Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp4697846iob; Sun, 8 May 2022 22:25:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwS0fTfz7d/9WteG5V9lC17/9HqQdt3Zwa642us7P+3GTqZ7xV7YK1fZC7j49gX4XlXFDWR X-Received: by 2002:a17:90b:1b52:b0:1dc:54ea:ac00 with SMTP id nv18-20020a17090b1b5200b001dc54eaac00mr24858759pjb.99.1652073904851; Sun, 08 May 2022 22:25:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652073904; cv=none; d=google.com; s=arc-20160816; b=jVyd1Ku9Pn//KznBsawnYrDHaJxjlubcOY24ICFyy67GTqvaTUsJ0yxUuvFDarapLe uj9KpXy2nvFOQOOeOUbzTyFqj/3vHr/hfFkJCld6rcenkFoAmcaiPsrHNIKkpxuG8lVz x5ESOSaiUaIKsE+SCkyxK2V+cISji17lfgZB/PsWtBNiKozqqfk6VcrNayfSiW5osT4d wmildJ6vm7BSh4llQRoTYUjejnY7PZjNfllpAbSa41woBbWradNGwasir8lAzL2GavId hDIj+ckJoPVAkvGO3pU3DIFPBazvThrVQdxoOtamUl6Jp209Mt09izRvibrUkQu8wINj XWgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=zjo/vO4e+Sz4K4LcAtBeq4Anr6L5ae5Ggz50S5ohkgE=; b=dXrLd4Uj90g8nyQBMiP/7oopnkiB9eO3jF9V2xNmzmA2rg6gqyVvhCPSEk/ctEpR7l rKNaVEMgwUdTLUnidbvAoLjo+0Zg2v8R5E0j6JFkHk8+80CLvzGgkbZygn7AR2d4vC1z IAUuJcf1zicFaPDN/yd11sAkwxwzFXO4LLA2cXmOzszAbZLdKinOkN6i1RGfxuwj6Gxe Zt2iioxXM31lrklHzdhqcMri84/Lu0/tkP5U4sZ0iwZIcGdyzs+lnZDPxuU4E58GTKpm JBHaIqT4RD0sm3VWu/waHsztnZ+CX9je2IWumubBkRI4Sl7ShUuW0O3xlXDl2YYRpzko LUlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BZEcob0+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id p24-20020a056a0026d800b004fa3a8e001asi11445052pfw.209.2022.05.08.22.25.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 May 2022 22:25:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BZEcob0+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 71D4110FC61; Sun, 8 May 2022 22:21:31 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1387963AbiEFBhE (ORCPT + 99 others); Thu, 5 May 2022 21:37:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54748 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1387974AbiEFBhB (ORCPT ); Thu, 5 May 2022 21:37:01 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3BF1B62134; Thu, 5 May 2022 18:33:16 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E121FB83219; Fri, 6 May 2022 01:33:14 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 87574C385A4; Fri, 6 May 2022 01:33:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651800793; bh=jMRV6olJyBYv8iv039xz+xRblr+veqvj9hxwcdJ9uEU=; h=From:To:Cc:Subject:Date:From; b=BZEcob0+Hhw3fJiKkLL5pQsIEe2p/mlUjC8gUQhkqcaZVhfCMRZcNWgBNHzloGRRT Gn5nyp2UTnk6SbdxrcySTt4DE9flw+mT9rI1xwVxpjO13ERs7gGKZsLNntA2iMAFnz +UErJn2VIMAj/iWu6t/uZ70aJobQEwUUS7sgvmeDeU1qdU8f3BY+HrMyTOQCpNdW3J NLPWl+mW7dNnCn7lHviARSpGp/Z0e+Af6FpHcPZpf8Ky47Jrvc3YRnZQLh2ZeVBDYH 3QxtK04FflxKDqvqx61GPawW48NEnVO4wATH6uoWpcRUjObLDENGjR75NE/u1ox3do 3AN3La+et1IFA== From: Chao Yu To: jaegeuk@kernel.org Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Chao Yu , stable@vger.kernel.org, Ming Yan , Chao Yu Subject: [PATCH v4] f2fs: fix to do sanity check on total_data_blocks Date: Fri, 6 May 2022 09:33:06 +0800 Message-Id: <20220506013306.3563504-1-chao@kernel.