Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp3137260rdb; Wed, 13 Sep 2023 03:19:37 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHqUWW+zB/pZLbgVoXTCsIEXdK2bmP09o+1KD4VoDN4x2qFrASMmPLfAldgm8VrMVk0Cnin X-Received: by 2002:a05:6358:6f86:b0:139:cb15:ecd3 with SMTP id s6-20020a0563586f8600b00139cb15ecd3mr2034291rwn.8.1694600377496; Wed, 13 Sep 2023 03:19:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694600377; cv=none; d=google.com; s=arc-20160816; b=EA9dEZf5enibR44ik4AvsH866TksH1mdgPq1qTjiecEZvkSyxmUAxZP+3YmJSQpJch ThQfJp8nqQaxrDpK7ZhoyYAcXBbXMPYQvswPJgA+ErXijvSFno14gRBCAbRUuTiVUri6 hrL0sANsZY0LjtXW+IrGZfuvAwhVOBOEvWucekX18BTbFi/CD4aAO9kxVijqke12Ph/N BclJds7S4JoiKSVFFgzGV5ie8xIUx3/crZbNXkO6aBkpIP8FfA7YnRNNdX0iXAJm3ZXL 4Ln+mpAXqi52GiIJQ0fEt/sIuYV0pFb4Qt15SbMGKQISS9hhMweH5Hbmp4R1tdHtwfGN Dt/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:cc:to:from:mime-version:references :in-reply-to:message-id:date; bh=EoHbDfhQfHSUIOkHMsna1f3xDh6rmf25IpWzS8ggiR8=; fh=EMzED+zofusF5j08LBC86pJPAqwv6htl3rDPQnaSJCU=; b=R/bq+P4mDzRBhIQXZ2SSkC5Hy8N/saJO33lt0KhOVN+uPA1c357iEi2FfLqLp4ai6D 5XyHSadmzN1Wng00o+2SMYq/jwO4sIEH1gWIxqDLdu9Qd+JeM7E2eY1csO9U89y9OicX dt404KoNdKBDFJZLq0sUX0YE7Oyp1QOJj5c7WxJxaZtGwWflKExzmztgC6EaJ/PtLHoU wUaf7HeSc3w3UvXzTm8pMRQ00i6PfwAwE734UEa52GaysKTNEBPADmYXpJuGsj6N0us5 G3sNa1h49M7cR2s9CyOCF0QPyzaep5tOPFErX4hZN+JG1KfqkibCk1TWMeFpYCB07FIL 9POA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id dc11-20020a056a0035cb00b0068e241eef99si9608604pfb.316.2023.09.13.03.19.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Sep 2023 03:19:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 2569C80B1333; Wed, 13 Sep 2023 03:16:27 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239615AbjIMKQY (ORCPT + 99 others); Wed, 13 Sep 2023 06:16:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239536AbjIMKQX (ORCPT ); Wed, 13 Sep 2023 06:16:23 -0400 Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B11119B0; Wed, 13 Sep 2023 03:16:17 -0700 (PDT) Received: from mxct.zte.com.cn (unknown [192.168.251.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4RlxDq6Xn4z4xPGH; Wed, 13 Sep 2023 18:16:11 +0800 (CST) Received: from mse-fl2.zte.com.cn (unknown [10.5.228.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxct.zte.com.cn (FangMail) with ESMTPS id 4RlxDr1Ljdz4xVbt; Wed, 13 Sep 2023 18:16:12 +0800 (CST) Received: from szxlzmapp04.zte.com.cn ([10.5.231.166]) by mse-fl2.zte.com.cn with SMTP id 38DAG1oD094580; Wed, 13 Sep 2023 18:16:01 +0800 (+08) (envelope-from cheng.lin130@zte.com.cn) Received: from mapi (szxlzmapp07[null]) by mapi (Zmail) with MAPI id mid14; Wed, 13 Sep 2023 18:16:03 +0800 (CST) Date: Wed, 13 Sep 2023 18:16:03 +0800 (CST) X-Zmail-TransId: 2b0965018be32b5-cea0c X-Mailer: Zmail v1.0 Message-ID: <202309131816038673861@zte.com.cn> In-Reply-To: References: 202309111612569712762@zte.com.cn,ZQDlXPJJvp7wctbZ@dread.disaster.area Mime-Version: 1.0 From: To: , , Cc: , , , , , , Subject: =?UTF-8?B?UmU6IFtQQVRDSCB2Ml0geGZzOiBpbnRyb2R1Y2UgcHJvdGVjdGlvbiBmb3IgZHJvcCBubGluaw==?