Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2994580imm; Sun, 1 Jul 2018 09:56:34 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI8hUsoNo/PJSPxPdHJCSMK+soAekS9Qiezn46sVVS0ECjhk9t4lrOZPLEMaNXkHl61KPWV X-Received: by 2002:a17:902:6bc7:: with SMTP id m7-v6mr23194875plt.162.1530464194852; Sun, 01 Jul 2018 09:56:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530464194; cv=none; d=google.com; s=arc-20160816; b=lnGbXIJ3czmk6TD0AqPQf2O9A1QijfOWLktk5pKrKkG+4oecFXki/YFHQ9V0RpGTeO zBwOowV5mmG7WceLEOZuLMQJG0/cjz3/n4kMqlSWX9XEzdwPkazAUWGzpU436eXZqnC1 wqno73XRMpbB0GK3msgBdMa/g1jQ/3CrQuaBQqaibpVFnndomEGW7Tbqj9yD38XWJZLa BhSmyIWxwhyPlN+9lxqLc1fwZFszWigPlqTDV/WG6FSEsI3eJI6zBxFtSeZEkuEvfOoW OO+AdvzkZ9y80h/AMn9ODimdG0WpyaJMJYzau5JlJk1mDVr9P3odbszQpBj8YvkkMii3 Umvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=e+3Onjb7DrQc+QwTf5v5WXMO37Rel9lfe38i9AH7WPM=; b=f9PBVy3/EJk/GnIgm2PmGswD95c2IlbEuORvU0QJpdPlZXHFWdcBug/oAErMFqgLNk /80Y+KpF1wcx2F23YCaHPPTlo2ClV1zoITlCHvUCeNRpX01870ayiMkW1bY7DYlLOZWG RNQGkBJalFXk5EQ63S9PPh1/QjtFFLdrXTzh6Vdy8lfbl5bGdbvr0X30LeFA0TwR65f4 KwUwPoA9HKMIiKVsU0BimLoCujBiI3F2x65ZaKxU8xDOTdrur2TpVcvOMTrFJJlTKxIi dzfUVoncCmeZ3omuj/mn9lmd3GdTZ10XMcQyY2+rMXu2JO7GJ5YCuL5s5S2I0ECawj3j ySjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1-v6si14041044pld.424.2018.07.01.09.56.20; Sun, 01 Jul 2018 09:56:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934068AbeGAQpQ (ORCPT + 99 others); Sun, 1 Jul 2018 12:45:16 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38178 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932883AbeGAQpM (ORCPT ); Sun, 1 Jul 2018 12:45:12 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 68515AA6; Sun, 1 Jul 2018 16:45:11 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, martin bayern , Richard Weinberger Subject: [PATCH 4.17 153/220] ubi: fastmap: Correctly handle interrupted erasures in EBA Date: Sun, 1 Jul 2018 18:22:57 +0200 Message-Id: <20180701160914.686011552@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180701160908.272447118@linuxfoundation.org> References: <20180701160908.272447118@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.17-stable review patch. If anyone has any objections, please let me know. ------------------ From: Richard Weinberger commit 781932375ffc6411713ee0926ccae8596ed0261c upstream. Fastmap cannot track the LEB unmap operation, therefore it can happen that after an interrupted erasure the mapping still looks good from Fastmap's point of view, while reading from the PEB will cause an ECC error and confuses the upper layer. Instead of teaching users of UBI how to deal with that, we read back the VID header and check for errors. If the PEB is empty or shows ECC errors we fixup the mapping and schedule the PEB for erasure. Fixes: dbb7d2a88d2a ("UBI: Add fastmap core") Cc: Reported-by: martin bayern Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/ubi/eba.c | 90 +++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 89 insertions(+), 1 deletion(-) --- a/drivers/mtd/ubi/eba.c +++ b/drivers/mtd/ubi/eba.c @@ -490,6 +490,82 @@ out_unlock: return err; } +#ifdef CONFIG_MTD_UBI_FASTMAP +/** + * check_mapping - check and fixup a mapping + * @ubi: UBI device description object + * @vol: volume description object + * @lnum: logical eraseblock number + * @pnum: physical eraseblock number + * + * Checks whether a given mapping is valid. Fastmap cannot track LEB unmap + * operations, if such an operation is interrupted the mapping still looks + * good, but upon first read an ECC is reported to the upper layer. + * Normaly during the full-scan at attach time this is fixed, for Fastmap + * we have to deal with it while reading. + * If the PEB behind a LEB shows this symthom we change the mapping to + * %UBI_LEB_UNMAPPED and schedule the PEB for erasure. + * + * Returns 0 on success, negative error code in case of failure. + */ +static int check_mapping(struct ubi_device *ubi, struct ubi_volume *vol, int lnum, + int *pnum) +{ + int err; + struct ubi_vid_io_buf *vidb; + + if (!ubi->fast_attach) + return 0; + + vidb = ubi_alloc_vid_buf(ubi, GFP_NOFS); + if (!vidb) + return -ENOMEM; + + err = ubi_io_read_vid_hdr(ubi, *pnum, vidb, 0); + if (err > 0 && err != UBI_IO_BITFLIPS) { + int torture = 0; + + switch (err) { + case UBI_IO_FF: + case UBI_IO_FF_BITFLIPS: + case UBI_IO_BAD_HDR: + case UBI_IO_BAD_HDR_EBADMSG: + break; + default: + ubi_assert(0); + } + + if (err == UBI_IO_BAD_HDR_EBADMSG || err == UBI_IO_FF_BITFLIPS) + torture = 1; + + down_read(&ubi->fm_eba_sem); + vol->eba_tbl->entries[lnum].pnum = UBI_LEB_UNMAPPED; + up_read(&ubi->fm_eba_sem); + ubi_wl_put_peb(ubi, vol->vol_id, lnum, *pnum, torture); + + *pnum = UBI_LEB_UNMAPPED; + } else if (err < 0) { + ubi_err(ubi, "unable to read VID header back from PEB %i: %i", + *pnum, err); + + goto out_free; + } + + err = 0; + +out_free: + ubi_free_vid_buf(vidb); + + return err; +} +#else +static int check_mapping(struct ubi_device *ubi, struct ubi_volume *vol, int lnum, + int *pnum) +{ + return 0; +} +#endif + /** * ubi_eba_read_leb - read data. * @ubi: UBI device description object @@ -522,7 +598,13 @@ int ubi_eba_read_leb(struct ubi_device * return err; pnum = vol->eba_tbl->entries[lnum].pnum; - if (pnum < 0) { + if (pnum >= 0) { + err = check_mapping(ubi, vol, lnum, &pnum); + if (err < 0) + goto out_unlock; + } + + if (pnum == UBI_LEB_UNMAPPED) { /* * The logical eraseblock is not mapped, fill the whole buffer * with 0xFF bytes. The exception is static volumes for which @@ -931,6 +1013,12 @@ int ubi_eba_write_leb(struct ubi_device pnum = vol->eba_tbl->entries[lnum].pnum; if (pnum >= 0) { + err = check_mapping(ubi, vol, lnum, &pnum); + if (err < 0) + goto out; + } + + if (pnum >= 0) { dbg_eba("write %d bytes at offset %d of LEB %d:%d, PEB %d", len, offset, vol_id, lnum, pnum);