From: "Darrick J. Wong" <djwong@kernel.org>
To: Long Li <leo.lilong@huawei.com>
Cc: david@fromorbit.com, linux-xfs@vger.kernel.org,
houtao1@huawei.com, yi.zhang@huawei.com, guoxuenan@huawei.com
Subject: Re: [PATCH v2] xfs: fix ag count overflow during growfs
Date: Fri, 28 Apr 2023 11:24:52 -0700 [thread overview]
Message-ID: <20230428182452.GL59213@frogsfrogsfrogs> (raw)
In-Reply-To: <20230428072012.GA1748602@ceph-admin>
On Fri, Apr 28, 2023 at 03:20:12PM +0800, Long Li wrote:
> I found a corruption during growfs:
>
> XFS (loop0): Internal error agbno >= mp->m_sb.sb_agblocks at line 3661 of
> file fs/xfs/libxfs/xfs_alloc.c. Caller __xfs_free_extent+0x28e/0x3c0
> CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
> Call Trace:
> <TASK>
> dump_stack_lvl+0x50/0x70
> xfs_corruption_error+0x134/0x150
> __xfs_free_extent+0x2c1/0x3c0
> xfs_ag_extend_space+0x291/0x3e0
> xfs_growfs_data+0xd72/0xe90
> xfs_file_ioctl+0x5f9/0x14a0
> __x64_sys_ioctl+0x13e/0x1c0
> do_syscall_64+0x39/0x80
> entry_SYSCALL_64_after_hwframe+0x63/0xcd
> XFS (loop0): Corruption detected. Unmount and run xfs_repair
> XFS (loop0): Internal error xfs_trans_cancel at line 1097 of file
> fs/xfs/xfs_trans.c. Caller xfs_growfs_data+0x691/0xe90
> CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
> Call Trace:
> <TASK>
> dump_stack_lvl+0x50/0x70
> xfs_error_report+0x93/0xc0
> xfs_trans_cancel+0x2c0/0x350
> xfs_growfs_data+0x691/0xe90
> xfs_file_ioctl+0x5f9/0x14a0
> __x64_sys_ioctl+0x13e/0x1c0
> do_syscall_64+0x39/0x80
> entry_SYSCALL_64_after_hwframe+0x63/0xcd
> RIP: 0033:0x7f2d86706577
>
> The bug can be reproduced with the following sequence:
>
> # truncate -s 1073741824 xfs_test.img
> # mkfs.xfs -f -b size=1024 -d agcount=4 xfs_test.img
> # truncate -s 2305843009213693952 xfs_test.img
> # mount -o loop xfs_test.img /mnt/test
> # xfs_growfs -D 1125899907891200 /mnt/test
>
> The root cause is that during growfs, user space passed in a large value
> of newblcoks to xfs_growfs_data_private(), due to current sb_agblocks is
> too small, new AG count will exceed UINT_MAX. Because of AG number type
> is unsigned int and it would overflow, that caused nagcount much smaller
> than the actual value. During AG extent space, delta blocks in
> xfs_resizefs_init_new_ags() will much larger than the actual value due to
> incorrect nagcount, even exceed UINT_MAX. This will cause corruption and
> be detected in __xfs_free_extent. Fix it by add checks for nagcount
> overflow in xfs_growfs_data_private.
>
> Signed-off-by: Long Li <leo.lilong@huawei.com>
> ---
> v2:
> - Check for overflowing of agcount only in xfs_growfs_data_private
>
> fs/xfs/xfs_fsops.c | 3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/fs/xfs/xfs_fsops.c b/fs/xfs/xfs_fsops.c
> index 13851c0d640b..084c69a91937 100644
> --- a/fs/xfs/xfs_fsops.c
> +++ b/fs/xfs/xfs_fsops.c
> @@ -116,6 +116,9 @@ xfs_growfs_data_private(
> nb_div = nb;
> nb_mod = do_div(nb_div, mp->m_sb.sb_agblocks);
> nagcount = nb_div + (nb_mod != 0);
> + /* check for overflow */
> + if (nagcount < nb_div)
> + return -EINVAL;
> if (nb_mod && nb_mod < XFS_MIN_AG_BLOCKS) {
> nagcount--;
If in->newblocks (aka nb) is just large enough to cause an overflow in
nagcount /and/ 0 < nb_mod < XFS_MIN_AG_BLOCKS, then this change would
make the function return EINVAL whereas before it would've succeeded
because the overflow from the division would be canceled out by the
underflow from the subtraction, right?
Granted, that's a corner case of a corner case, but I don't want to
introduce error returns where there previously were none.
Also, do we want to return EINVAL here, as opposed to growing the
filesystem to up to the maximally allowed 0xFFFFFFFF AGs?
#define XFS_AGNUMBER_MAX ((xfs_agnumber_t)(-1U))
u64 nb_div = nb;
/* nb_div is updated in place */
nb_mod = do_div(nb_div, mp->m_sb.sb_agblocks);
if (nb_mod && nb_mod >= XFS_MIN_AG_BLOCKS) {
nb_div++;
} else if (nb_mod) {
nb = nb_div * mp->m_sb.sb_agblocks;
}
if (nb_div > XFS_AGNUMBER_MAX) {
nb_div = XFS_AGNUMBER_MAX;
nb = min(nb, nb_div * mp->m_sb.sb_agblocks);
}
nagcount = nb_div;
delta = nb - mp->m_sb.sb_dblocks;
--D
> nb = (xfs_rfsblock_t)nagcount * mp->m_sb.sb_agblocks;
> --
> 2.31.1
>
next prev parent reply other threads:[~2023-04-28 18:25 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-04-28 7:20 [PATCH v2] xfs: fix ag count overflow during growfs Long Li
2023-04-28 18:24 ` Darrick J. Wong [this message]
2023-05-02 7:35 ` Long Li
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230428182452.GL59213@frogsfrogsfrogs \
--to=djwong@kernel.org \
--cc=david@fromorbit.com \
--cc=guoxuenan@huawei.com \
--cc=houtao1@huawei.com \
--cc=leo.lilong@huawei.com \
--cc=linux-xfs@vger.kernel.org \
--cc=yi.zhang@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).