2018-04-03 17:16:55 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2007-06-12 13:07:21 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2007 Oracle. All rights reserved.
|
|
|
|
*/
|
|
|
|
|
2018-04-03 17:16:55 +00:00
|
|
|
#ifndef BTRFS_DISK_IO_H
|
|
|
|
#define BTRFS_DISK_IO_H
|
2007-02-02 14:18:22 +00:00
|
|
|
|
2008-12-08 21:46:26 +00:00
|
|
|
#define BTRFS_SUPER_MIRROR_MAX 3
|
|
|
|
#define BTRFS_SUPER_MIRROR_SHIFT 12
|
|
|
|
|
2017-06-15 23:48:05 +00:00
|
|
|
/*
|
|
|
|
* Fixed blocksize for all devices, applies to specific ways of reading
|
|
|
|
* metadata like superblock. Must meet the set_blocksize requirements.
|
|
|
|
*
|
|
|
|
* Do not change.
|
|
|
|
*/
|
|
|
|
#define BTRFS_BDEV_BLOCKSIZE (4096)
|
|
|
|
|
2008-12-08 21:46:26 +00:00
|
|
|
static inline u64 btrfs_sb_offset(int mirror)
|
|
|
|
{
|
2015-12-14 16:42:10 +00:00
|
|
|
u64 start = SZ_16K;
|
2008-12-08 21:46:26 +00:00
|
|
|
if (mirror)
|
|
|
|
return start << (BTRFS_SUPER_MIRROR_SHIFT * mirror);
|
|
|
|
return BTRFS_SUPER_INFO_OFFSET;
|
|
|
|
}
|
|
|
|
|
2008-03-24 19:01:56 +00:00
|
|
|
struct btrfs_device;
|
2008-03-24 19:02:07 +00:00
|
|
|
struct btrfs_fs_devices;
|
2022-11-15 09:44:04 +00:00
|
|
|
struct btrfs_tree_parent_check;
|
2007-03-22 16:13:20 +00:00
|
|
|
|
2020-01-24 14:33:00 +00:00
|
|
|
void btrfs_check_leaked_roots(struct btrfs_fs_info *fs_info);
|
2020-01-24 14:32:59 +00:00
|
|
|
void btrfs_init_fs_info(struct btrfs_fs_info *fs_info);
|
2019-03-20 13:58:13 +00:00
|
|
|
int btrfs_verify_level_key(struct extent_buffer *eb, int level,
|
btrfs: Check the first key and level for cached extent buffer
[BUG]
When reading a file from a fuzzed image, kernel can panic like:
BTRFS warning (device loop0): csum failed root 5 ino 270 off 0 csum 0x98f94189 expected csum 0x00000000 mirror 1
assertion failed: !memcmp_extent_buffer(b, &disk_key, offsetof(struct btrfs_leaf, items[0].key), sizeof(disk_key)), file: fs/btrfs/ctree.c, line: 2544
------------[ cut here ]------------
kernel BUG at fs/btrfs/ctree.h:3500!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:btrfs_search_slot.cold.24+0x61/0x63 [btrfs]
Call Trace:
btrfs_lookup_csum+0x52/0x150 [btrfs]
__btrfs_lookup_bio_sums+0x209/0x640 [btrfs]
btrfs_submit_bio_hook+0x103/0x170 [btrfs]
submit_one_bio+0x59/0x80 [btrfs]
extent_read_full_page+0x58/0x80 [btrfs]
generic_file_read_iter+0x2f6/0x9d0
__vfs_read+0x14d/0x1a0
vfs_read+0x8d/0x140
ksys_read+0x52/0xc0
do_syscall_64+0x60/0x210
entry_SYSCALL_64_after_hwframe+0x49/0xbe
[CAUSE]
The fuzzed image has a corrupted leaf whose first key doesn't match its
parent:
checksum tree key (CSUM_TREE ROOT_ITEM 0)
node 29741056 level 1 items 14 free 107 generation 19 owner CSUM_TREE
fs uuid 3381d111-94a3-4ac7-8f39-611bbbdab7e6
chunk uuid 9af1c3c7-2af5-488b-8553-530bd515f14c
...
key (EXTENT_CSUM EXTENT_CSUM 79691776) block 29761536 gen 19
leaf 29761536 items 1 free space 1726 generation 19 owner CSUM_TREE
leaf 29761536 flags 0x1(WRITTEN) backref revision 1
fs uuid 3381d111-94a3-4ac7-8f39-611bbbdab7e6
chunk uuid 9af1c3c7-2af5-488b-8553-530bd515f14c
item 0 key (EXTENT_CSUM EXTENT_CSUM 8798638964736) itemoff 1751 itemsize 2244
range start 8798638964736 end 8798641262592 length 2297856
When reading the above tree block, we have extent_buffer->refs = 2 in
the context:
- initial one from __alloc_extent_buffer()
alloc_extent_buffer()
|- __alloc_extent_buffer()
|- atomic_set(&eb->refs, 1)
- one being added to fs_info->buffer_radix
alloc_extent_buffer()
|- check_buffer_tree_ref()
|- atomic_inc(&eb->refs)
So if even we call free_extent_buffer() in read_tree_block or other
similar situation, we only decrease the refs by 1, it doesn't reach 0
and won't be freed right now.
The staled eb and its corrupted content will still be kept cached.
Furthermore, we have several extra cases where we either don't do first
key check or the check is not proper for all callers:
- scrub
We just don't have first key in this context.
- shared tree block
One tree block can be shared by several snapshot/subvolume trees.
In that case, the first key check for one subvolume doesn't apply to
another.
So for the above reasons, a corrupted extent buffer can sneak into the
buffer cache.
[FIX]
Call verify_level_key in read_block_for_search to do another
verification. For that purpose the function is exported.
Due to above reasons, although we can free corrupted extent buffer from
cache, we still need the check in read_block_for_search(), for scrub and
shared tree blocks.
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202755
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202757
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202759
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202761
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202767
Link: https://bugzilla.kernel.org/show_bug.cgi?id=202769
Reported-by: Yoon Jungyeon <jungyeon@gatech.edu>
CC: stable@vger.kernel.org # 4.19+
Signed-off-by: Qu Wenruo <wqu@suse.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2019-03-12 09:10:40 +00:00
|
|
|
struct btrfs_key *first_key, u64 parent_transid);
|
2018-03-29 01:08:11 +00:00
|
|
|
struct extent_buffer *read_tree_block(struct btrfs_fs_info *fs_info, u64 bytenr,
|
2022-09-14 05:32:50 +00:00
|
|
|
struct btrfs_tree_parent_check *check);
|
2016-06-22 22:54:24 +00:00
|
|
|
struct extent_buffer *btrfs_find_create_tree_block(
|
|
|
|
struct btrfs_fs_info *fs_info,
|
2020-11-05 15:45:20 +00:00
|
|
|
u64 bytenr, u64 owner_root,
|
|
|
|
int level);
|
2019-03-20 13:30:02 +00:00
|
|
|
void btrfs_clean_tree_block(struct extent_buffer *buf);
|
2020-11-18 23:06:20 +00:00
|
|
|
void btrfs_clear_oneshot_options(struct btrfs_fs_info *fs_info);
|
btrfs: lift read-write mount setup from mount and remount
Mounting rw and remounting from ro to rw naturally share invariants and
functionality which result in a correctly setup rw filesystem. Luckily,
there is even a strong unity in the code which implements them. In
mount's open_ctree, these operations mostly happen after an early return
for ro file systems, and in remount, they happen in a section devoted to
remounting ro->rw, after some remount specific validation passes.
However, there are unfortunately a few differences. There are small
deviations in the order of some of the operations, remount does not
start orphan cleanup in root_tree or fs_tree, remount does not create
the free space tree, and remount does not handle "one-shot" mount
options like clear_cache and uuid tree rescan.
Since we want to add building the free space tree to remount, and also
to start the same orphan cleanup process on a filesystem mounted as ro
then remounted rw, we would benefit from unifying the logic between the
two code paths.
