Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp297227ima; Wed, 24 Oct 2018 01:09:23 -0700 (PDT) X-Google-Smtp-Source: AJdET5eTr3GUJ0XxoRj/otKHLsFPInSlUqH7gWG/2NOCE80xWBIN8M1WFBALklhEFP9xoyKaOBW0 X-Received: by 2002:a17:902:d907:: with SMTP id c7-v6mr1577389plz.198.1540368563039; Wed, 24 Oct 2018 01:09:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540368563; cv=none; d=google.com; s=arc-20160816; b=CacebQ9RRN8tII1cgapadQmiuS9YdPY3vRGczPPz+pA73u1/ClUCKtvVbohtBBZb8K B81U+mmGOfxyHBhXgqHUsn5rRGug5i26g74rGK0DjHXgLwpLKMCmfRc0IIweoM1/YBgs IboejiprfpdKjZtvv0it6+cg/aY1p/ZKQlIoezcW/INwUQ1VbmY9+sEucjKzVxlLP65g cJ+gpu+s5ghtmKQivtMBz//A59NHk1qTTKJqSyJGpJf3yMPQQnw5pXFsna66XhnDevaV UvlO+SgbgIWH5bPWcx1idkn2JUfWtAky8T+tZDHcVo1O33t0zoSkyB7alsABc+VPd2uv uGpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=Ly/pdXlYBOYDO7HN8wi1K+NoDW4aBJwQVtCpmclud2M=; b=y2dQbegeGkdmRwuZdZIH6eV6NycMlfqRK5koIUacMVgGt/5O33W6TvosjbRs3dv815 X7igtj05Z8guQkobcPRxYB3UTlMFgZIMJnr/ZC+wsoncbecIWqbrfQ6wKuV82+rHx4ml mQe30e8nvKhDlsDNuOWvSVTtMs6hb2zVo1pQGmNK4t1HRUIgkE/ybYF/1Jy00BfJ+VmE S2Obn6Ps+rqhRdF7d7r7Stx32geFuQtYvj0r/HUCizsgo8k6QmNZOok2GgY6nYDuYpVy xJh/qv0vCUGJCGv2xNLhDQ4aiW3GNvC6Rp9m1CsG7CPwNoTccLfm9Xl5Dy7SMrREfMgR fyDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l11-v6si4071067pgk.110.2018.10.24.01.09.07; Wed, 24 Oct 2018 01:09:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727835AbeJXQeb (ORCPT + 99 others); Wed, 24 Oct 2018 12:34:31 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:56077 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727823AbeJXQeb (ORCPT ); Wed, 24 Oct 2018 12:34:31 -0400 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 849D8B4557F11; Wed, 24 Oct 2018 16:07:26 +0800 (CST) Received: from [127.0.0.1] (10.111.220.140) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.408.0; Wed, 24 Oct 2018 16:07:18 +0800 Subject: Re: [PATCH] f2fs: avoid GC causing encrypted file corrupted To: , , , CC: , , , , , References: <1537274393-78441-1-git-send-email-yunlong.song@huawei.com> From: Yunlong Song Message-ID: Date: Wed, 24 Oct 2018 16:07:08 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <1537274393-78441-1-git-send-email-yunlong.song@huawei.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [10.111.220.140] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ping... On 2018/9/18 20:39, Yunlong Song wrote: > The encrypted file may be corrupted by GC in following case: > > Time 1: | segment 1 blkaddr = A | GC -> | segment 2 blkaddr = B | > Encrypted block 1 is moved from blkaddr A of segment 1 to blkaddr B of > segment 2, > > Time 2: | segment 1 blkaddr = B | GC -> | segment 3 blkaddr = C | > > Before page 1 is written back and if segment 2 become a victim, then > page 1 is moved from blkaddr B of segment 2 to blkaddr Cof segment 3, > during the GC process of Time 2, f2fs should wait for page 1 written back > before reading it, or move_data_block will read a garbage block from > blkaddr B since page is not written back to blkaddr B yet. > > Commit 6aa58d8a ("f2fs: readahead encrypted block during GC") introduce > ra_data_block to read encrypted block, but it forgets to add > f2fs_wait_on_page_writeback to avoid racing between GC and flush. > > Signed-off-by: Yunlong Song > --- > fs/f2fs/gc.c | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c > index a4c1a41..c55fb62 100644 > --- a/fs/f2fs/gc.c > +++ b/fs/f2fs/gc.c > @@ -641,6 +641,14 @@ static int ra_data_block(struct inode *inode, pgoff_t index) > fio.page = page; > fio.new_blkaddr = fio.old_blkaddr = dn.data_blkaddr; > > + /* > + * don't cache encrypted data into meta inode until previous dirty > + * data were writebacked to avoid racing between GC and flush. > + */ > + f2fs_wait_on_page_writeback(page, DATA, true); > + > + f2fs_wait_on_block_writeback(inode, dn.data_blkaddr); > + > fio.encrypted_page = f2fs_pagecache_get_page(META_MAPPING(sbi), > dn.data_blkaddr, > FGP_LOCK | FGP_CREAT, GFP_NOFS); > @@ -723,6 +731,8 @@ static void move_data_block(struct inode *inode, block_t bidx, > */ > f2fs_wait_on_page_writeback(page, DATA, true); > > + f2fs_wait_on_block_writeback(inode, dn.data_blkaddr); > + > err = f2fs_get_node_info(fio.sbi, dn.nid, &ni); > if (err) > goto put_out; -- Thanks, Yunlong Song