Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2877088imm; Mon, 16 Jul 2018 16:15:08 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc8hF1sLAaYixutDsYbbNwxjRG8ZHP3THYwA0iRYhLDsMNKUjQswJcyM83FnekEWxxv2pDJ X-Received: by 2002:a17:902:8f94:: with SMTP id z20-v6mr18153942plo.337.1531782908222; Mon, 16 Jul 2018 16:15:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531782908; cv=none; d=google.com; s=arc-20160816; b=gnMnEMcEmlIjTTnICIM8rk6BUzUZOU6twcEoUhlHr3VWMKNIxQSwYSbAQjAEM90ZUu mgLOB9zPdgTz2EVGvmZW4f8cVcFKx9s0HjlqOxkTB08GsTHUgltBQRbIcFqR0AYKOr/m NGHlj9lTzjgaPI+TLcr0xllv0QSjt+BzLLw8zvwayELm8ZZsyPnjgqRjGQzBLRytfSNo RYcvdSOI3+HzmI1Qq37fzKWXatoXF5hsgGwguCWQ14p1m0zYZkD3dDX9Qx1A1CokJR5b hXAdxyZgxdBcl61C3oCg3MsNRpqvtCIB5ziovoiIRSm8fAhIASd8cPEoxBaQPV7qA6mo n//A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:subject:message-id:date:from :in-reply-to:references:mime-version:arc-authentication-results; bh=sQgLkfZv1x5d9eY0EqtlNlknmmlr8OugG0X0palV0Y0=; b=fKQBCUULRkx/4qNlfDcmpeg2g5ESpNFJD0F7IVtgdOWosDhjnn7XEjAfQhw+jKggxt YffYvNw6wn4+iM8DL0FImFGY0/299HqORerK1CzMu6PTbYWVUByOdXaSftCbhCGthpaT dQx25rrJsXLYQ9lUsRaJnXWLNaIp4rtXowEAVmJfXFnrB7IwlP/NapUhdAJT2x9OYRkV ryjSSw2U8BGQ7Z/0ec/XQinnluEfoQZL49fk2ZWhSwT3AqiQRV2QnrajqRs101H+vQRp epqgnf/uMEot1PpFALkkQTgFLaAhXQ4SezeWNqtNy38Rre2l7QrV9zwBLlsLxA2ajg0N HppQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p62-v6si32898839pfb.274.2018.07.16.16.14.52; Mon, 16 Jul 2018 16:15:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729934AbeGPXnr (ORCPT + 99 others); Mon, 16 Jul 2018 19:43:47 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:60930 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729151AbeGPXnr (ORCPT ); Mon, 16 Jul 2018 19:43:47 -0400 Received: from mail-oi0-f72.google.com ([209.85.218.72]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1ffCgz-0003X4-BO for linux-kernel@vger.kernel.org; Mon, 16 Jul 2018 23:14:09 +0000 Received: by mail-oi0-f72.google.com with SMTP id p11-v6so48285673oih.17 for ; Mon, 16 Jul 2018 16:14:09 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=sQgLkfZv1x5d9eY0EqtlNlknmmlr8OugG0X0palV0Y0=; b=Z+XD5WiG9Z85WmnSgA/R1acvEiFhdiqwNpmOIETxKNghvVV7425waF2MwRjR/hF/8B LvOtzpCWJoLtyuxEZXuy0QVl6LE4GJBYdXNOtUh5pntET4k8bNha/vE+8/su/V6QoL7V CDSqB6hsUl9W1NkqAPeNmvg/PfeOmLHHKNed77vDjMpYqstLqAYM29Kngk4NaCKswWb3 sICp6T2xRtr/s6uRzkTGwrU7QSsFFsoXaRKsWzgy1QAkBRt53fHrWmNDy571iiOSNtSx 8LuIPdz8mhOEwioUm8lZpFB3xRHA/IXqZRK7PXYFG1QhDVhsf/JGAHX5jdtfiv+9SWK/ wWmg== X-Gm-Message-State: AOUpUlFoPZyotFQJuaxktkLcJgM3GZLp8upkZlfrbxDcyt0iZQHnODJH puX0/+ye3upmhI8u9cttdlitEsgipHQtOOgWAX0bV4/sle77PYpydwbV0v8zkRC5dT91iRihNQ5 NplZKYc8bXHuLt02KzYc2RiP2fzq7cje3aAcW20aXfgzmXLqYk1aVQbUYOA== X-Received: by 2002:aca:52d1:: with SMTP id g200-v6mr1397699oib.134.1531782847464; Mon, 16 Jul 2018 16:14:07 -0700 (PDT) X-Received: by 2002:aca:52d1:: with SMTP id g200-v6mr1397684oib.134.1531782847174; Mon, 16 Jul 2018 16:14:07 -0700 (PDT) MIME-Version: 1.0 References: <20180706174324.GA3049@xps13.dannf> <20180707041018.GB3546@thunk.org> <20180710165143.GA20459@xps13.dannf> <20180710204329.GB20459@xps13.dannf> <20180712230826.GB28610@thunk.org> In-Reply-To: From: dann frazier Date: Mon, 16 Jul 2018 17:13:56 -0600 Message-ID: Subject: Re: [Bisect] ext4_validate_inode_bitmap:98: comm stress-ng: Corrupt inode bitmap To: "Theodore Ts'o" , Ike Pan , linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, yanaijie@huawei.com, Colin King , Kamal Mostafa Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jul 14, 2018 at 5:21 AM dann frazier wrote: > > On Thu, Jul 12, 2018 at 5:08 PM Theodore Y. Ts'o wrote: > > > > > > > > Review console log and on each run I have filesystem rebuild. The problem > > > is that mke2fs I am using is 1.44.3-rc2. I am now reseting the environment > > > and re-test. > > > > > > > Could it be