This patch only lifts the existing common functionality, and leaves a
natural path for fixing the discrepancies.
Reviewed-by: Josef Bacik <josef@toxicpanda.com>
Signed-off-by: Boris Burkov <boris@bur.io>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2020-11-18 23:06:16 +00:00
|
|
|
int btrfs_start_pre_rw_mount(struct btrfs_fs_info *fs_info);
|
2022-10-18 01:56:38 +00:00
|
|
|
int btrfs_check_super_csum(struct btrfs_fs_info *fs_info,
|
|
|
|
const struct btrfs_super_block *disk_sb);
|
2019-10-01 17:57:35 +00:00
|
|
|
int __cold open_ctree(struct super_block *sb,
|
2011-11-17 06:10:02 +00:00
|
|
|
struct btrfs_fs_devices *fs_devices,
|
|
|
|
char *options);
|
2019-10-01 17:57:35 +00:00
|
|
|
void __cold close_ctree(struct btrfs_fs_info *fs_info);
|
btrfs: check superblock to ensure the fs was not modified at thaw time
[BACKGROUND]
There is an incident report that, one user hibernated the system, with
one btrfs on removable device still mounted.
Then by some incident, the btrfs got mounted and modified by another
system/OS, then back to the hibernated system.
After resuming from the hibernation, new write happened into the victim btrfs.
Now the fs is completely broken, since the underlying btrfs is no longer
the same one before the hibernation, and the user lost their data due to
various transid mismatch.
[REPRODUCER]
We can emulate the situation using the following small script:
truncate -s 1G $dev
mkfs.btrfs -f $dev
mount $dev $mnt
fsstress -w -d $mnt -n 500
sync
xfs_freeze -f $mnt
cp $dev $dev.backup
# There is no way to mount the same cloned fs on the same system,
# as the conflicting fsid will be rejected by btrfs.
# Thus here we have to wipe the fs using a different btrfs.
mkfs.btrfs -f $dev.backup
dd if=$dev.backup of=$dev bs=1M
xfs_freeze -u $mnt
fsstress -w -d $mnt -n 20
umount $mnt
btrfs check $dev
The final fsck will fail due to some tree blocks has incorrect fsid.
This is enough to emulate the problem hit by the unfortunate user.
[ENHANCEMENT]
Although such case should not be that common, it can still happen from
time to time.
From the view of btrfs, we can detect any unexpected super block change,
and if there is any unexpected change, we just mark the fs read-only,
and thaw the fs.
By this we can limit the damage to minimal, and I hope no one would lose
their data by this anymore.
Suggested-by: Goffredo Baroncelli <kreijack@libero.it>
Link: https://lore.kernel.org/linux-btrfs/83bf3b4b-7f4c-387a-b286-9251e3991e34@bluemole.com/
Reviewed-by: Anand Jain <anand.jain@oracle.com>
Signed-off-by: Qu Wenruo <wqu@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-08-24 12:16:22 +00:00
|
|
|
int btrfs_validate_super(struct btrfs_fs_info *fs_info,
|
|
|
|
struct btrfs_super_block *sb, int mirror_num);
|
btrfs: fix compat_ro checks against remount
[BUG]
Even with commit 81d5d61454c3 ("btrfs: enhance unsupported compat RO
flags handling"), btrfs can still mount a fs with unsupported compat_ro
flags read-only, then remount it RW:
# btrfs ins dump-super /dev/loop0 | grep compat_ro_flags -A 3
compat_ro_flags 0x403
( FREE_SPACE_TREE |
FREE_SPACE_TREE_VALID |
unknown flag: 0x400 )
# mount /dev/loop0 /mnt/btrfs
mount: /mnt/btrfs: wrong fs type, bad option, bad superblock on /dev/loop0, missing codepage or helper program, or other error.
dmesg(1) may have more information after failed mount system call.
