Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp2613303ybn; Thu, 26 Sep 2019 14:49:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZdeubZ/UM1UXXfw78PERKFUg8Y366wJVECeLziG6Xmj7IkYYP3ydHS0SjqZKP66NzPusS X-Received: by 2002:a17:906:4b41:: with SMTP id j1mr5116692ejv.162.1569534574383; Thu, 26 Sep 2019 14:49:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569534574; cv=none; d=google.com; s=arc-20160816; b=VDoZOJu4dMknqM99LvEZKjAb+bmkXVc1Jrx+5eYd6vINjMz/pm3tU+coW7/dYgthIJ PTxkSrDWU4qIQ0sPh7SK9M2SSVtkGjtdZmCTiq5e1CBLkN1judvU6FGe98Eks+ROcUZ+ pBrcpW3tFwyoUB6ce/c6BJxcH5FabqzRdW5awIrnT4KeKU+mTrAT41PC0FsZwFsBrffm kIDyEaFLlAa/8M0uoXC4rx7vAdju+tnCKCnxrNywDpHYRbJdUprFjXXqcBbL3dI6RO71 1tUKLVoQq1/QsnYdun5ibkDjTVjFJAMLMP+lLJSyaos9bd56tzSpLu3HGCGOVd28u2MD gGFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:dkim-signature; bh=2KPW+2BOz6w12FXjz6iUT802oJg8Rj0OuRk5pQKQYQQ=; b=DhheIOsvJulH7Z41Za2sqDov7BjwtQ/7VhdETbEAjhxbDul8UVJrPRL1zDusx5ZvBg 7tRUTs4c8F6RTQmO+PHXCbV2NBfgWPO1NRoLelQ7wA+jxoSYhu3sA86egWzg8rxN6Ryr ZrD6RzLpe8Q7ciFD7uStsSdTt1qTdMDFe7ok5YtX1pssW14SKFqzUUCj3d+xRXoyYKJ8 a0K1rGlxOOS28ONwiDWK4/ELCXOWz+/tx1aT3QREq9/7iBPBSuHAtkUMu15zhasq9a7r PhJd6yQzIyG4YncXAuvDxLMFZH4bREkvwi817Y7s9G1yYZ9+85zRj+s4z7QSWJB/0b5N cn/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HulqdxyF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j14si347349eda.181.2019.09.26.14.49.10; Thu, 26 Sep 2019 14:49:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HulqdxyF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726061AbfIZVqz (ORCPT + 99 others); Thu, 26 Sep 2019 17:46:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:35222 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725793AbfIZVqz (ORCPT ); Thu, 26 Sep 2019 17:46:55 -0400 Received: from localhost (unknown [104.132.0.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 87A8520835; Thu, 26 Sep 2019 21:46:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569534414; bh=YFSTeeZZg2BEdjJrQ0yOpq9LuFuTUYJSINpPZwsXoNA=; h=Date:From:To:Subject:References:In-Reply-To:From; b=HulqdxyFFzYLCuFdB6S8z4wjmKjtrInzlxyS0r7j/rI3lUQ/NKMufJxWyMb4I1Fe8 DQUy1gQBOQjsiQe+082e8TftblxkJ1A6v8FDtwqcgJZ0lmHuu+wnP+voM3dR+z2YWp /+Vcsje0As2K42GFUjvwCmLPw/nZDOAIctfJMo+c= Date: Thu, 26 Sep 2019 14:46:53 -0700 From: Jaegeuk Kim To: Chao Yu , linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Subject: Re: [f2fs-dev] [PATCH] f2fs: fix to avoid data corruption by forbidding SSR overwrite Message-ID: <20190926214653.GA29685@jaegeuk-macbookpro.roam.corp.google.com> References: <20190816030334.81035-1-yuchao0@huawei.com> <20190926203755.GA142676@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190926203755.GA142676@gmail.com> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/26, Eric Biggers wrote: > On Fri, Aug 16, 2019 at 11:03:34AM +0800, Chao Yu wrote: > > There is one case can cause data corruption. > > > > - write 4k to fileA > > - fsync fileA, 4k data is writebacked to lbaA > > - write 4k to fileA > > - kworker flushs 4k to lbaB; dnode contain lbaB didn't be persisted yet > > - write 4k to fileB > > - kworker flush 4k to lbaA due to SSR > > - SPOR -> dnode with lbaA will be recovered, however lbaA contains fileB's > > data > > > > One solution is tracking all fsynced file's block history, and disallow > > SSR overwrite on newly invalidated block on that file. > > > > However, during recovery, no matter the dnode is flushed or fsynced, all > > previous dnodes until last fsynced one in node chain can be recovered, > > that means we need to record all block change in flushed dnode, which > > will cause heavy cost, so let's just use simple fix by forbidding SSR > > overwrite directly. > > > > Signed-off-by: Chao Yu > > --- > > fs/f2fs/segment.c | 8 +++++--- > > 1 file changed, 5 insertions(+), 3 deletions(-) > > > > diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > > index 9d9d9a050d59..69b3b553ee6b 100644 > > --- a/fs/f2fs/segment.c > > +++ b/fs/f2fs/segment.c > > @@ -2205,9 +2205,11 @@ static void update_sit_entry(struct f2fs_sb_info *sbi, block_t blkaddr, int del) > > if (!f2fs_test_and_set_bit(offset, se->discard_map)) > > sbi->discard_blks--; > > > > - /* don't overwrite by SSR to keep node chain */ > > - if (IS_NODESEG(se->type) && > > - !is_sbi_flag_set(sbi, SBI_CP_DISABLED)) { > > + /* > > + * SSR should never reuse block which is checkpointed > > + * or newly invalidated. > > + */ > > + if (!is_sbi_flag_set(sbi, SBI_CP_DISABLED)) { > > if (!f2fs_test_and_set_bit(offset, se->ckpt_valid_map)) > > se->ckpt_valid_blocks++; > > } > > -- > > FYI, this commit caused xfstests generic/064 to start failing: Yup, I was looking at this. > > $ kvm-xfstests -c f2fs generic/064 > ... > generic/064 3s ... [13:36:37][ 5.946293] run fstests generic/064 at 2019-09-26 13:36:37 > [13:36:41]- output mismatch (see /results/f2fs/results-default/generic/064.out.bad) > --- tests/generic/064.out 2019-09-18 04:53:46.000000000 -0700 > +++ /results/f2fs/results-default/generic/064.out.bad 2019-09-26 13:36:41.533018683 -0700 > @@ -1,2 +1,3 @@ > QA output created by 064 > Extent count after inserts is in range > +extents mismatched before = 1 after = 50 > ... > (Run 'diff -u /root/xfstests/tests/generic/064.out /results/f2fs/results-default/generic/064.out.bad' to see the entire diff) > Ran: generic/064 > Failures: generic/064 > Failed 1 of 1 tests