Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5550514imm; Tue, 18 Sep 2018 11:17:57 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaLvMq3wzlXz4zavH9/CLRdO1hljZJCMzBBvNaiyH1K4gWpG54jkmjdKs8DfYM0mNoFCIvK X-Received: by 2002:a62:e08b:: with SMTP id d11-v6mr32074561pfm.214.1537294677142; Tue, 18 Sep 2018 11:17:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537294677; cv=none; d=google.com; s=arc-20160816; b=C5D3IVtcu6WayCABZwn5bVFifAQN19v9AlBWo7RRlDyHUROnHavy7Jy1GV0WZPiHNz BOUzEMDM5F6iBmHh28HU0AmCtxVnDdP2vbiOVL7UnDB5SfTbDR0YzsofhrE/jLlsNcJR n15YlHPzZ41AwnlTtsLJr881xAdskRRmzJXbWpFICzppN6Zhx8XK9PhsdAkWDUDMGJ9T 39Ckj/T2VnytnS7yNmoTJ/+v23Q1kTjGSV5CVaLL6lOup6B4aHfz92177lH0rfyWp0nx lMmrHayKkvtNxcXc27yvT84wrVkC4SEw/2WVyKKOwJch8INqEAf4CLfhgCpMhfmwPE+Z /qmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=DttPTfQ6NmGz7MdpNQrv+E2+o8JKuO42LRPSAOVPb9w=; b=cX+FYOYbC9nejKSBubmuBahW4i0RejH1c+JeS2yt6/Fyhdw7cQJfynTzx7qARqGFHK fTyft3VHD2dMmwZMOFtG1ZScXP+4KfcAYYjPT6Tg6WDN001ktuLZHLXbuJhcQGUziYyZ qwkmcRvYJPOIq7CS40ZCCHP/sO6I2Hwx7zWkwaX80b8AKVznsqFVt5gqKp5AsGId27ny vKiueNqcsej/Y8Meg6yp5d/9j5VdyBY1Dtvs0fc9dRvWv1PWtJzAhEwQE4bQ7le1Dn35 WN+1uUpDeZEHQqcMayO3wrGV0H9EdSFQU9UaidimrJ9d7+SANaAyKnk88VN5HusQucEN 9rIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rxDyPmPe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o21-v6si18912870pgl.165.2018.09.18.11.17.28; Tue, 18 Sep 2018 11:17:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rxDyPmPe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730146AbeIRXuz (ORCPT + 99 others); Tue, 18 Sep 2018 19:50:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:41958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729695AbeIRXuz (ORCPT ); Tue, 18 Sep 2018 19:50:55 -0400 Received: from localhost (unknown [104.132.1.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B8DC821508; Tue, 18 Sep 2018 18:17:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1537294626; bh=682dXEpM/q3x3gNqKy/514PR08wKnh1HayK+OGTIyDw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rxDyPmPeW/IVAkFpMoXD6XT9FtGJGscFdm4XvdG2QdZD4hW45xoY41+9h+RE6vL44 UBPhz547JRkj+/NogkxnBYxlKD/T7L2PSCmoHdOg6ogZWfwMmRKQqF2DFDD1LhDx+L YRTvU9W7Vu3Il/3audmQ9K8tbJuZiD28Sam1iLCU= Date: Tue, 18 Sep 2018 11:17:05 -0700 From: Jaegeuk Kim To: Yunlong Song Cc: chao@kernel.org, yuchao0@huawei.com, yunlong.song@icloud.com, miaoxie@huawei.com, bintian.wang@huawei.com, shengyong1@huawei.com, heyunlei@huawei.com, linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [PATCH] f2fs: avoid GC causing encrypted file corrupted Message-ID: <20180918181705.GG91945@jaegeuk-macbookpro.roam.corp.google.com> References: <1537274393-78441-1-git-send-email-yunlong.song@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1537274393-78441-1-git-send-email-yunlong.song@huawei.com> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/18, Yunlong Song wrote: > The encrypted file may be corrupted by GC in following case: > > Time 1: | segment 1 blkaddr = A | GC -> | segment 2 blkaddr = B | > Encrypted block 1 is moved from blkaddr A of segment 1 to blkaddr B of > segment 2, > > Time 2: | segment 1 blkaddr = B | GC -> | segment 3 blkaddr = C | segment 2 blkaddr = B? > > Before page 1 is written back and if segment 2 become a victim, then > page 1 is moved from blkaddr B of segment 2 to blkaddr Cof segment 3, C of ? > during the GC process of Time 2, f2fs should wait for page 1 written back > before reading it, or move_data_block will read a garbage block from > blkaddr B since page is not written back to blkaddr B yet. move_data_block() checks PageUptodate() so it won't get garbage, yes? So, does ra_data_block need to check PageUptodate? > > Commit 6aa58d8a ("f2fs: readahead encrypted block during GC") introduce > ra_data_block to read encrypted block, but it forgets to add > f2fs_wait_on_page_writeback to avoid racing between GC and flush. > > Signed-off-by: Yunlong Song > --- > fs/f2fs/gc.c | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c > index a4c1a41..c55fb62 100644 > --- a/fs/f2fs/gc.c > +++ b/fs/f2fs/gc.c > @@ -641,6 +641,14 @@ static int ra_data_block(struct inode *inode, pgoff_t index) > fio.page = page; > fio.new_blkaddr = fio.old_blkaddr = dn.data_blkaddr; > > + /* > + * don't cache encrypted data into meta inode until previous dirty > + * data were writebacked to avoid racing between GC and flush. > + */ > + f2fs_wait_on_page_writeback(page, DATA, true); > + > + f2fs_wait_on_block_writeback(inode, dn.data_blkaddr); > + > fio.encrypted_page = f2fs_pagecache_get_page(META_MAPPING(sbi), > dn.data_blkaddr, > FGP_LOCK | FGP_CREAT, GFP_NOFS); > @@ -723,6 +731,8 @@ static void move_data_block(struct inode *inode, block_t bidx, > */ > f2fs_wait_on_page_writeback(page, DATA, true); > > + f2fs_wait_on_block_writeback(inode, dn.data_blkaddr); > + > err = f2fs_get_node_info(fio.sbi, dn.nid, &ni); > if (err) > goto put_out; > -- > 1.8.5.2