Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp2548521ybn; Thu, 26 Sep 2019 13:42:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqyajdl5zRfwycV96raOk7ol50DFVMemI60AmP4x+YwvkFPs9S6El+ppEZl9bhlQNAPsYioM X-Received: by 2002:aa7:dd8e:: with SMTP id g14mr801880edv.233.1569530526467; Thu, 26 Sep 2019 13:42:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569530526; cv=none; d=google.com; s=arc-20160816; b=aP9R66OBPc2jcmWWyyBSeLnLNq1R6LiVzMRG1Lpq8zlwL/K2VBTUasaG/g8cAxc1zU cxnXfgfiR6KhMqrEi0lSw6OXz9JRWtLeTKqgg2XZJnv9xeDjfO0Xdrg3LGmEF17u2j9G SBSOdRaThrGZebeDlTW3G+FIstY+AHe/qVpekGb72gRECtiUFoVzTyWq8QlXEz1OCCKU bWLl1ett5yANjhiLdUBVJ4XFCbftgscMyTv7pLe8ECGGwKQpI0tLApPsmREMI6MH0Uc0 ZMvrIbNM1hyX+34wgZlg0mHuFayS9k+u5yQGEPW//CTV0hpFx8UCQikE7rHbGN374CHb RWcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=4dMIiSb4Vcjz/dbLL+Alk7FB/2RvnkOCh6/NrWjt/Y8=; b=m48gjbof/Efmy35jGw9eI0mRpyt6ARGUp1zXk+Ayy0LY/XOxppKltao5773WgbaIQf 4OuU6cYAQx4fKw65OWBOlC9GFFI3O8T45PAfU6iU/zMEN7Jx6h0XCAWSCWHniNx5IOhQ NHgfbqqyQhsNd/5EmSqtnDmXeEsz0g/TOAnv1BMSBbfdXwMrjpigF1Tuamq4+yF7875A GaCI0xfBtpZ5szevEL6gOmveD4Y7x1f/sIP/+DDzC1A9JA4y0754moeFWhXcsSIo3ZcM 3/WixMK3xfJ3LjO4bXrnkVGUuqMVZFT69Kf2pMTf1DR5qjsiU3ilQSedebbfRhSIEG0Q A4Hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="q+rOV8/b"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si226141edx.302.2019.09.26.13.41.42; Thu, 26 Sep 2019 13:42:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="q+rOV8/b"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728831AbfIZUh7 (ORCPT + 99 others); Thu, 26 Sep 2019 16:37:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:38338 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728719AbfIZUh7 (ORCPT ); Thu, 26 Sep 2019 16:37:59 -0400 Received: from gmail.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3D5A1222C3; Thu, 26 Sep 2019 20:37:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569530278; bh=tl77Fa8o20Wcg+cK5PotYO32YWsmNhCUsbBLzQpNIyc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=q+rOV8/bubTG9L7PMtt35j56ED88jy7zgGX/fqzv7qF2xmJ5r0qe7dD6cPQRqwPi2 bP5xugJnHMkk7AOz8pEKIPoMj5hizkC5qhXpSRBsylY19uJPkyIxQMuxRfNaDCs8TF +DTKKw0wnva0tZl3wwfA8D8sD+Io/ep9TzwGXA5g= Date: Thu, 26 Sep 2019 13:37:56 -0700 From: Eric Biggers To: Chao Yu Cc: jaegeuk@kernel.org, linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Subject: Re: [f2fs-dev] [PATCH] f2fs: fix to avoid data corruption by forbidding SSR overwrite Message-ID: <20190926203755.GA142676@gmail.com> Mail-Followup-To: Chao Yu , jaegeuk@kernel.org, linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net References: <20190816030334.81035-1-yuchao0@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190816030334.81035-1-yuchao0@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 16, 2019 at 11:03:34AM +0800, Chao Yu wrote: > There is one case can cause data corruption. > > - write 4k to fileA > - fsync fileA, 4k data is writebacked to lbaA > - write 4k to fileA > - kworker flushs 4k to lbaB; dnode contain lbaB didn't be persisted yet > - write 4k to fileB > - kworker flush 4k to lbaA due to SSR > - SPOR -> dnode with lbaA will be recovered, however lbaA contains fileB's > data > > One solution is tracking all fsynced file's block history, and disallow > SSR overwrite on newly invalidated block on that file. > > However, during recovery, no matter the dnode is flushed or fsynced, all > previous dnodes until last fsynced one in node chain can be recovered, > that means we need to record all block change in flushed dnode, which > will cause heavy cost, so let's just use simple fix by forbidding SSR > overwrite directly. > > Signed-off-by: Chao Yu > --- > fs/f2fs/segment.c | 8 +++++--- > 1 file changed, 5 insertions(+), 3 deletions(-) > > diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > index 9d9d9a050d59..69b3b553ee6b 100644 > --- a/fs/f2fs/segment.c > +++ b/fs/f2fs/segment.c > @@ -2205,9 +2205,11 @@ static void update_sit_entry(struct f2fs_sb_info *sbi, block_t blkaddr, int del) > if (!f2fs_test_and_set_bit(offset, se->discard_map)) > sbi->discard_blks--; > > - /* don't overwrite by SSR to keep node chain */ > - if (IS_NODESEG(se->type) && > - !is_sbi_flag_set(sbi, SBI_CP_DISABLED)) { > + /* > + * SSR should never reuse block which is checkpointed > + * or newly invalidated. > + */ > + if (!is_sbi_flag_set(sbi, SBI_CP_DISABLED)) { > if (!f2fs_test_and_set_bit(offset, se->ckpt_valid_map)) > se->ckpt_valid_blocks++; > } > -- FYI, this commit caused xfstests generic/064 to start failing: $ kvm-xfstests -c f2fs generic/064 ... generic/064 3s ... [13:36:37][ 5.946293] run fstests generic/064 at 2019-09-26 13:36:37 [13:36:41]- output mismatch (see /results/f2fs/results-default/generic/064.out.bad) --- tests/generic/064.out 2019-09-18 04:53:46.000000000 -0700 +++ /results/f2fs/results-default/generic/064.out.bad 2019-09-26 13:36:41.533018683 -0700 @@ -1,2 +1,3 @@ QA output created by 064 Extent count after inserts is in range +extents mismatched before = 1 after = 50 ... (Run 'diff -u /root/xfstests/tests/generic/064.out /results/f2fs/results-default/generic/064.out.bad' to see the entire diff) Ran: generic/064 Failures: generic/064 Failed 1 of 1 tests