Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp1053221pxv; Thu, 1 Jul 2021 16:06:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyWbfNkqGLmBQ0eG4hRsJxFkU4lMLQD6uYUjSkX15xc6wSerZf9/Jbqc0S9/DmXjH6cCPBB X-Received: by 2002:a05:6402:1355:: with SMTP id y21mr2910908edw.136.1625180797791; Thu, 01 Jul 2021 16:06:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625180797; cv=none; d=google.com; s=arc-20160816; b=k0fE29p7hAYkJcLT/Uk6tKNJbwWTv7jhJbcuHlTH1ftlHMw1bNolnUHlgtzdjBu/QF GjSqAOcneCQVGDEVfFeiPsuyBqntE2aUUbCo0hvGoboarDt1ybUkn0aDLpJL1AQZsPXH P667ERXb/czblsgN/DcGv/atoGhge3H0sEe3wNzSQHddY/rj9gzNdqXNaYJYAF6lV0aG 9T2SyGgURIDh3AkoaoZccJ2JNjXmHlZFIPtINMVdMALMKNvGn9bjWhOQwb/F9/cOa86c O5EXOPOO6Szhp/SqtMOpowJKKmdUlgDV6flVLVmD/2AIv4xuWQNPKoa6JYGBXog9jo6a zqSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=Z0/ypX7ChEZh902+dIeB8AqGVWO7s8eM3biezXZVMbo=; b=nUHsr1oChyqeX8qpU7T4evPpdI1UNTHifKuBKSse3AV5YhrT+1ou4lJFiASnik2JNz ZsYmmn5A1/Afy/jCSm2LAe+XFX/wzz3J9W5ubGQWH57o5RMkGJnXheNPUutYvUhAWlDW fZhbY2CuIWsdQykbkux8yUipCkiXmAiR+XzXqQbe0t4g/AZ1HGIw7hXna2Is3dggxi+Y VImrIqwVbnaoOcFZwDLO6P7p/vDFAd15oFh3IX8Rxv4EsHikgzX9J/99cpGTwi/q+Mym o5Ry/zAEt8bF8BCJvQxk+r8hxQPbsU+T2g7V6Q9P7ndUMmLB+OPwvCyGd1HJCfbhcU+w Loqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YO86vBw4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id el8si1299010ejc.275.2021.07.01.16.06.13; Thu, 01 Jul 2021 16:06:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YO86vBw4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234089AbhGAXGp (ORCPT + 99 others); Thu, 1 Jul 2021 19:06:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:32910 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233648AbhGAXGo (ORCPT ); Thu, 1 Jul 2021 19:06:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A3DC1613DC; Thu, 1 Jul 2021 23:04:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625180653; bh=+HiBm4y2G/OI/CCrGo4hwCm699FrUDzFzL1HhjQ1s2A=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=YO86vBw446qb7l/fbFDkIStu00xNLetn6+c2vfY1/FQgoSaG/8o988/hOB/fD1eGG GmSD/s9Du7L9qzcSI0PY9EpLbZ2pRP5+0U4+cJwQ1W4Z41PqNoa8SBTLWlJdAvN6ng ZHeEvFoxx3k11PeJkfZh5s1kMHol5+BkIG7M6frKDmw+6WoxCIru51HLl7d2eI8SGG FKtstFrCLRsjIi/bCtYZZVNpgaww61ii2RMSVBKghrAj/RBgLsqfqPPSjJ0nj7FPdu o88gMK0y0dkR5e6Rn+8qC7HUe0qUwAc2hxDQj0h6DxFxEM9UTjqqq1nGfD2aukek8j 3f2UKK0kJ7ZKQ== Subject: Re: [PATCH v2 RFC] f2fs: fix to force keeping write barrier for strict fsync mode To: Jaegeuk Kim Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org References: <20210601101024.119356-1-yuchao0@huawei.com> From: Chao Yu Message-ID: <648a96f7-2c83-e9ed-0cbd-4ee8e4797724@kernel.org> Date: Fri, 2 Jul 2021 07:04:12 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/7/2 1:10, Jaegeuk Kim wrote: > On 06/01, Chao Yu wrote: >> [1] https://www.mail-archive.com/linux-f2fs-devel@lists.sourceforge.net/msg15126.html >> >> As [1] reported, if lower device doesn't support write barrier, in below >> case: >> >> - write page #0; persist >> - overwrite page #0 >> - fsync >> - write data page #0 OPU into device's cache >> - write inode page into device's cache >> - issue flush > > Well, we have preflush for node writes, so I don't think this is the case. > > fio.op_flags |= REQ_PREFLUSH | REQ_FUA; This is only used for atomic write case, right? I mean the common case which is called from f2fs_issue_flush() in f2fs_do_sync_file(). And please see do_checkpoint(), we call f2fs_flush_device_cache() and commit_checkpoint() separately to keep persistence order of CP datas. See commit 46706d5917f4 ("f2fs: flush cp pack except cp pack 2 page at first") for details. Thanks, > >> >> If SPO is triggered during flush command, inode page can be persisted >> before data page #0, so that after recovery, inode page can be recovered >> with new physical block address of data page #0, however there may >> contains dummy data in new physical block address. >> >> Then what user will see is: after overwrite & fsync + SPO, old data in >> file was corrupted, if any user do care about such case, we can suggest >> user to use STRICT fsync mode, in this mode, we will force to trigger >> preflush command to persist data in device cache in prior to node >> writeback, it avoids potential data corruption during fsync(). >> >> Signed-off-by: Chao Yu >> --- >> v2: >> - fix this by adding additional preflush command rather than using >> atomic write flow. >> fs/f2fs/file.c | 14 ++++++++++++++ >> 1 file changed, 14 insertions(+) >> >> diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c >> index 7d5311d54f63..238ca2a733ac 100644 >> --- a/fs/f2fs/file.c >> +++ b/fs/f2fs/file.c >> @@ -301,6 +301,20 @@ static int f2fs_do_sync_file(struct file *file, loff_t start, loff_t end, >> f2fs_exist_written_data(sbi, ino, UPDATE_INO)) >> goto flush_out; >> goto out; >> + } else { >> + /* >> + * for OPU case, during fsync(), node can be persisted before >> + * data when lower device doesn't support write barrier, result >> + * in data corruption after SPO. >> + * So for strict fsync mode, force to trigger preflush to keep >> + * data/node write order to avoid potential data corruption. >> + */ >> + if (F2FS_OPTION(sbi).fsync_mode == FSYNC_MODE_STRICT && >> + !atomic) { >> + ret = f2fs_issue_flush(sbi, inode->i_ino); >> + if (ret) >> + goto out; >> + } >> } >> go_write: >> /* >> -- >> 2.29.2