Received: by 10.192.165.148 with SMTP id m20csp565870imm; Wed, 25 Apr 2018 04:22:28 -0700 (PDT) X-Google-Smtp-Source: AIpwx480zSdaEWUQmRQ9TT+1SiQcyyYBDz7JorBQ71IJHYojeBWAzbS8f1LQNlRdMnufwDtBQ0Th X-Received: by 10.98.107.138 with SMTP id g132mr27261605pfc.163.1524655347925; Wed, 25 Apr 2018 04:22:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524655347; cv=none; d=google.com; s=arc-20160816; b=AP9dmG+BjbsMz2tm3s3XoCPU6PiXupVlw5+iGZenKAnH8V3oEIVFiLqJo4M+59v06P VcZiIgswzugHJ+kukNffHRSMslzI4cglAtXhPD2U1NAnnbQnRPa/QRla48yhxfBKu/Y2 dlBaHFN7qOg1WnuEcIoaiElxnpyjtGYiiFXKRBMf2eADQbyjUuLkcDYtXvBneqWl9P6q GFclyW3VUpiZeMTkQeP+fLcPHmKPYXMT5CHtTtC+qoeoMVdyy1QUeK+UvN4D6AgR+WmM qiTqinVYccpIpmieRnAVB55Cw/2ESP484rmGfXXgrYcbZCjyxiG9DMszheRjnBk0Q1i2 rkiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=TpivFnVbg2YGx4U7PnWK4z/4K5dh2MgcOcVNES+WqLY=; b=JKxmrktQp4aV8pnAoDlwA4NrhKzRZpDcyOCZJTtfpN7pBB6a6aM1lHMTBtVgkZQZQ4 VlO4zR9BBXGeWLouV8hfvCD0sN73pqvHAsCHwdTKvh1KmcI7sAVd/kl7OsnVLPd2tQcv XFZsdd0I46tPeyuHTw9mOXRE6N0MNriGeO8M5W0mC9sPIf+OwhdJhKeV0WC4u/emGWED JcVKuLZlSIHl3q7EpCs0+lf0Uh5PUE0YvAIAAcRZU863KY8lAKer3zy6qbCD1fEwCap/ lnkzEtCBv1IsAZdLxcUGbEicG1m8TY67WV4gjrOeltw2SssBCZAL4qkJiOlolX+eRaOj jWqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u198si8811241pgc.203.2018.04.25.04.22.13; Wed, 25 Apr 2018 04:22:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753674AbeDYKjo (ORCPT + 99 others); Wed, 25 Apr 2018 06:39:44 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:51912 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753646AbeDYKjj (ORCPT ); Wed, 25 Apr 2018 06:39:39 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 2BF3036; Wed, 25 Apr 2018 10:39:39 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Liu Bo , David Sterba , Sasha Levin Subject: [PATCH 4.14 065/183] Btrfs: fix scrub to repair raid6 corruption Date: Wed, 25 Apr 2018 12:34:45 +0200 Message-Id: <20180425103245.136128272@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180425103242.532713678@linuxfoundation.org> References: <20180425103242.532713678@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Liu Bo [ Upstream commit 762221f095e3932669093466aaf4b85ed9ad2ac1 ] The raid6 corruption is that, suppose that all disks can be read without problems and if the content that was read out doesn't match its checksum, currently for raid6 btrfs at most retries twice, - the 1st retry is to rebuild with all other stripes, it'll eventually be a raid5 xor rebuild, - if the 1st fails, the 2nd retry will deliberately fail parity p so that it will do raid6 style rebuild, however, the chances are that another non-parity stripe content also has something corrupted, so that the above retries are not able to return correct content. We've fixed normal reads to rebuild raid6 correctly with more retries in Patch "Btrfs: make raid6 rebuild retry more"[1], this is to fix scrub to do the exactly same rebuild process. [1]: https://patchwork.kernel.org/patch/10091755/ Signed-off-by: Liu Bo Signed-off-by: David Sterba Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/raid56.c | 18 ++++++++++++++---- fs/btrfs/volumes.c | 9 ++++++++- 2 files changed, 22 insertions(+), 5 deletions(-) --- a/fs/btrfs/raid56.c +++ b/fs/btrfs/raid56.c @@ -2159,11 +2159,21 @@ int raid56_parity_recover(struct btrfs_f } /* - * reconstruct from the q stripe if they are - * asking for mirror 3 + * Loop retry: + * for 'mirror == 2', reconstruct from all other stripes. + * for 'mirror_num > 2', select a stripe to fail on every retry. */ - if (mirror_num == 3) - rbio->failb = rbio->real_stripes - 2; + if (mirror_num > 2) { + /* + * 'mirror == 3' is to fail the p stripe and + * reconstruct from the q stripe. 'mirror > 3' is to + * fail a data stripe and reconstruct from p+q stripe. + */ + rbio->failb = rbio->real_stripes - (mirror_num - 1); + ASSERT(rbio->failb > 0); + if (rbio->failb <= rbio->faila) + rbio->failb--; + } ret = lock_stripe_add(rbio); --- a/fs/btrfs/volumes.c +++ b/fs/btrfs/volumes.c @@ -5101,7 +5101,14 @@ int btrfs_num_copies(struct btrfs_fs_inf else if (map->type & BTRFS_BLOCK_GROUP_RAID5) ret = 2; else if (map->type & BTRFS_BLOCK_GROUP_RAID6) - ret = 3; + /* + * There could be two corrupted data stripes, we need + * to loop retry in order to rebuild the correct data. + * + * Fail a stripe at a time on every retry except the + * stripe under reconstruction. + */ + ret = map->num_stripes; else ret = 1; free_extent_map(em);