^^^ RW mount failed as expected ^^^
# dmesg -t | tail -n5
loop0: detected capacity change from 0 to 1048576
BTRFS: device fsid cb5b82f5-0fdd-4d81-9b4b-78533c324afa devid 1 transid 7 /dev/loop0 scanned by mount (1146)
BTRFS info (device loop0): using crc32c (crc32c-intel) checksum algorithm
BTRFS info (device loop0): using free space tree
BTRFS error (device loop0): cannot mount read-write because of unknown compat_ro features (0x403)
BTRFS error (device loop0): open_ctree failed
# mount /dev/loop0 -o ro /mnt/btrfs
# mount -o remount,rw /mnt/btrfs
^^^ RW remount succeeded unexpectedly ^^^
[CAUSE]
Currently we use btrfs_check_features() to check compat_ro flags against
our current mount flags.
That function get reused between open_ctree() and btrfs_remount().
But for btrfs_remount(), the super block we passed in still has the old
mount flags, thus btrfs_check_features() still believes we're mounting
read-only.
[FIX]
Replace the existing @sb argument with @is_rw_mount.
As originally we only use @sb to determine if the mount is RW.
Now it's callers' responsibility to determine if the mount is RW, and
since there are only two callers, the check is pretty simple:
- caller in open_ctree()
Just pass !sb_rdonly().
- caller in btrfs_remount()
Pass !(*flags & SB_RDONLY), as our check should be against the new
flags.
Now we can correctly reject the RW remount:
# mount /dev/loop0 -o ro /mnt/btrfs
# mount -o remount,rw /mnt/btrfs
mount: /mnt/btrfs: mount point not mounted or bad option.
dmesg(1) may have more information after failed mount system call.
# dmesg -t | tail -n 1
BTRFS error (device loop0: state M): cannot mount read-write because of unknown compat_ro features (0x403)
Reported-by: Chung-Chiang Cheng <shepjeng@gmail.com>
Fixes: 81d5d61454c3 ("btrfs: enhance unsupported compat RO flags handling")
CC: stable@vger.kernel.org # 5.15+
Reviewed-by: Anand Jain <anand.jain@oracle.com>
Signed-off-by: Qu Wenruo <wqu@suse.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-12-21 23:59:17 +00:00
|
|
|
int btrfs_check_features(struct btrfs_fs_info *fs_info, bool is_rw_mount);
|
2017-02-10 18:04:32 +00:00
|
|
|
int write_all_supers(struct btrfs_fs_info *fs_info, int max_mirrors);
|
2020-02-13 15:24:32 +00:00
|
|
|
struct btrfs_super_block *btrfs_read_dev_super(struct block_device *bdev);
|
|
|
|
struct btrfs_super_block *btrfs_read_dev_one_super(struct block_device *bdev,
|
btrfs: check superblock to ensure the fs was not modified at thaw time
[BACKGROUND]
There is an incident report that, one user hibernated the system, with
one btrfs on removable device still mounted.
Then by some incident, the btrfs got mounted and modified by another
system/OS, then back to the hibernated system.
After resuming from the hibernation, new write happened into the victim btrfs.
Now the fs is completely broken, since the underlying btrfs is no longer
the same one before the hibernation, and the user lost their data due to
various transid mismatch.
[REPRODUCER]
We can emulate the situation using the following small script:
truncate -s 1G $dev
mkfs.btrfs -f $dev
mount $dev $mnt
fsstress -w -d $mnt -n 500
sync
xfs_freeze -f $mnt
cp $dev $dev.backup
# There is no way to mount the same cloned fs on the same system,
# as the conflicting fsid will be rejected by btrfs.
# Thus here we have to wipe the fs using a different btrfs.
mkfs.btrfs -f $dev.backup
dd if=$dev.backup of=$dev bs=1M
xfs_freeze -u $mnt
fsstress -w -d $mnt -n 20
umount $mnt
btrfs check $dev
The final fsck will fail due to some tree blocks has incorrect fsid.
This is enough to emulate the problem hit by the unfortunate user.
[ENHANCEMENT]
Although such case should not be that common, it can still happen from
time to time.
From the view of btrfs, we can detect any unexpected super block change,
and if there is any unexpected change, we just mark the fs read-only,
and thaw the fs.
By this we can limit the damage to minimal, and I hope no one would lose
their data by this anymore.
