Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp213794imm; Wed, 29 Aug 2018 18:50:46 -0700 (PDT) X-Google-Smtp-Source: ANB0Vda6at4z59BDKMlMy90Lf+RFYm+z0SgMQTrakreydLZOSS0zQSH/KotGH2CnrI1+dUQm0pTZ X-Received: by 2002:a17:902:209:: with SMTP id 9-v6mr8106689plc.270.1535593846205; Wed, 29 Aug 2018 18:50:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535593846; cv=none; d=google.com; s=arc-20160816; b=toEoGqP3rUc1BUGy8DS7Us/3q5zrEnwKqSHiMglKMtBtBBVXuDJ42GNyiMPqf+aTaN nJjSb1DT5vScX3SlDxbqSIc4YW71Ft9obGp8I/ymVCcf8epto/pGZuYmQrmWXTaF3k2d 7iAXne8i4CtwaomwmBxVBcO9UREEwOuipsyXn475Xqfs5b5v3K19Th2i0p0Q9aPs2/Fk EfePaugDhMe4l2yBg3O1vxyuuh9++pviEb4dCsVVSxNwsMPnwyJWuIIJ9uNx1epk9AT7 5PCFeD+brvs8S39zatyLuWraMEI1qQNdJ6Xa7QR0xBUsswHectcsUDRnDMiU2fkJcCj3 uaYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:dkim-signature:arc-authentication-results; bh=LtndhGNebdoTxwPOBrQ+wkP+RVFyzAipWuBZWmAy24s=; b=r4DkPut3WRfImdJR5gtI+lnfesP91xupMxQtjGlExPq+oKN7CP/m/ii3ibyiy1xFpX Gp/actnqDOYSyuD4O+6vTezZQQYbVXuevFpjL3BSw14b8wcB3NFNJCMknCKrG94sndXv cZ0wUTHNU7ULE4ZO6uG9G25LLobMk35IrQexuUiaBX1WPpZO2HhaEYdUJNvANSrCPhQo gINtfVVjs4MpVVzVXVAuVM3BQExdGx/8Kv9Kgf8eCTWuLykz50upjEkWS/xhi6Qv/pay XLtL1ARy/aLBWxznrflFUMCW3VcdD2Dip3u0zNsiIjMS3a/+WBOhsvVVowIg1uf7zD/f mSyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WHwEtBON; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d128-v6si3337676pfg.257.2018.08.29.18.50.31; Wed, 29 Aug 2018 18:50:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WHwEtBON; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727227AbeH3Fsl (ORCPT + 99 others); Thu, 30 Aug 2018 01:48:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:42288 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726457AbeH3Fsl (ORCPT ); Thu, 30 Aug 2018 01:48:41 -0400 Received: from localhost (unknown [104.132.1.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D168B204EC; Thu, 30 Aug 2018 01:48:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535593739; bh=9KgVuVZljVn3sbtM5uVwQk9hK1miBfeAqjgDVepThwY=; h=Date:From:To:Subject:References:In-Reply-To:From; b=WHwEtBONgTQvqK2V8mJ2rPhsGTgCEPQAqxjR858Cx6qy1j8PMIi8MI15WKTCZKiSs +RUO1qGPT7WuU3AV/JvhngvpGgtul96I4mAqZDgk5d7ZEonlSeqgUgs8M/SJcy02Fh 9S44N8yBVNHWr/ZHKiFfiJ6MZbhG12txMqmi7JRE= Date: Wed, 29 Aug 2018 18:48:58 -0700 From: Jaegeuk Kim To: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Subject: Re: [PATCH v2] f2fs: avoid wrong decrypted data from disk Message-ID: <20180830014858.GA91444@jaegeuk-macbookpro.roam.corp.google.com> References: <20180827225226.14272-1-jaegeuk@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180827225226.14272-1-jaegeuk@kernel.org> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 1. Create a file in an encrypted directory 2. Do GC & drop caches 3. Read stale data before its bio for metapage was not issued yet Signed-off-by: Jaegeuk Kim --- Change log from v1: - move to bio != NULL fs/f2fs/data.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c index 382c1ef9a9e4..159e411785e9 100644 --- a/fs/f2fs/data.c +++ b/fs/f2fs/data.c @@ -1556,6 +1556,12 @@ static int f2fs_mpage_readpages(struct address_space *mapping, bio = NULL; goto set_error_page; } + } else if (unlikely(f2fs_encrypted_file(inode))) { + /* + * If the page is under writeback, we need to wait for + * its completion to see the correct decrypted data. + */ + f2fs_wait_on_block_writeback(F2FS_I_SB(inode), block_nr); } if (bio_add_page(bio, page, blocksize, 0) < blocksize) -- 2.17.0.441.gb46fe60e1d-goog