that you saw the error in ext4_validate_block_bitmap()? > > Looks like it. From Ike's report: > > # grep EXT4 d05-4-ipmi.log > [ 26.215587] EXT4-fs (sdb2): mounted filesystem with ordered data > mode. Opts: (null) > [ 29.844105] EXT4-fs (sdb2): re-mounted. Opts: errors=remount-ro > [ 3586.211348] EXT4-fs error (device sda2): > ext4_validate_block_bitmap:383: comm stress-ng: bg 4705: bad block > bitmap checksum > [ 8254.776992] EXT4-fs error (device sda2): > ext4_validate_block_bitmap:383: comm stress-ng: bg 4193: bad block > bitmap checksum > > I've ran my test case for several days w/ just the inode bitmap fix > and haven't been able to reproduce it - but perhaps that's just the > nature of the chdir test. hey Ted, Turns out the stress-ng 'mknod' test and - less reliably - the 'dentry' test can tickle the "bad block bitmap checksum" bug pretty easily. stress-ng wasn't *detecting* the error, but Colin has just released a new version that does. We've been running with your updated patch on 3 machines for several iterations, and have not seen another occurrence. -dann > > The patch which I sent Dann only fixed the problem for inode bitmaps; > > I noticed today that we need to fix it for block allocation bitmaps as > > well. > > I've also now ran several iterations w/ the block bitmap fix as well, > and still no problems, so: > > Tested-by: dann frazier > > > commit 8d5a803c6a6ce4ec258e31f76059ea5153ba46ef > > Author: Theodore Ts'o > > Date: Thu Jul 12 19:08:05 2018 -0400 > > > > ext4: check for allocation block validity with block group locked > > > > With commit 044e6e3d74a3: "ext4: don't update checksum of new > > initialized bitmaps" the buffer valid bit will get set without > > actually setting up the checksum for the allocation bitmap, since the > > checksum will get calculated once we actually allocate an inode or > > block. > > > > If we are doing this, then we need to (re-)check the verified bit > > after we take the block group lock. Otherwise, we could race with > > another process reading and verifying the bitmap, which would then > > complain about the checksum being invalid. > > > > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1780137 > > > > Signed-off-by: Theodore Ts'o > > Cc: stable@kernel.org > > Would it also make sense to add the following? > > Fixes: 044e6e3d74a3 ("ext4: don't update checksum of new initialized bitmaps") > > -dann > > > diff --git a/fs/ext4/balloc.c b/fs/ext4/balloc.c > > index e68cefe08261..aa52d87985aa 100644 > > --- a/fs/ext4/balloc.c > > +++ b/fs/ext4/balloc.c > > @@ -368,6 +368,8 @@ static int ext4_validate_block_bitmap(struct super_block *sb, > > return -EFSCORRUPTED; > > > > ext4_lock_group(sb, block_group); > > + if (buffer_verified(bh)) > > + goto verified; > > if (unlikely(!ext4_block_bitmap_csum_verify(sb, block_group, > > desc, bh))) { > > ext4_unlock_group(sb, block_group); > > @@ -386,6 +388,7 @@ static int ext4_validate_block_bitmap(struct super_block *sb, > > return -EFSCORRUPTED; > > } > > set_buffer_verified(bh); > > +verified: > > ext4_unlock_group(sb, block_group); > > return 0; > > } > > diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c > > index fb83750c1a14..e9d8e2667ab5 100644 > > --- a/fs/ext4/ialloc.c > > +++ b/fs/ext4/ialloc.c > > @@ -90,6 +90,8 @@ static int ext4_validate_inode_bitmap(struct super_block *sb, > > return -EFSCORRUPTED; > > > > ext4_lock_group(sb, block_group); > > + if (buffer_verified(bh)) > > + goto verified; > > blk = ext4_inode_bitmap(sb, desc); > > if (!ext4_inode_bitmap_csum_verify(sb, block_group, desc, bh, > > EXT4_INODES_PER_GROUP(sb) / 8)) { > > @@ -101,6 +103,7 @@ static int ext4_validate_inode_bitmap(struct super_block *sb, > > return -EFSBADCRC; > > } > > set_buffer_verified(bh); > > +verified: > > ext4_unlock_group(sb, block_group); > > return 0; > > }