Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp6947301ybn; Mon, 30 Sep 2019 06:23:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqzFpkVjlgphFu/Vrqdod6clRpX4eKFZwDx4DM42GMmKjTKd/HWitnEvm3ewH79yz6DHhVUM X-Received: by 2002:a17:906:234e:: with SMTP id m14mr18726649eja.118.1569849831796; Mon, 30 Sep 2019 06:23:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569849831; cv=none; d=google.com; s=arc-20160816; b=MN4L0BCcqfDn1E8mQWjYnsgcn+q5+NwN1JCpL8SpJekG0o3EhM+iovF/ll/Euzvss5 PaRKrz5DUXR+CWf56V/PW6mCeGO3D0GGhoTABFSG/Eij4I3gaz1xouTBK/zDdjQayO2d zI/d0wXvw7mgny3OMG9LdfW3GE5zvszZKrPCu9d/euQRD6Zvor3nbaZPUoP8SRL25jxW acE1YHxxho8ZP6Q5xPnNeHBg4LKuEN9aaoCpf3QhZ1WnPLDqpRub2mS28z501mQPh+Ep JalEBzFiz5rRzWcGmHi8xH9Qp/SmSQomjBcC4YsA/QCT3HZFFR79k+6UxSivznkVMkuC EoeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=vJKC8tRifRf3HNyjLaXU5WRTpYS1lHKRKsfl5ijFirE=; b=bxB2aY7muXazUg4dxB+fbwFhNIL9qJ10WU8SAbiAS0Ri0F5wzA/Cm+vbHr21fPqGw5 WXeiZPMFHFhYbumRKnfpEYuzJwh7OQBv6L1KVElPmt984QRnWKWuMHbDQg1jj9jhOjae /9TSc1Fvduz4FOFD/gsOcK+T5VWME98jXlTIySamkswJ2AL+kQAJ2L8fdJwtE1EQdDjS NHl15Etzwl9+pvxzxJnlusEQqHVG7Pj8lGAXIBQND/1iVov5zd6s2MpCmmE4jAoHeTGZ M+9bUUJNDmR76JHcmjBLYAbLcYxBgtzzeg1n7xYbRkn1QEex1OkwCBz0Sn7xVd37gzJk mJDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Qjt7PLyX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w1si7009734eda.214.2019.09.30.06.23.27; Mon, 30 Sep 2019 06:23:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Qjt7PLyX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731211AbfI3NW5 (ORCPT + 99 others); Mon, 30 Sep 2019 09:22:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:55958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726314AbfI3NW5 (ORCPT ); Mon, 30 Sep 2019 09:22:57 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE6E820842; Mon, 30 Sep 2019 13:22:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569849777; bh=NOoz7jQaPArbbpYeIUf5LoAONRe+G8mQg90pCHdXJE4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Qjt7PLyXp9eVpDmhw/hnN6sL2hZ5krafz2OHqlgn56cQvIuyNq+vMGO8OimYYXNCv twrukf6GU64c7rrxRkEyyYpgGb1tQJDOcb/ukkwhNBD6lk8t9YmG+zzOddxXYyYFFp go9NFagMHg2UTbw+XykX/Bw+oTCuc0nLSB2BA6Hw= Date: Mon, 30 Sep 2019 09:22:55 -0400 From: Sasha Levin To: Chao Yu Cc: Pavel Machek , Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Jaegeuk Kim Subject: Re: [PATCH 4.19 53/63] f2fs: fix to do sanity check on segment bitmap of LFS curseg Message-ID: <20190930132255.GT8171@sasha-vm> References: <20190929135031.382429403@linuxfoundation.org> <20190929135040.450358370@linuxfoundation.org> <20190930072157.GB22914@atrey.karlin.mff.cuni.cz> <43edc2f2-5b42-0cd7-1573-af77fd9e6678@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <43edc2f2-5b42-0cd7-1573-af77fd9e6678@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 30, 2019 at 03:36:16PM +0800, Chao Yu wrote: >Hello, > >On 2019/9/30 15:21, Pavel Machek wrote: >> Hi! >> >> >>> + for (blkofs += 1; blkofs < sbi->blocks_per_seg; blkofs++) { >>> + if (!f2fs_test_bit(blkofs, se->cur_valid_map)) >>> + continue; >>> +out: >>> + f2fs_msg(sbi->sb, KERN_ERR, >>> + "Current segment's next free block offset is " >>> + "inconsistent with bitmap, logtype:%u, " >>> + "segno:%u, type:%u, next_blkoff:%u, blkofs:%u", >>> + i, curseg->segno, curseg->alloc_type, >>> + curseg->next_blkoff, blkofs); >>> + return -EINVAL; >>> + } >> >> So this is detecting filesystem corruption, right? Should it be >> -EUCLEAN? > >Was fixed in another commit 10f966bbf521 ("f2fs: use generic >EFSBADCRC/EFSCORRUPTED"). :) I've queued up a backport of this for 5.2, 4.19, and 4.14, thanks!. -- Thanks, Sasha