Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4033553yba; Tue, 23 Apr 2019 13:57:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqwVo3VtCTLrAXgLT3UBTHI2J8r3KMS+c1HApLmkOertZ3l+1cQuc/bbLe7l4ab3/xRFWrCv X-Received: by 2002:a63:5b24:: with SMTP id p36mr25840577pgb.84.1556053056812; Tue, 23 Apr 2019 13:57:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556053056; cv=none; d=google.com; s=arc-20160816; b=snKwwvrBv1MYnqGWhH0jNTpF5yqC8XXGG7PFzfERWj+UGwQVJPMWGYRXsWAmzEAC9I PWiBuIpmSl3Tg1GbpOt1Ki9zizcQZRWKhJnGjNT+GkqoBiC+lVTW0YVN6IMYUX9/J4Kx RO/78bYKfaeUeZpFcIbjzXSFl4dRK7uWVNdxeEoOk1dzuHKe2KD27noAoyffUg6UrfR/ WnQQi7fsSTN7REdk4Y7fwRyapKJ9wYp2pk/f8UwRm6xm0ibPl2u/bY5Ph43OQUdyx0XI 9wgUSgvVRCzXon6y1fMBbCWGous/qsKZupaGY4Pc4UzYB/DxEQ5SQQISvjsWGIJyP5E1 MMKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=50iximMvSphDwQpqswihIj4lXQOg9Boh7klpxfN/9Og=; b=zqXmmKQAYZrmlATUIYhvj3P+KxeLttTVzB0zGKosmLd00T1/GNdX2jMOv6Hl/vRzZV yA5009FzNYgwhnYA6IAe6hfRbeeKEGSjcuFjlOsjQXtHmaHK6k3XRX/wGEG/4P/yiQ35 e3GgjGuA93K3BM0ZBkccse1tzI5ErQH2AEYe/AbZipkhdgtA1GjjmWX65Pq348QAF2Ob 4YSAM857lZooWfXu/ur57Ujfw0dMQwk4llSfPTm4r1b3spsaiXb/9fc/uZ0YBWWPuKk7 vzT7BKWoeecPZQoRSsSUsQBPVX6IoQJWtnOHmibUk3aoKWMBaOW+kjkdNUjXi7KXo1KW 476w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G4ckFskA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w1si17339552ply.420.2019.04.23.13.57.22; Tue, 23 Apr 2019 13:57:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G4ckFskA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728206AbfDWU4Z (ORCPT + 99 others); Tue, 23 Apr 2019 16:56:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:54502 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726083AbfDWU4X (ORCPT ); Tue, 23 Apr 2019 16:56:23 -0400 Received: from localhost (unknown [92.54.175.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ABE0721773; Tue, 23 Apr 2019 20:56:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556052982; bh=/mtfMlT9S3bu8R68XKGKKANO3H3+CHMMD/N/At2uZ8k=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=G4ckFskA+iO/JpcMOKUW7HwheN17guohnUamW+b73A7sSC17/SSuFDBkyS5XFHVk0 grjrz+ZEEd67xCwiB86Tdv+Xt3Zw9Lhn5aEmzK5e48n0iHQGhhXqDB8ReR8nZdKSkY PKsqv3RPC4cu+eOQWaUlI1A01hWPWiq4K3bDuWtY= Date: Tue, 23 Apr 2019 21:56:19 +0100 From: Jaegeuk Kim To: Chao Yu Cc: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Subject: Re: [f2fs-dev] [PATCH 1/2] f2fs: allow unfixed f2fs_checkpoint.checksum_offset Message-ID: <20190423205619.GB87257@jaegeuk-macbookpro.roam.corp.google.com> References: <20190422093353.61014-1-yuchao0@huawei.com> <20190423204351.GA87257@jaegeuk-macbookpro.roam.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190423204351.GA87257@jaegeuk-macbookpro.roam.corp.google.com> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/23, Jaegeuk Kim wrote: > On 04/22, Chao Yu wrote: > > Previously, f2fs_checkpoint.checksum_offset points fixed position of > > f2fs_checkpoint structure: > > > > "#define CP_CHKSUM_OFFSET 4092" > > > > It is unnecessary, and it breaks the consecutiveness of nat and sit > > bitmap stored across checkpoint park block and payload blocks. > > > > This patch allows f2fs to handle unfixed .checksum_offset. > > > > In addition, for the case checksum value is stored in the middle of > > checkpoint park, calculating checksum value with superposition method > > like we did for inode_checksum. > > > > Signed-off-by: Chao Yu > > --- > > fs/f2fs/checkpoint.c | 27 +++++++++++++++++++++------ > > include/linux/f2fs_fs.h | 4 ++++ > > 2 files changed, 25 insertions(+), 6 deletions(-) > > > > diff --git a/fs/f2fs/checkpoint.c b/fs/f2fs/checkpoint.c > > index 441814607b13..a25556aef8cc 100644 > > --- a/fs/f2fs/checkpoint.c > > +++ b/fs/f2fs/checkpoint.c > > @@ -794,13 +794,27 @@ static void write_orphan_inodes(struct f2fs_sb_info *sbi, block_t start_blk) > > } > > } > > > > +static __u32 f2fs_checkpoint_chksum(struct f2fs_sb_info *sbi, > > + struct f2fs_checkpoint *ckpt) > > +{ > > + unsigned int chksum_ofs = le32_to_cpu(ckpt->checksum_offset); > > + __u32 chksum; > > + > > + chksum = f2fs_crc32(sbi, ckpt, chksum_ofs); > > + if (chksum_ofs < CP_CHKSUM_OFFSET) { > > + chksum_ofs += sizeof(chksum); > > + chksum = f2fs_chksum(sbi, chksum, (__u8 *)ckpt + chksum_ofs, > > + F2FS_BLKSIZE - chksum_ofs); > > Do we need to cover __cp_payload(sbi) * blksize - chksum_ofs? Self answer - it'd be fine to get 4KB only, since payload will be covered by entire checkpoint pack. > > > + } > > + return chksum; > > +} > > + > > static int get_checkpoint_version(struct f2fs_sb_info *sbi, block_t cp_addr, > > struct f2fs_checkpoint **cp_block, struct page **cp_page, > > unsigned long long *version) > > { > > - unsigned long blk_size = sbi->blocksize; > > size_t crc_offset = 0; > > - __u32 crc = 0; > > + __u32 crc; > > > > *cp_page = f2fs_get_meta_page(sbi, cp_addr); > > if (IS_ERR(*cp_page)) > > @@ -809,15 +823,16 @@ static int get_checkpoint_version(struct f2fs_sb_info *sbi, block_t cp_addr, > > *cp_block = (struct f2fs_checkpoint *)page_address(*cp_page); > > > > crc_offset = le32_to_cpu((*cp_block)->checksum_offset); > > - if (crc_offset > (blk_size - sizeof(__le32))) { > > + if (crc_offset < CP_MIN_CHKSUM_OFFSET || > > + crc_offset > CP_CHKSUM_OFFSET) { > > f2fs_put_page(*cp_page, 1); > > f2fs_msg(sbi->sb, KERN_WARNING, > > "invalid crc_offset: %zu", crc_offset); > > return -EINVAL; > > } > > > > - crc = cur_cp_crc(*cp_block); > > - if (!f2fs_crc_valid(sbi, crc, *cp_block, crc_offset)) { > > + crc = f2fs_checkpoint_chksum(sbi, *cp_block); > > + if (crc != cur_cp_crc(*cp_block)) { > > f2fs_put_page(*cp_page, 1); > > f2fs_msg(sbi->sb, KERN_WARNING, "invalid crc value"); > > return -EINVAL; > > @@ -1425,7 +1440,7 @@ static int do_checkpoint(struct f2fs_sb_info *sbi, struct cp_control *cpc) > > get_sit_bitmap(sbi, __bitmap_ptr(sbi, SIT_BITMAP)); > > get_nat_bitmap(sbi, __bitmap_ptr(sbi, NAT_BITMAP)); > > > > - crc32 = f2fs_crc32(sbi, ckpt, le32_to_cpu(ckpt->checksum_offset)); > > + crc32 = f2fs_checkpoint_chksum(sbi, ckpt); > > *((__le32 *)((unsigned char *)ckpt + > > le32_to_cpu(ckpt->checksum_offset))) > > = cpu_to_le32(crc32); > > diff --git a/include/linux/f2fs_fs.h b/include/linux/f2fs_fs.h > > index 55da9abed023..65559900d4d7 100644 > > --- a/include/linux/f2fs_fs.h > > +++ b/include/linux/f2fs_fs.h > > @@ -164,6 +164,10 @@ struct f2fs_checkpoint { > > unsigned char sit_nat_version_bitmap[1]; > > } __packed; > > > > +#define CP_CHKSUM_OFFSET 4092 /* default chksum offset in checkpoint */ > > +#define CP_MIN_CHKSUM_OFFSET \ > > + (offsetof(struct f2fs_checkpoint, sit_nat_version_bitmap)) > > + > > /* > > * For orphan inode management > > */ > > -- > > 2.18.0.rc1 > > > _______________________________________________ > Linux-f2fs-devel mailing list > Linux-f2fs-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel