From nobody Sat Feb 7 18:15:08 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 14E61222597 for ; Wed, 22 Oct 2025 03:06:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761102407; cv=none; b=jxJOR5R9wWKpvQce+md4YRWzuUxXceYG5K9p5naOnEq2pmCYob+NU90+X2GtJ5AGCAlNOQk/VJtt344ugNnxVLWj1jQmOplphNdwGH1hQyMeZDXgpxRyNxIFBW/m87CnUnFJ0/pkPJnyPOKvYk+QA4WCb4p49BwraYkETnCLiUM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761102407; c=relaxed/simple; bh=C2T8blYeAw5+4O5Gq/29YuKOCnPK4DgIvnbGqZbsyVg=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Kl99VovNhA9so89F45o/3lqZA0hJYAXMpMrxvqBaofZ+mJGDHd/YTwLUyYOtlbmTt8Psx1Olxo+PEi7xpJFw1RwTGlgdYxGYlOk3FUypCTlZ3Zq/syx/EbJ18qAZ4zc4pOWKvLCyyZQYjQtQriHW5Dm1yPq/gT9JZU0iY2dD/AQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=HXygpsp2; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="HXygpsp2" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B2708C4CEF1; Wed, 22 Oct 2025 03:06:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1761102406; bh=C2T8blYeAw5+4O5Gq/29YuKOCnPK4DgIvnbGqZbsyVg=; h=From:To:Cc:Subject:Date:From; b=HXygpsp2J9nP6sBQtmPhkNoc7SsMRsrrI4XlzGSrBcibleHaFVQTWHVR2Pn1kFHcy 7BnQuYCadTXBQnEzqzxOgJ6ERIzwHvzRmc/hoFLLm0BBb0oZ+RyCjNsDU5H4IYDd7o T+CcTp51cs7SE9kSymxfvD9GtkoGGgM+Ka+DBHbLC47icc+914Ub4LvxrZfAcik3y/ QmEv1IQfO2j+gQNs4V4Yhwckz9zorQvTPg9X0hKjpbmDH0cXWCsR+qzwaQRNdGH+YT R/ks3SKT41mFHhulTDHd+LX2ol8Ex+RnGiUJmU6lqDeJmRDpngdo0SnGndmcw53V+W xZ51FtuU0g1UA== From: Chao Yu To: jaegeuk@kernel.org Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Chao Yu , stable@kernel.org, "Bai, Shuangpeng" Subject: [PATCH v2] f2fs: fix to avoid updating compression context during writeback Date: Wed, 22 Oct 2025 11:06:36 +0800 Message-ID: <20251022030636.1194244-1-chao@kernel.org> X-Mailer: git-send-email 2.51.0.915.g61a8936c21-goog Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Bai, Shuangpeng reported a bug as below: Oops: divide error: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 11441 Comm: syz.0.46 Not tainted 6.17.0 #1 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/= 2014 RIP: 0010:f2fs_all_cluster_page_ready+0x106/0x550 fs/f2fs/compress.c:857 Call Trace: f2fs_write_cache_pages fs/f2fs/data.c:3078 [inline] __f2fs_write_data_pages fs/f2fs/data.c:3290 [inline] f2fs_write_data_pages+0x1c19/0x3600 fs/f2fs/data.c:3317 do_writepages+0x38e/0x640 mm/page-writeback.c:2634 filemap_fdatawrite_wbc mm/filemap.c:386 [inline] __filemap_fdatawrite_range mm/filemap.c:419 [inline] file_write_and_wait_range+0x2ba/0x3e0 mm/filemap.c:794 f2fs_do_sync_file+0x6e6/0x1b00 fs/f2fs/file.c:294 generic_write_sync include/linux/fs.h:3043 [inline] f2fs_file_write_iter+0x76e/0x2700 fs/f2fs/file.c:5259 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x7e9/0xe00 fs/read_write.c:686 ksys_write+0x19d/0x2d0 fs/read_write.c:738 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf7/0x470 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f The bug was triggered w/ below race condition: fsync setattr ioctl - f2fs_do_sync_file - file_write_and_wait_range - f2fs_write_cache_pages : inode is non-compressed : cc.cluster_size =3D F2FS_I(inode)->i_cluster_size =3D 0 - tag_pages_for_writeback - f2fs_setattr - truncate_setsize - f2fs_truncate - f2fs_fileattr_set - f2fs_setflags_common - set_compress_context : F2FS_I(inode)->i_cluster_size =3D 4 : set_inode_flag(inode, FI_COMPRESSED_FILE) - f2fs_compressed_file : return true - f2fs_all_cluster_page_ready : "pgidx % cc->cluster_size" trigger dividing 0 issue Let's change as below to fix this issue: - introduce a new