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As Yanming reported in bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=215916 The kernel message is shown below: kernel BUG at fs/f2fs/segment.c:2560! Call Trace: allocate_segment_by_default+0x228/0x440 f2fs_allocate_data_block+0x13d1/0x31f0 do_write_page+0x18d/0x710 f2fs_outplace_write_data+0x151/0x250 f2fs_do_write_data_page+0xef9/0x1980 move_data_page+0x6af/0xbc0 do_garbage_collect+0x312f/0x46f0 f2fs_gc+0x6b0/0x3bc0 f2fs_balance_fs+0x921/0x2260 f2fs_write_single_data_page+0x16be/0x2370 f2fs_write_cache_pages+0x428/0xd00 f2fs_write_data_pages+0x96e/0xd50 do_writepages+0x168/0x550 __writeback_single_inode+0x9f/0x870 writeback_sb_inodes+0x47d/0xb20 __writeback_inodes_wb+0xb2/0x200 wb_writeback+0x4bd/0x660 wb_workfn+0x5f3/0xab0 process_one_work+0x79f/0x13e0 worker_thread+0x89/0xf60 kthread+0x26a/0x300 ret_from_fork+0x22/0x30 RIP: 0010:new_curseg+0xe8d/0x15f0 The root cause is: ckpt.valid_block_count is inconsistent with SIT table, stat info indicates filesystem has free blocks, but SIT table indicates filesystem has no free segment. So that during garbage colloection, it triggers panic when LFS allocator fails to find free segment. This patch tries to fix this issue by checking consistency in between ckpt.valid_block_count and block accounted from SIT. Cc: stable@vger.kernel.org Reported-by: Ming Yan Signed-off-by: Chao Yu --- v4: - fix to set data/node type correctly. fs/f2fs/segment.c | 37 ++++++++++++++++++++++++++----------- 1 file changed, 26 insertions(+), 11 deletions(-) diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c index 3a3e2cec2ac4..4735d477059d 100644 --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -4461,7 +4461,8 @@ static int build_sit_entries(struct f2fs_sb_info *sbi) unsigned int i, start, end; unsigned int readed, start_blk = 0; int err = 0; - block_t total_node_blocks = 0; + block_t sit_valid_blocks[2] = {0, 0}; + int type; do { readed = f2fs_ra_meta_pages(sbi, start_blk, BIO_MAX_VECS, @@ -4486,8 +4487,9 @@ static int build_sit_entries(struct f2fs_sb_info *sbi) if (err) return err; seg_info_from_raw_sit(se, &sit); - if (IS_NODESEG(se->type)) - total_node_blocks += se->valid_blocks; + + type = IS_NODESEG(se->type) ? NODE : DATA; + sit_valid_blocks[type] += se->valid_blocks; if (f2fs_block_unit_discard(sbi)) { /* build discard map only one time */ @@ -4527,15 +4529,17 @@ static int build_sit_entries(struct f2fs_sb_info *sbi) sit = sit_in_journal(journal, i); old_valid_blocks = se->valid_blocks; - if (IS_NODESEG(se->type)) - total_node_blocks -= old_valid_blocks; + + type = IS_NODESEG(se->type) ? NODE : DATA; + sit_valid_blocks[type] -= old_valid_blocks; err = check_block_count(sbi, start, &sit); if (err) break; seg_info_from_raw_sit(se, &sit); - if (IS_NODESEG(se->type)) - total_node_blocks += se->valid_blocks; + + type = IS_NODESEG(se->type) ? NODE : DATA; + sit_valid_blocks[type] += se->valid_blocks; if (f2fs_block_unit_discard(sbi)) { if (is_set_ckpt_flags(sbi, CP_TRIMMED_FLAG)) { @@ -4557,13 +4561,24 @@ static int build_sit_entries(struct f2fs_sb_info *sbi) } up_read(&curseg->journal_rwsem); - if (!err && total_node_blocks != valid_node_count(sbi)) { + if (err) + return err; + + if (sit_valid_blocks[NODE] != valid_node_count(sbi)) { f2fs_err(sbi, "SIT is corrupted node# %u vs %u", - total_node_blocks, valid_node_count(sbi)); - err = -EFSCORRUPTED; + sit_valid_blocks[NODE], valid_node_count(sbi)); + return -EFSCORRUPTED; } - return err; + if (sit_valid_blocks[DATA] + sit_valid_blocks[NODE] > + valid_user_blocks(sbi)) { + f2fs_err(sbi, "SIT is corrupted data# %u %u vs %u", + sit_valid_blocks[DATA], sit_valid_blocks[NODE], + valid_user_blocks(sbi)); + return -EFSCORRUPTED; + } + + return 0; } static void init_free_segmap(struct f2fs_sb_info *sbi) -- 2.25.1