Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp165207imm; Tue, 28 Aug 2018 19:16:04 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZQPGm+KPf8HLULcDti/BWDCiLaZ7p+eVDaNV3AIbGkqqTGAuUSutdHDBEuu51zGTTCKikD X-Received: by 2002:a65:6214:: with SMTP id d20-v6mr3871674pgv.420.1535508964331; Tue, 28 Aug 2018 19:16:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535508964; cv=none; d=google.com; s=arc-20160816; b=UhHGAXHzEQlCuAep5CoZNtNUGWE4XJQehs85COJF+OeCXdm/xNY5jKrF42zamU23TN IGj5uPXo3ODQzH6H0jYmHRrj2ZuaLZZckTsGzVvn6E5EbpT1hRloxP35aD003E6pzgsF oTPqfpPanW4sYBziNnycekJBr6xV9oAOJ6i3sJHKO9tra4u6Snc9Zl7LFDZL144o7xWr 1bl2bLAvlvIb690Rndj+40AA4YGsCgWI3JFBqglyJpyqlMNWwjoKnFKJT17OuRu3Q/49 htCF04nVJkQdmCyWqxCNe/wvnZZraVGm+pGwtbS/ma9fdoxC6V/TKHwE/5t6rcljTCha zzHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=ENo2kh4uH+YwsZF2TMaZmxz8+L8zgfMHqdscwYmINuU=; b=Q3MACCqzoB/wRiH/pOCnAW81t2nCu0qoGkk7MzPg4dvCi+4u6MQzH2FDv79jI6wsbF 7J8ZorwDu3RTw5l08Mw5EQtvyURU2lRKZ+LcyllbekDERMX7N4FBBr4l/TnlrvEE67zo d5Yaa3GdcSSFdEHYHIYrJSU4/FEwe5QQsGbbVRy4uuW5Im8zEyfKYlctXGQsyEvuiSTL YVPbkZ3jb3AEq63FigB/ajkPh6ISTgYP+xQWXylnxuK3vtl1677L8483YywsLn+xqvYH eGbW0X8bzgS+U8EQCii3xqWZ3q5q7omlYxHEdmeX99NJDK/P6D2/vGlQOVUwTJPjKhPz 3UmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o12-v6si2558077plg.487.2018.08.28.19.15.49; Tue, 28 Aug 2018 19:16:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727312AbeH2GJE (ORCPT + 99 others); Wed, 29 Aug 2018 02:09:04 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:11204 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725882AbeH2GJE (ORCPT ); Wed, 29 Aug 2018 02:09:04 -0400 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id A38045AB1B507; Wed, 29 Aug 2018 10:14:31 +0800 (CST) Received: from [127.0.0.1] (10.134.22.195) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.399.0; Wed, 29 Aug 2018 10:14:32 +0800 Subject: Re: [PATCH] f2fs: avoid wrong decrypted data from disk To: Jaegeuk Kim , , References: <20180827225226.14272-1-jaegeuk@kernel.org> From: Chao Yu Message-ID: <40e115de-0ec8-62e8-098a-57263b62595f@huawei.com> Date: Wed, 29 Aug 2018 10:14:32 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20180827225226.14272-1-jaegeuk@kernel.org> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/8/28 6:52, Jaegeuk Kim wrote: > 1. Create a file in an encrypted directory > 2. Do GC & drop caches > 3. Read stale data before its bio for metapage was not issued yet > > Signed-off-by: Jaegeuk Kim > --- > fs/f2fs/data.c | 7 +++++++ > 1 file changed, 7 insertions(+) > > diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c > index 382c1ef9a9e4..c3557fd4a0bd 100644 > --- a/fs/f2fs/data.c > +++ b/fs/f2fs/data.c > @@ -1550,6 +1550,13 @@ static int f2fs_mpage_readpages(struct address_space *mapping, > bio = NULL; > } > if (bio == NULL) { > + /* > + * If the page is under writeback, we need to wait for > + * its completion to see the correct decrypted data. > + */ > + if (unlikely(f2fs_encrypted_file(inode))) > + f2fs_wait_on_block_writeback(F2FS_I_SB(inode), block_nr); I think we have did this in f2fs_grab_read_bio(), so we just need to cover 'bio != NULL' case, right? Thanks, > + > bio = f2fs_grab_read_bio(inode, block_nr, nr_pages, > is_readahead ? REQ_RAHEAD : 0); > if (IS_ERR(bio)) { >