Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3057471imm; Sun, 1 Jul 2018 11:14:34 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLBcu0+wZQdYjwTdtJgTqhpd6HaXKQUwK+YMWo+AMtkfPteBF5MTyJwR02BK9P7YLH58aQa X-Received: by 2002:a17:902:48c8:: with SMTP id u8-v6mr23008793plh.152.1530468874320; Sun, 01 Jul 2018 11:14:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530468874; cv=none; d=google.com; s=arc-20160816; b=klrjkGurC8upW/8711JlrgnOLWaSkdh0n8ipAFY7TbNNLR3xEVvy0N2mp4/2Q6qSbg dGFyODRZMYjRTtZ/KVeEdzU4KiFRwolZQsSKX+df+nCXevEdpHPRrpoFFjzdYDVnjhfS MoVzIwaQp1/YWoWdc9ixUnBlMQzeuW/H0whJYDofl3m2M3JlEzQiiDXm899tL3mhT/Si NTpcOxrXJeuVGEyLKag72STZtfNuBJQXYSUKZkr53Z27WDYIrJcPOmGtvsED+ZVs09ox WcYvmGIl+0hv2RA2y1nOonUD9pi9b2C6p89IYQ4S+oz645K43SwAGLz95cqRFcJ+qw5X uKRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=qAhv0NGi7/+WUm+BvYF5jtDvfP5OspsJuC0nm9vxb1Y=; b=KzHH+o+d7F4kLvtk5kad0Y62f4p1CTKPRJPtf1Wfa3poYNGfdbJeuiVPBbFsBDgn3s nFCQX7p0I67ErxxYzfU442ngyJwiRm2MpUgvcX8BuRrPzvHKGrStV2FWyFAI7z+6+in8 bC28M3z8tVHoR7753Tv3HUK+RGEpICSKRh6pvOcmBTIKYHqtIslsl5c5aDPDQ4Z0KH+5 m29t/L4EA7IaSETgUe4yHJ6Y+SdPZTK4b5hIIN9y5vHR+Z6e4QmTStJf2xt1nJz9aTqq UDvLz8Bx+R3+wNAVtygt6u9XnafyaIvjzI45v+wEYLvhws/MXvb6eULDUoA968cuBypv dJ/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j20-v6si1090759pgl.594.2018.07.01.11.14.19; Sun, 01 Jul 2018 11:14:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965514AbeGAQ13 (ORCPT + 99 others); Sun, 1 Jul 2018 12:27:29 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:34102 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965028AbeGAQ1Z (ORCPT ); Sun, 1 Jul 2018 12:27:25 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 7523DACD; Sun, 1 Jul 2018 16:27:24 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, martin bayern , Richard Weinberger Subject: [PATCH 4.9 069/101] ubi: fastmap: Correctly handle interrupted erasures in EBA Date: Sun, 1 Jul 2018 18:21:55 +0200 Message-Id: <20180701160759.928145668@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180701160757.138608453@linuxfoundation.org> References: <20180701160757.138608453@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Richard Weinberger commit 781932375ffc6411713ee0926ccae8596ed0261c upstream. Fastmap cannot track the LEB unmap operation, therefore it can happen that after an interrupted erasure the mapping still looks good from Fastmap's point of view, while reading from the PEB will cause an ECC error and confuses the upper layer. Instead of teaching users of UBI how to deal with that, we read back the VID header and check for errors. If the PEB is empty or shows ECC errors we fixup the mapping and schedule the PEB for erasure. Fixes: dbb7d2a88d2a ("UBI: Add fastmap core") Cc: Reported-by: martin bayern Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/ubi/eba.c | 90 +++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 89 insertions(+), 1 deletion(-) --- a/drivers/mtd/ubi/eba.c +++ b/drivers/mtd/ubi/eba.c @@ -490,6 +490,82 @@ out_unlock: return err; } +#ifdef CONFIG_MTD_UBI_FASTMAP +/** + * check_mapping - check and fixup a mapping + * @ubi: UBI device description object + * @vol: volume description object + * @lnum: logical eraseblock number + * @pnum: physical eraseblock number + * + * Checks whether a given mapping is valid. Fastmap cannot track LEB unmap + * operations, if such an operation is interrupted the mapping still looks + * good, but upon first read an ECC is reported to the upper layer. + * Normaly during the full-scan at attach time this is fixed, for Fastmap + * we have to deal with it while reading. + * If the PEB behind a LEB shows this symthom we change the mapping to + * %UBI_LEB_UNMAPPED and schedule the PEB for erasure. + * + * Returns 0 on success, negative error code in case of failure. + */ +static int check_mapping(struct ubi_device *ubi, struct ubi_volume *vol, int lnum, + int *pnum) +{ + int err; + struct ubi_vid_io_buf *vidb; + + if (!ubi->fast_attach) + return 0; + + vidb = ubi_alloc_vid_buf(ubi, GFP_NOFS); + if (!vidb) + return -ENOMEM; + + err = ubi_io_read_vid_hdr(ubi, *pnum, vidb, 0); + if (err > 0 && err != UBI_IO_BITFLIPS) { + int torture = 0; + + switch (err) { + case UBI_IO_FF: + case UBI_IO_FF_BITFLIPS: + case UBI_IO_BAD_HDR: + case UBI_IO_BAD_HDR_EBADMSG: + break; + default: + ubi_assert(0); + } + + if (err == UBI_IO_BAD_HDR_EBADMSG || err == UBI_IO_FF_BITFLIPS) + torture = 1; + + down_read(&ubi->fm_eba_sem); + vol->eba_tbl->entries[lnum].pnum = UBI_LEB_UNMAPPED; + up_read(&ubi->fm_eba_sem); + ubi_wl_put_peb(ubi, vol->vol_id, lnum, *pnum, torture); + + *pnum = UBI_LEB_UNMAPPED; + } else if (err < 0) { + ubi_err(ubi, "unable to read VID header back from PEB %i: %i", + *pnum, err); + + goto out_free; + } + + err = 0; + +out_free: + ubi_free_vid_buf(vidb); + + return err; +} +#else +static int check_mapping(struct ubi_device *ubi, struct ubi_volume *vol, int lnum, + int *pnum) +{ + return 0; +} +#endif + /** * ubi_eba_read_leb - read data. * @ubi: UBI device description object @@ -522,7 +598,13 @@ int ubi_eba_read_leb(struct ubi_device * return err; pnum = vol->eba_tbl->entries[lnum].pnum; - if (pnum < 0) { + if (pnum >= 0) { + err = check_mapping(ubi, vol, lnum, &pnum); + if (err < 0) + goto out_unlock; + } + + if (pnum == UBI_LEB_UNMAPPED) { /* * The logical eraseblock is not mapped, fill the whole buffer * with 0xFF bytes. The exception is static volumes for which @@ -931,6 +1013,12 @@ int ubi_eba_write_leb(struct ubi_device pnum = vol->eba_tbl->entries[lnum].pnum; if (pnum >= 0) { + err = check_mapping(ubi, vol, lnum, &pnum); + if (err < 0) + goto out; + } + + if (pnum >= 0) { dbg_eba("write %d bytes at offset %d of LEB %d:%d, PEB %d", len, offset, vol_id, lnum, pnum);