <joseph.qi@linux.alibaba.com>
      Cc: Mark Fasheh <mark@fasheh.com>
      Cc: Joel Becker <jlbec@evilplan.org>
      Cc: Junxiao Bi <junxiao.bi@oracle.com>
      Cc: Changwei Ge <gechangwei@live.cn>
      Cc: Gang He <ghe@suse.com>
      Cc: Jun Piao <piaojun@huawei.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      0b6d14e3
    • Luís Henriques's avatar
      ceph: fix decoding of client session messages flags · ea16567f
      Luís Henriques authored
      
      
      The cephfs kernel client started to show  the message:
      
       ceph: mds0 session blocklisted
      
      when mounting a filesystem.  This is due to the fact that the session
      messages are being incorrectly decoded: the skip needs to take into
      account the 'len'.
      
      While there, fixed some whitespaces too.
      
      Cc: stable@vger.kernel.org
      Fixes: e1c9788c ("ceph: don't rely on error_string to validate blocklisted session.")
      Signed-off-by: default avatarLuís Henriques <lhenriques@suse.de>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      ea16567f
    • Xiubo Li's avatar
      ceph: switch TASK_INTERRUPTIBLE to TASK_KILLABLE · 5e56776d
      Xiubo Li authored
      
      
      If the task is placed in the TASK_INTERRUPTIBLE state it will sleep
      until either something explicitly wakes it up, or a non-masked signal
      is received. Switch to TASK_KILLABLE to avoid the noises.
      
      Cc: Matthew Wilcox <willy@infradead.org>
      Signed-off-by: default avatarXiubo Li <xiubli@redhat.com>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      5e56776d
    • Colin Ian King's avatar
      ceph: remove redundant variable ino · 2ecd0edd
      Colin Ian King authored
      
      
      Variable ino is being assigned a value that is never read. The variable
      and assignment are redundant, remove it.
      
      Cleans up clang scan build warning:
      warning: Although the value stored to 'ino' is used in the enclosing
      expression, the value is never actually read from 'ino'
      [deadcode.DeadStores]
      
      Signed-off-by: default avatarColin Ian King <colin.i.king@gmail.com>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      2ecd0edd
    • Xiubo Li's avatar
      ceph: try to queue a writeback if revoking fails · a7437954
      Xiubo Li authored
      If the pagecaches writeback just finished and the i_wrbuffer_ref
      reaches zero it will try to trigger ceph_check_caps(). But if just
      before ceph_check_caps() the i_wrbuffer_ref could be increased
      again by mmap/cache write, then the Fwb revoke will fail.
      
      We need to try to queue a writeback in this case instead of
      triggering the writeback by BDI's delayed work per 5 seconds.
      
      URL: https://tracker.ceph.com/issues/46904
      URL: https://tracker.ceph.com/issues/55377
      
      
      Signed-off-by: default avatarXiubo Li <xiubli@redhat.com>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      a7437954
    • Luís Henriques's avatar
      ceph: fix statfs for subdir mounts · 55ab5520
      Luís Henriques authored
      When doing a mount using as base a directory that has 'max_bytes' quotas
      statfs uses that value as the total; if a subdirectory is used instead,
      the same 'max_bytes' too in statfs, unless there is another quota set.
      
      Unfortunately, if this subdirectory only has the 'max_files' quota set,
      then statfs uses the filesystem total.  Fix this by making sure we only
      lookup realms that contain the 'max_bytes' quota.
      
      Cc: Ryan Taylor <rptaylor@uvic.ca>
      URL: https://tracker.ceph.com/issues/55090
      
      
      Signed-off-by: default avatarLuís Henriques <lhenriques@suse.de>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Reviewed-by: default avatarXiubo Li <xiubli@redhat.com>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      55ab5520
    • Xiubo Li's avatar
      ceph: fix possible deadlock when holding Fwb to get inline_data · 825978fd
      Xiubo Li authored
      1, mount with wsync.
      2, create a file with O_RDWR, and the request was sent to mds.0:
      
         ceph_atomic_open()-->
           ceph_mdsc_do_request(openc)
           finish_open(file, dentry, ceph_open)-->
             ceph_open()-->
               ceph_init_file()-->
                 ceph_init_file_info()-->
                   ceph_uninline_data()-->
                   {
                     ...
                     if (inline_version == 1 || /* initial version, no data */
                         inline_version == CEPH_INLINE_NONE)
                           goto out_unlock;
                     ...
                   }
      
      The inline_version will be 1, which is the initial version for the
      new create file. And here the ci->i_inline_version will keep with 1,
      it's buggy.
      
      3, buffer write to the file immediately:
      
         ceph_write_iter()-->
           ceph_get_caps(file, need=Fw, want=Fb, ...);
           generic_perform_write()-->
             a_ops->write_begin()-->
               ceph_write_begin()-->
                 netfs_write_begin()-->
                   netfs_begin_read()-->
                     netfs_rreq_submit_slice()-->
                       netfs_read_from_server()-->
                         rreq->netfs_ops->issue_read()-->
                           ceph_netfs_issue_read()-->
                           {
                             ...
                             if (ci->i_inline_version != CEPH_INLINE_NONE &&
                                 ceph_netfs_issue_op_inline(subreq))
                               return;
                             ...
                           }
           ceph_put_cap_refs(ci, Fwb);
      
      The ceph_netfs_issue_op_inline() will send a getattr(Fsr) request to
      mds.1.
      
      4, then the mds.1 will request the rd lock for CInode::filelock from
      the auth mds.0, the mds.0 will do the CInode::filelock state transation
      from excl --> sync, but it need to revoke the Fxwb caps back from the
      clients.
      
      While the kernel client has aleady held the Fwb caps and waiting for
      the getattr(Fsr).
      
      It's deadlock!
      
      URL: https://tracker.ceph.com/issues/55377
      
      
      Signed-off-by: default avatarXiubo Li <xiubli@redhat.com>
      Reviewed-by: default avatarJeff Layton <jlayton@kernel.org>
      Signed-off-by: default avatarIlya Dryomov <idryomov@gmail.com>
      825978fd
Loading