Received: by 10.213.65.68 with SMTP id h4csp2153920imn; Sun, 8 Apr 2018 21:06:17 -0700 (PDT) X-Google-Smtp-Source: AIpwx48XHi2jm5hMMichbOY39rgfgLNFyCuLA+dxHmrKGTFPco/jGx79acJHsCV3zz7b8/Fr2SJZ X-Received: by 2002:a17:902:481:: with SMTP id e1-v6mr36935571ple.377.1523246777394; Sun, 08 Apr 2018 21:06:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523246777; cv=none; d=google.com; s=arc-20160816; b=HR7+RRFVyHGEUHRbeYf43qlkTdiHi4EW4EXtbr6qHyDmlMEX3yknSQlgDqkqrb0AXW PKW1i3sUpnYGrMvQYuTARR3/ZDG0SVjlngh3WV0UXO4q+ruhMDAA6TngHlLQ3C1MmEwd ecPLJrHFjq89496vtBRbJjh0+LOyfzt3TbzR38W3AaYlmj+hwBsAD4ViWXwOB20ZvW8L sI0Ix6TvsTZWNAUQHcyyF/Al1YDZyYwQt6mwWOszdJ6IqTU0PbQLSlwPlk9sLH2jTjSq hucodslT5h56iqR4aaCfTj7cy1BOP7F5ezDgoKc9svHJl96qUtwgqmBDlkh9IaaS2jsh fonQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :spamdiagnosticmetadata:spamdiagnosticoutput:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=NRhST1FCslXFd5e+yxj1CJXuYng5tAHYFuZDumEUrZA=; b=izfeS0bSIZI2vIDnYdZHftfoRny+oEEN/6/0Sjym00bHsRR739OdGE7krZuQm5ucqi VnXXg3xznXAKt14xQOgkJEnrTScoNQrwzGSC8Ki286yi4l7/eS/478zEwnHxluOtT1Np ug8PU4jPzbW1K6JcQGdZAi4qsRNGWM2PvWQxbfjk4d1040N/Mtqd0Gc03iVju6c4WrQ/ tvHeqWq9VRC/Zd0FCF7HzX1/b2ph/f/t3nQRSeGRsyGAUXHgdGuQwyJglNFhn7gOdIek lZdvDwWsURc0V3GEGsYShpU87VsrEZCRvJKFF6bCfRfidbXizOn3Hez3b7yabdgyK5NW Ktwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=NAi9bWec; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d16-v6si13199390pll.214.2018.04.08.21.05.40; Sun, 08 Apr 2018 21:06:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=NAi9bWec; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752355AbeDIEAb (ORCPT + 99 others); Mon, 9 Apr 2018 00:00:31 -0400 Received: from mail-co1nam03on0131.outbound.protection.outlook.com ([104.47.40.131]:30557 "EHLO NAM03-CO1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753602AbeDIASd (ORCPT ); Sun, 8 Apr 2018 20:18:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=NRhST1FCslXFd5e+yxj1CJXuYng5tAHYFuZDumEUrZA=; b=NAi9bWec2FNBtNexOBO4BAxNTuWOtLEpge45UAAhaUlN66pm18s4YeP6Drpar9+BKLgX9tsnGa+E8RCrZDOsWuYkN3GsYOPKc9kVlp2VKw+jCByRT9d4xTh5Qkk0e0Z9zesi+DJxgml/rNaoMQFOfLAQizXGCFi65zCx4GftNUU= Received: from DM5PR2101MB1032.namprd21.prod.outlook.com (52.132.128.13) by DM5PR2101MB1046.namprd21.prod.outlook.com (52.132.128.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.696.0; Mon, 9 Apr 2018 00:18:28 +0000 Received: from DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059]) by DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059%2]) with mapi id 15.20.0696.003; Mon, 9 Apr 2018 00:18:28 +0000 From: Sasha Levin To: "stable@vger.kernel.org" , "linux-kernel@vger.kernel.org" CC: Liu Bo , David Sterba , Sasha Levin Subject: [PATCH AUTOSEL for 4.15 063/189] Btrfs: fix scrub to repair raid6 corruption Thread-Topic: [PATCH AUTOSEL for 4.15 063/189] Btrfs: fix scrub to repair raid6 corruption Thread-Index: AQHTz5goo+0HhHq+BUSgfQLhLdo01A== Date: Mon, 9 Apr 2018 00:17:34 +0000 Message-ID: <20180409001637.162453-63-alexander.levin@microsoft.com> References: <20180409001637.162453-1-alexander.levin@microsoft.com> In-Reply-To: <20180409001637.162453-1-alexander.levin@microsoft.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [52.168.54.252] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR2101MB1046;7:jHlQ/zh3hnLQo8k1tx+5lPcdRuAIILeFfBt/iiotkJwlHOdm0cgmQacK19Y3Vy9oxABzRVuzGeQrvltIpiqIPhBcb6uq2b+lswkJTaTrnxbnbbTeeCzUOixO2UrqOnVzCizkqo9uG/nXzif5yY08fHwEXWmKIEve52EiU1lmdfFSg3FQrquV4/anw4GkmR/Ux6uFS6nj5tCqmzjoXGFePzJSNOVDJwsGzTyagpZQzkjFcjshHltL6bb6Jlc1+lxE;20:jhuAHYpK5E6LZXK2CfQsDwWOFj8LAgWGvkBi5j//MJ4KylDaLP42sbIm9YUseQx95fWtWPvtvbR1ybCH/c+JQh4gcih5psUOeh8RpWOelJ/RiHwkPcbQtaflyogA6Rjuje6dIiWNeKuMCk+aYxAEA3oD3pa5yi3jD/TaSvNBo7I= X-MS-Office365-Filtering-Correlation-Id: 37d78571-9834-4c94-3261-08d59daf6b4d x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(48565401081)(2017052603328)(7193020);SRVR:DM5PR2101MB1046; x-ms-traffictypediagnostic: DM5PR2101MB1046: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Alexander.Levin@microsoft.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(146099531331640); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(61425038)(6040522)(2401047)(8121501046)(5005006)(3231221)(944501327)(52105095)(10201501046)(3002001)(93006095)(93001095)(6055026)(61426038)(61427038)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(6072148)(201708071742011);SRVR:DM5PR2101MB1046;BCL:0;PCL:0;RULEID:;SRVR:DM5PR2101MB1046; x-forefront-prvs: 0637FCE711 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(39380400002)(346002)(376002)(396003)(366004)(39860400002)(199004)(189003)(36756003)(186003)(11346002)(446003)(476003)(2616005)(7736002)(5660300001)(26005)(10290500003)(478600001)(106356001)(6666003)(68736007)(10090500001)(54906003)(3846002)(59450400001)(22452003)(6116002)(86612001)(110136005)(99286004)(86362001)(72206003)(305945005)(76176011)(102836004)(6506007)(486006)(316002)(3280700002)(966005)(3660700001)(81166006)(81156014)(8676002)(2906002)(14454004)(2900100001)(97736004)(6486002)(8936002)(1076002)(6512007)(6306002)(6436002)(105586002)(25786009)(4326008)(2501003)(5250100002)(53936002)(66066001)(107886003)(22906009)(217873001);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR2101MB1046;H:DM5PR2101MB1032.namprd21.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: L99zCFKY/ofB939kbWDYUHOd/8d+JKsR4QveVtwsLPh/OTetK/ZWnibHSoJMjALMbAXVopHpFeUTZZrdUd3ntKNoqDU6xk6gBeEYPifjvEkk6vLNFIcJe6KcpVPeM3xgxX2d47BiXaoC0gtM6nFTlLIMuTywBoPFxKWvkxe9ZFP6Qvk8zWDGHIrvDWQn1M4KfkWG7xDMqSirEx7jlbcddEoNBZcWqkfgAMAoH7HFpFunGAgNjZKcGUpjiGNQjQ1Gmli5CKuHHb41qql/mT6KEyvrsR8UmYsGFw1nw55G80laBBovWeP5dxCkiqDBAx2FJqiHmfDJj1wP1qDxSlr2wOfEWg618eErN6xKmOwORmYqMADrnWFEQqF3QLsqz/JQt28iq6DU56sYH+jLSpzVcNscw44YEONuUmZM6g2VQMc= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 37d78571-9834-4c94-3261-08d59daf6b4d X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2018 00:17:34.9777 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR2101MB1046 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Liu Bo [ Upstream commit 762221f095e3932669093466aaf4b85ed9ad2ac1 ] The raid6 corruption is that, suppose that all disks can be read without problems and if the content that was read out doesn't match its checksum, currently for raid6 btrfs at most retries twice, - the 1st retry is to rebuild with all other stripes, it'll eventually be a raid5 xor rebuild, - if the 1st fails, the 2nd retry will deliberately fail parity p so that it will do raid6 style rebuild, however, the chances are that another non-parity stripe content also has something corrupted, so that the above retries are not able to return correct content. We've fixed normal reads to rebuild raid6 correctly with more retries in Patch "Btrfs: make raid6 rebuild retry more"[1], this is to fix scrub to do the exactly same rebuild process. [1]: https://patchwork.kernel.org/patch/10091755/ Signed-off-by: Liu Bo Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/raid56.c | 18 ++++++++++++++---- fs/btrfs/volumes.c | 9 ++++++++- 2 files changed, 22 insertions(+), 5 deletions(-) diff --git a/fs/btrfs/raid56.c b/fs/btrfs/raid56.c index 8a3e42412506..025e69c57cbd 100644 --- a/fs/btrfs/raid56.c +++ b/fs/btrfs/raid56.c @@ -2170,11 +2170,21 @@ int raid56_parity_recover(struct btrfs_fs_info *fs_= info, struct bio *bio, } =20 /* - * reconstruct from the q stripe if they are - * asking for mirror 3 + * Loop retry: + * for 'mirror =3D=3D 2', reconstruct from all other stripes. + * for 'mirror_num > 2', select a stripe to fail on every retry. */ - if (mirror_num =3D=3D 3) - rbio->failb =3D rbio->real_stripes - 2; + if (mirror_num > 2) { + /* + * 'mirror =3D=3D 3' is to fail the p stripe and + * reconstruct from the q stripe. 'mirror > 3' is to + * fail a data stripe and reconstruct from p+q stripe. + */ + rbio->failb =3D rbio->real_stripes - (mirror_num - 1); + ASSERT(rbio->failb > 0); + if (rbio->failb <=3D rbio->faila) + rbio->failb--; + } =20 ret =3D lock_stripe_add(rbio); =20 diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c index 6631f48c6a11..82cdd9d74f04 100644 --- a/fs/btrfs/volumes.c +++ b/fs/btrfs/volumes.c @@ -5105,7 +5105,14 @@ int btrfs_num_copies(struct btrfs_fs_info *fs_info, = u64 logical, u64 len) else if (map->type & BTRFS_BLOCK_GROUP_RAID5) ret =3D 2; else if (map->type & BTRFS_BLOCK_GROUP_RAID6) - ret =3D 3; + /* + * There could be two corrupted data stripes, we need + * to loop retry in order to rebuild the correct data. + *=20 + * Fail a stripe at a time on every retry except the + * stripe under reconstruction. + */ + ret =3D map->num_stripes; else ret =3D 1; free_extent_map(em); --=20 2.15.1