Suggested-by: Goffredo Baroncelli <kreijack@libero.it>
Link: https://lore.kernel.org/linux-btrfs/83bf3b4b-7f4c-387a-b286-9251e3991e34@bluemole.com/
Reviewed-by: Anand Jain <anand.jain@oracle.com>
Signed-off-by: Qu Wenruo <wqu@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-08-24 12:16:22 +00:00
|
|
|
int copy_num, bool drop_cache);
|
2016-06-22 01:16:51 +00:00
|
|
|
int btrfs_commit_super(struct btrfs_fs_info *fs_info);
|
2020-01-24 14:32:21 +00:00
|
|
|
struct btrfs_root *btrfs_read_tree_root(struct btrfs_root *tree_root,
|
|
|
|
struct btrfs_key *key);
|
2013-05-15 07:48:19 +00:00
|
|
|
int btrfs_insert_fs_root(struct btrfs_fs_info *fs_info,
|
|
|
|
struct btrfs_root *root);
|
2014-05-07 21:06:09 +00:00
|
|
|
void btrfs_free_fs_roots(struct btrfs_fs_info *fs_info);
|
2013-09-25 13:47:44 +00:00
|
|
|
|
|
|
|
struct btrfs_root *btrfs_get_fs_root(struct btrfs_fs_info *fs_info,
|
2020-05-15 17:35:55 +00:00
|
|
|
u64 objectid, bool check_ref);
|
2020-06-16 02:17:36 +00:00
|
|
|
struct btrfs_root *btrfs_get_new_fs_root(struct btrfs_fs_info *fs_info,
|
|
|
|
u64 objectid, dev_t anon_dev);
|
2020-10-19 20:02:31 +00:00
|
|
|
struct btrfs_root *btrfs_get_fs_root_commit_root(struct btrfs_fs_info *fs_info,
|
|
|
|
struct btrfs_path *path,
|
|
|
|
u64 objectid);
|
2021-11-05 20:45:51 +00:00
|
|
|
int btrfs_global_root_insert(struct btrfs_root *root);
|
|
|
|
void btrfs_global_root_delete(struct btrfs_root *root);
|
|
|
|
struct btrfs_root *btrfs_global_root(struct btrfs_fs_info *fs_info,
|
|
|
|
struct btrfs_key *key);
|
|
|
|
struct btrfs_root *btrfs_csum_root(struct btrfs_fs_info *fs_info, u64 bytenr);
|
|
|
|
struct btrfs_root *btrfs_extent_root(struct btrfs_fs_info *fs_info, u64 bytenr);
|
2022-09-14 15:06:29 +00:00
|
|
|
struct btrfs_root *btrfs_block_group_root(struct btrfs_fs_info *fs_info);
|
2013-09-25 13:47:44 +00:00
|
|
|
|
2020-01-24 14:32:53 +00:00
|
|
|
void btrfs_free_fs_info(struct btrfs_fs_info *fs_info);
|
2008-11-12 19:34:12 +00:00
|
|
|
int btrfs_cleanup_fs_roots(struct btrfs_fs_info *fs_info);
|
2016-06-22 22:54:24 +00:00
|
|
|
void btrfs_btree_balance_dirty(struct btrfs_fs_info *fs_info);
|
|
|
|
void btrfs_btree_balance_dirty_nodelay(struct btrfs_fs_info *fs_info);
|
2013-05-15 07:48:19 +00:00
|
|
|
void btrfs_drop_and_free_fs_root(struct btrfs_fs_info *fs_info,
|
|
|
|
struct btrfs_root *root);
|
2021-09-15 07:17:18 +00:00
|
|
|
int btrfs_validate_metadata_buffer(struct btrfs_bio *bbio,
|
2020-09-18 13:34:33 +00:00
|
|
|
struct page *page, u64 start, u64 end,
|
|
|
|
int mirror);
|
2022-10-27 00:41:32 +00:00
|
|
|
void btrfs_submit_metadata_bio(struct btrfs_inode *inode, struct bio *bio, int mirror_num);
|
2013-09-19 20:07:01 +00:00
|
|
|
#ifdef CONFIG_BTRFS_FS_RUN_SANITY_TESTS
|
2016-06-15 13:22:56 +00:00
|
|
|
struct btrfs_root *btrfs_alloc_dummy_root(struct btrfs_fs_info *fs_info);
|
2013-09-19 20:07:01 +00:00
|
|
|
#endif
|
|
|
|
|
2013-05-15 07:48:20 +00:00
|
|
|
/*
|
|
|
|
* This function is used to grab the root, and avoid it is freed when we
|
|
|
|
* access it. But it doesn't ensure that the tree is not dropped.
|
|
|
|
*
|
|
|
|
* If you want to ensure the whole tree is safe, you should use
|
|
|
|
* fs_info->subvol_srcu
|
|
|
|
*/
|
2020-01-24 14:33:01 +00:00
|
|
|
static inline struct btrfs_root *btrfs_grab_root(struct btrfs_root *root)
|
2013-05-15 07:48:20 +00:00
|
|
|
{
|
2020-01-24 14:32:26 +00:00
|
|
|
if (!root)
|
|
|
|
return NULL;
|
2017-03-03 08:55:18 +00:00
|
|
|
if (refcount_inc_not_zero(&root->refs))
|
2013-05-15 07:48:20 +00:00
|
|
|
return root;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-02-14 21:11:42 +00:00
|
|
|
void btrfs_put_root(struct btrfs_root *root);
|
2007-10-15 20:14:19 +00:00
|
|
|
void btrfs_mark_buffer_dirty(struct extent_buffer *buf);
|
2012-05-06 11:23:47 +00:00
|
|
|
int btrfs_buffer_uptodate(struct extent_buffer *buf, u64 parent_transid,
|
|
|
|
int atomic);
|
2022-09-14 05:32:50 +00:00
|
|
|
int btrfs_read_extent_buffer(struct extent_buffer *buf,
|
|
|
|
struct btrfs_tree_parent_check *check);
|
2022-10-27 00:22:19 +00:00
|
|
|
|
2023-01-21 06:50:17 +00:00
|
|
|
blk_status_t btree_csum_one_bio(struct bio *bio);
|
2021-02-04 10:22:17 +00:00
|
|
|
int btrfs_alloc_log_tree_node(struct btrfs_trans_handle *trans,
|
|
|
|
struct btrfs_root *root);
|
2008-09-05 20:13:11 +00:00
|
|
|
int btrfs_init_log_root_tree(struct btrfs_trans_handle *trans,
|
|
|
|
struct btrfs_fs_info *fs_info);
|
2009-01-21 17:54:03 +00:00
|
|
|
int btrfs_add_log_tree(struct btrfs_trans_handle *trans,
|
|
|
|
struct btrfs_root *root);
|
2016-07-21 00:44:12 +00:00
|
|
|
void btrfs_cleanup_dirty_bgs(struct btrfs_transaction *trans,
|
2016-06-22 22:54:24 +00:00
|
|
|
struct btrfs_fs_info *fs_info);
|
2012-03-01 16:24:58 +00:00
|
|
|
void btrfs_cleanup_one_transaction(struct btrfs_transaction *trans,
|
2016-06-22 22:54:24 +00:00
|
|
|
struct btrfs_fs_info *fs_info);
|
2011-09-13 10:44:20 +00:00
|
|
|
struct btrfs_root *btrfs_create_tree(struct btrfs_trans_handle *trans,
|
|
|
|
u64 objectid);
|
2015-08-19 07:54:15 +00:00
|
|
|
int btrfs_get_num_tolerated_disk_barrier_failures(u64 flags);
|
2020-12-07 15:32:33 +00:00
|
|
|
int btrfs_get_free_objectid(struct btrfs_root *root, u64 *objectid);
|
2020-12-07 15:32:32 +00:00
|
|
|
int btrfs_init_root_free_objectid(struct btrfs_root *root);
|
2009-02-12 19:09:45 +00:00
|
|
|
|
2007-02-02 14:18:22 +00:00
|
|
|
#endif
|