Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp3649794rdb; Wed, 27 Dec 2023 15:06:30 -0800 (PST) X-Google-Smtp-Source: AGHT+IGhsio4ZqhgGsu7w7qNM1cU0xY44c1ymxbPeboJ3wU7AlSMyJ383+cETcYaJL0J8eOQSgfd X-Received: by 2002:a05:6e02:1a6a:b0:35f:f7cd:e5a5 with SMTP id w10-20020a056e021a6a00b0035ff7cde5a5mr10986409ilv.52.1703718390276; Wed, 27 Dec 2023 15:06:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703718390; cv=none; d=google.com; s=arc-20160816; b=FTqDEQgqMccXGL29OTg+iE7+c2Tb1dBYbIJw80niWRQVoD5nQNUk54n6UWj+1uIQ// 22ASRXaG6f/PnB67G6GH+MuezS0CBBCYVSEJ+RPB0oYF4xc1khvQwNwt6TXeXcUyC/Ve 6RRM44M+VOmhXD+fu1bQAtV+WsVMXBKMko40mZuwFPhGfzrepCHqY2I9f16zS62EVGU2 KneJU4huY7EHixVXGu4dNjyVW+E9c8QMPuOcAdfoAJr7H753EkSdrDTKlTTQgqWk8eF/ n1l6PmxklAh1rMDDcrbheBPJ4bF9N8bNlZI8BuV0sxCs4PN8cOvRaTjCJVGLVdlulPZD Nmiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=UMk1/MX6YdTVj/hg0Ytkgcubv/poRwAllKHW9d3R1wo=; fh=/W2dXBmPOYAkmC9wIpZGDoyRD7a7iUo6ekQ/c7AKhqw=; b=b9Ub7Pzz1EaNYHhhJSUBk5ESdmW4tLgmpsC1oYYzbjEFHDkX4RY3jF63HSBqwpK6cp h1J7cFc6r6Uldyip8kYj+dE+aQYrRhI5QYwChazv9XnedGO8MlMztpRxp+J3I1mBUMtr tdO0+GVyr4lOXMLSEyTVYJIS5BHnXjgkVhVGl3MzPEbefET2mJysT9ZUiVD9ljNSq1kP EWHy5iyFuBtJZadvwYPN3iTMSU7lJH+SDBccKPaHg6kETxg/fTEanL0kIT9j3OXz8xd3 0/mXYNb5JxjelgmgdJ/xW8o1YnMh/noCRlnbFMXXOTnkTpK5HWRegfR36+HC7gzsqww0 b/Cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gmX64N9R; spf=pass (google.com: domain of linux-kernel+bounces-12303-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12303-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id h5-20020a636c05000000b005cde42fcb11si11631692pgc.707.2023.12.27.15.06.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Dec 2023 15:06:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-12303-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gmX64N9R; spf=pass (google.com: domain of linux-kernel+bounces-12303-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12303-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id DC136283562 for ; Wed, 27 Dec 2023 23:06:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id EB49349891; Wed, 27 Dec 2023 23:06:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gmX64N9R" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 26F931DFF3 for ; Wed, 27 Dec 2023 23:06:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7EE1EC433C7; Wed, 27 Dec 2023 23:06:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1703718383; bh=U52u8+3MgI51eCYNOsZVZquc2Ob18O3RKpyOMOcjrJk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gmX64N9ROcorH1GhEAIEnblSXxG+bfDQJz9OgXTx77uJlwczEXu1Z7XeshOdp2dy8 J+sN1Dr77+LIIpxpUBmLXVMZuvOoOaIkMlI6x6H7uP261QrXxQe2AS6OE2ktveblmQ 0dpNHimLHAEBIwNknMSTh3QheEmoWEbHpyF01dFXKMDbZHidf9I1yaA7bFXF9nP05C zlLIsGjQsBVClEi3L3i5qtPFsJPgbtpEZ97w8M2uGLMH6bMxxrChAFMOVt/QiP9olT CmEG1RjF/C66oUb8tWNWi00hyn2+O+lzGUy06cT8IL51c4NU5DXq00VfLDqMFRcqSb /6cDvO5w9JUJA== Date: Wed, 27 Dec 2023 15:06:21 -0800 From: Jaegeuk Kim To: Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 6/6] f2fs: introduce FAULT_INCONSISTENCE Message-ID: References: <20231225144335.2548-1-chao@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231225144335.2548-1-chao@kernel.org> On 12/25, Chao Yu wrote: > We will encounter below inconsistent status when FAULT_BLKADDR type > fault injection is on. > > Info: checkpoint state = d6 : nat_bits crc fsck compacted_summary orphan_inodes sudden-power-off > [ASSERT] (fsck_chk_inode_blk:1254) --> ino: 0x1c100 has i_blocks: 000000c0, but has 191 blocks > [FIX] (fsck_chk_inode_blk:1260) --> [0x1c100] i_blocks=0x000000c0 -> 0xbf > [FIX] (fsck_chk_inode_blk:1269) --> [0x1c100] i_compr_blocks=0x00000026 -> 0x27 > [ASSERT] (fsck_chk_inode_blk:1254) --> ino: 0x1cadb has i_blocks: 0000002f, but has 46 blocks > [FIX] (fsck_chk_inode_blk:1260) --> [0x1cadb] i_blocks=0x0000002f -> 0x2e > [FIX] (fsck_chk_inode_blk:1269) --> [0x1cadb] i_compr_blocks=0x00000011 -> 0x12 > [ASSERT] (fsck_chk_inode_blk:1254) --> ino: 0x1c62c has i_blocks: 00000002, but has 1 blocks > [FIX] (fsck_chk_inode_blk:1260) --> [0x1c62c] i_blocks=0x00000002 -> 0x1 > > After we inject fault into f2fs_is_valid_blkaddr() during truncation, > a) it missed to increase @nr_free or @valid_blocks > b) it can cause in blkaddr leak in truncated dnode > Which may cause inconsistent status. > > This patch separates FAULT_INCONSISTENCE from FAULT_BLKADDR, so that Could you please rename FAULT_INCONSISTENCE to give exactly what it tries to break? > we can: > a) use FAULT_INCONSISTENCE in f2fs_truncate_data_blocks_range() to > simulate inconsistent issue independently, > b) FAULT_BLKADDR fault will not cause any inconsistent status, we can > just use it to check error path handling in kernel side. > > Signed-off-by: Chao Yu > --- > v2: > - make __f2fs_is_valid_blkaddr() void. > Documentation/ABI/testing/sysfs-fs-f2fs | 1 + > Documentation/filesystems/f2fs.rst | 1 + > fs/f2fs/checkpoint.c | 19 +++++++++++++++---- > fs/f2fs/f2fs.h | 3 +++ > fs/f2fs/file.c | 8 ++++++-- > fs/f2fs/super.c | 1 + > 6 files changed, 27 insertions(+), 6 deletions(-) > > diff --git a/Documentation/ABI/testing/sysfs-fs-f2fs b/Documentation/ABI/testing/sysfs-fs-f2fs > index 4f1d4e636d67..649aabac16c2 100644 > --- a/Documentation/ABI/testing/sysfs-fs-f2fs > +++ b/Documentation/ABI/testing/sysfs-fs-f2fs > @@ -708,6 +708,7 @@ Description: Support configuring fault injection type, should be > FAULT_DQUOT_INIT 0x000010000 > FAULT_LOCK_OP 0x000020000 > FAULT_BLKADDR 0x000040000 > + FAULT_INCONSISTENCE 0x000080000 > =================== =========== > > What: /sys/fs/f2fs//discard_io_aware_gran > diff --git a/Documentation/filesystems/f2fs.rst b/Documentation/filesystems/f2fs.rst > index d32c6209685d..5616fb8ae207 100644 > --- a/Documentation/filesystems/f2fs.rst > +++ b/Documentation/filesystems/f2fs.rst > @@ -206,6 +206,7 @@ fault_type=%d Support configuring fault injection type, should be > FAULT_DQUOT_INIT 0x000010000 > FAULT_LOCK_OP 0x000020000 > FAULT_BLKADDR 0x000040000 > + FAULT_INCONSISTENCE 0x000080000 > =================== =========== > mode=%s Control block allocation mode which supports "adaptive" > and "lfs". In "lfs" mode, there should be no random > diff --git a/fs/f2fs/checkpoint.c b/fs/f2fs/checkpoint.c > index b0597a539fc5..84546f529cf0 100644 > --- a/fs/f2fs/checkpoint.c > +++ b/fs/f2fs/checkpoint.c > @@ -170,12 +170,9 @@ static bool __is_bitmap_valid(struct f2fs_sb_info *sbi, block_t blkaddr, > return exist; > } > > -bool f2fs_is_valid_blkaddr(struct f2fs_sb_info *sbi, > +static bool __f2fs_is_valid_blkaddr(struct f2fs_sb_info *sbi, > block_t blkaddr, int type) > { > - if (time_to_inject(sbi, FAULT_BLKADDR)) > - return false; > - > switch (type) { > case META_NAT: > break; > @@ -230,6 +227,20 @@ bool f2fs_is_valid_blkaddr(struct f2fs_sb_info *sbi, > return true; > } > > +bool f2fs_is_valid_blkaddr(struct f2fs_sb_info *sbi, > + block_t blkaddr, int type) > +{ > + if (time_to_inject(sbi, FAULT_BLKADDR)) > + return false; > + return __f2fs_is_valid_blkaddr(sbi, blkaddr, type); > +} > + > +bool f2fs_is_valid_blkaddr_raw(struct f2fs_sb_info *sbi, > + block_t blkaddr, int type) > +{ > + return __f2fs_is_valid_blkaddr(sbi, blkaddr, type); > +} > + > /* > * Readahead CP/NAT/SIT/SSA/POR pages > */ > diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > index 34b20700b5ec..3985296e64cb 100644 > --- a/fs/f2fs/f2fs.h > +++ b/fs/f2fs/f2fs.h > @@ -61,6 +61,7 @@ enum { > FAULT_DQUOT_INIT, > FAULT_LOCK_OP, > FAULT_BLKADDR, > + FAULT_INCONSISTENCE, > FAULT_MAX, > }; > > @@ -3767,6 +3768,8 @@ struct page *f2fs_get_meta_page_retry(struct f2fs_sb_info *sbi, pgoff_t index); > struct page *f2fs_get_tmp_page(struct f2fs_sb_info *sbi, pgoff_t index); > bool f2fs_is_valid_blkaddr(struct f2fs_sb_info *sbi, > block_t blkaddr, int type); > +bool f2fs_is_valid_blkaddr_raw(struct f2fs_sb_info *sbi, > + block_t blkaddr, int type); > int f2fs_ra_meta_pages(struct f2fs_sb_info *sbi, block_t start, int nrpages, > int type, bool sync); > void f2fs_ra_meta_pages_cond(struct f2fs_sb_info *sbi, pgoff_t index, > diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c > index 9f4e21b5916c..b5149f1f2a20 100644 > --- a/fs/f2fs/file.c > +++ b/fs/f2fs/file.c > @@ -590,9 +590,13 @@ void f2fs_truncate_data_blocks_range(struct dnode_of_data *dn, int count) > f2fs_set_data_blkaddr(dn, NULL_ADDR); > > if (__is_valid_data_blkaddr(blkaddr)) { > - if (!f2fs_is_valid_blkaddr(sbi, blkaddr, > - DATA_GENERIC_ENHANCE)) > + if (time_to_inject(sbi, FAULT_INCONSISTENCE)) > + continue; > + if (!f2fs_is_valid_blkaddr_raw(sbi, blkaddr, > + DATA_GENERIC_ENHANCE)) { > + f2fs_handle_error(sbi, ERROR_INVALID_BLKADDR); > continue; > + } > if (compressed_cluster) > valid_blocks++; > } > diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c > index 206d03c82d96..9a5c5e06f766 100644 > --- a/fs/f2fs/super.c > +++ b/fs/f2fs/super.c > @@ -62,6 +62,7 @@ const char *f2fs_fault_name[FAULT_MAX] = { > [FAULT_DQUOT_INIT] = "dquot initialize", > [FAULT_LOCK_OP] = "lock_op", > [FAULT_BLKADDR] = "invalid blkaddr", > + [FAULT_INCONSISTENCE] = "inconsistence", > }; > > void f2fs_build_fault_attr(struct f2fs_sb_info *sbi, unsigned int rate, > -- > 2.40.1