= Content-Type: text/plain; charset="UTF-8" X-MAIL: mse-fl2.zte.com.cn 38DAG1oD094580 X-Fangmail-Gw-Spam-Type: 0 X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 65018BEB.000/4RlxDq6Xn4z4xPGH Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 13 Sep 2023 03:16:27 -0700 (PDT) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email > On Mon, Sep 11, 2023 at 04:12:56PM +0800, cheng.lin130@zte.com.cn wrote: > > From: Cheng Lin > > > > When abnormal drop_nlink are detected on the inode, > > shutdown filesystem, to avoid corruption propagation. > > > > Signed-off-by: Cheng Lin > > --- > > fs/xfs/xfs_fsops.c | 3 +++ > > fs/xfs/xfs_inode.c | 9 +++++++++ > > fs/xfs/xfs_mount.h | 1 + > > 3 files changed, 13 insertions(+) > > > > diff --git a/fs/xfs/xfs_fsops.c b/fs/xfs/xfs_fsops.c > > index 7cb75cb6b..6fc1cfe83 100644 > > --- a/fs/xfs/xfs_fsops.c > > +++ b/fs/xfs/xfs_fsops.c > > @@ -543,6 +543,9 @@ xfs_do_force_shutdown( > > } else if (flags & SHUTDOWN_CORRUPT_ONDISK) { > > tag = XFS_PTAG_SHUTDOWN_CORRUPT; > > why = "Corruption of on-disk metadata"; > > + } else if (flags & SHUTDOWN_CORRRUPT_ABN) { > > + tag = XFS_PTAG_SHUTDOWN_CORRUPT; > > + why = "Corruption of Abnormal conditions"; > We don't need a new shutdown tag. We can consider this in-memory > corruption because we detected it in memory before it went to disk > (SHUTDOWN_CORRUPT_INCORE) or even on-disk corruption because the > reference count on disk is likely wrong at this point...... > > } else if (flags & SHUTDOWN_DEVICE_REMOVED) { > > tag = XFS_PTAG_SHUTDOWN_IOERROR; > > why = "Block device removal"; > > diff --git a/fs/xfs/xfs_inode.c b/fs/xfs/xfs_inode.c > > index 9e62cc500..2d41f2461 100644 > > --- a/fs/xfs/xfs_inode.c > > +++ b/fs/xfs/xfs_inode.c > > @@ -919,6 +919,15 @@ xfs_droplink( > > xfs_trans_t *tp, > > xfs_inode_t *ip) > > { > > + > > + if (VFS_I(ip)->i_nlink == 0) { > > + xfs_alert(ip->i_mount, > > + "%s: Deleting inode %llu with no links.", > > + __func__, ip->i_ino); > > + xfs_force_shutdown(ip->i_mount, SHUTDOWN_CORRRUPT_ABN); > > + return -EFSCORRUPTED; > > + } > > + > > xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG); > > > > drop_nlink(VFS_I(ip)); > I'd kind of prefer that drop_nlink() be made to return an error on > underrun - if it's important enough to drop a warning in the log and > potentially panic the kernel, it's important enough to tell the > filesystem an underrun has occurred. But that opens a whole new can > of worms, so I think this will be fine. In VFS, (drop\clear\set\inc)_nlink() all return void. Is it appropriate, if let them return an error instead of WARN_ON? > Note that we don't actually need a call to shut the filesystem down. > Simply returning -EFSCORRUPTED will result in the filesystem being > shut down if the transaction is dirty when it gets cancelled due to > the droplink error. > Cheers, > Dave. > -- > Dave Chinner > david@fromorbit.com