atomic type variable .writeback in structure f2fs_inode_i= nfo to track the number of threads which calling f2fs_write_cache_pages(). - use .i_sem lock to protect .writeback update. - check .writeback before update compression context in f2fs_setflags_commo= n() to avoid race w/ ->writepages. Fixes: 4c8ff7095bef ("f2fs: support data compression") Cc: stable@kernel.org Reported-by: Bai, Shuangpeng Tested-by: Bai, Shuangpeng Closes: https://lore.kernel.org/lkml/44D8F7B3-68AD-425F-9915-65D27591F93F@p= su.edu Signed-off-by: Chao Yu --- v2: - add Tested-by flag for Bai, Shuangpeng fs/f2fs/data.c | 17 +++++++++++++++++ fs/f2fs/f2fs.h | 3 ++- fs/f2fs/file.c | 5 +++-- fs/f2fs/super.c | 1 + 4 files changed, 23 insertions(+), 3 deletions(-) diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c index 1e2e8ea81a6f..1f090c018f1b 100644 --- a/fs/f2fs/data.c +++ b/fs/f2fs/data.c @@ -3231,6 +3231,19 @@ static inline bool __should_serialize_io(struct inod= e *inode, return false; } =20 +static inline void account_writeback(struct inode *inode, bool inc) +{ + if (!f2fs_sb_has_compression(F2FS_I_SB(inode))) + return; + + f2fs_down_read(&F2FS_I(inode)->i_sem); + if (inc) + atomic_inc(&F2FS_I(inode)->writeback); + else + atomic_dec(&F2FS_I(inode)->writeback); + f2fs_up_read(&F2FS_I(inode)->i_sem); +} + static int __f2fs_write_data_pages(struct address_space *mapping, struct writeback_control *wbc, enum iostat_type io_type) @@ -3276,10 +3289,14 @@ static int __f2fs_write_data_pages(struct address_s= pace *mapping, locked =3D true; } =20 + account_writeback(inode, true); + blk_start_plug(&plug); ret =3D f2fs_write_cache_pages(mapping, wbc, io_type); blk_finish_plug(&plug); =20 + account_writeback(inode, false); + if (locked) mutex_unlock(&sbi->writepages); =20 diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h index d295dc6bad84..94eb9a2d3a73 100644 --- a/fs/f2fs/f2fs.h +++ b/fs/f2fs/f2fs.h @@ -947,6 +947,7 @@ struct f2fs_inode_info { unsigned char i_compress_level; /* compress level (lz4hc,zstd) */ unsigned char i_compress_flag; /* compress flag */ unsigned int i_cluster_size; /* cluster size */ + atomic_t writeback; /* count # of writeback thread */ =20 unsigned int atomic_write_cnt; loff_t original_i_size; /* original i_size before atomic write */ @@ -4671,7 +4672,7 @@ static inline bool f2fs_disable_compressed_file(struc= t inode *inode) f2fs_up_write(&fi->i_sem); return true; } - if (f2fs_is_mmap_file(inode) || + if (f2fs_is_mmap_file(inode) || atomic_read(&fi->writeback) || (S_ISREG(inode->i_mode) && F2FS_HAS_BLOCKS(inode))) { f2fs_up_write(&fi->i_sem); return false; diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c index c045e38e60ee..6d42e2d28861 100644 --- a/fs/f2fs/file.c +++ b/fs/f2fs/file.c @@ -2128,8 +2128,9 @@ static int f2fs_setflags_common(struct inode *inode, = u32 iflags, u32 mask) =20 f2fs_down_write(&fi->i_sem); if (!f2fs_may_compress(inode) || - (S_ISREG(inode->i_mode) && - F2FS_HAS_BLOCKS(inode))) { + atomic_read(&fi->writeback) || + (S_ISREG(inode->i_mode) && + F2FS_HAS_BLOCKS(inode))) { f2fs_up_write(&fi->i_sem); return -EINVAL; } diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 4c7da160ca27..f76ba2b08be0 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -1759,6 +1759,7 @@ static struct inode *f2fs_alloc_inode(struct super_bl= ock *sb) atomic_set(&fi->dirty_pages, 0); atomic_set(&fi->i_compr_blocks, 0); atomic_set(&fi->open_count, 0); + atomic_set(&fi->writeback, 0); init_f2fs_rwsem(&fi->i_sem); spin_lock_init(&fi->i_size_lock); INIT_LIST_HEAD(&fi->dirty_list); --=20 2.49.0