Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp937848pxy; Wed, 28 Apr 2021 17:58:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLcNIsZRJ3WyLLN1kt1maQOEzEvwHf4SayFL6ABRkZItEDFuMcKzxU11vpqlsf6oiSg3XI X-Received: by 2002:a17:90a:72cb:: with SMTP id l11mr226238pjk.57.1619657901247; Wed, 28 Apr 2021 17:58:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619657901; cv=none; d=google.com; s=arc-20160816; b=wiRuxbYhlmYIYU1DNsRcpX+HhLOcpLlkgxU2TsGghYgXkSOfwgiZvQmwnbS09oYJbn 6d3a15rZzGIS40mCzPL0Bnu8oGfpf5/n818r+ryM4WnHjvBgEVcEy5s3X2Jk4BgfGW2e e/ALMxU2L4XyrvavtLilxR5ErQqaQf4gpxBjIrCIt2Wg743VMm1iaXkkb0eAsxkpyhYw 6WAo3T4s1TeL66FlI7e9vj25ciUKy79vkQgW8vrYnkWWbnpF1ZQ3bC/OBupzF0wHxe9V Z7NM5ka1dmyYDx4VUGKb8tkXK+VHbGhBYw+6sLDpfNyYEhNm2RYErEkSiz/k+deE84/u qRtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AMbntOVC4s2o/8Lh+U073ev5sYVU8cUpafPrshdgWj8=; b=N33lD6m8kWQN2i2KFaat5XtxUHzzT74V+d6vYxXlBtjTVonk2uTXlPLkxagmdQy9cn +6hXjL9fZt3vSW1NqdL/WcR/HBip9RNRBzI2WVQ6VgUHBwtrjv4tzADNV4wk9LWL77xx 6Np56f0XpG8aGaLu8FDQ3BhsjiOIw8h4jArEWxkLoKdDfZSUfEuiXySE4K72lv9oqZxk MviohK+7gMzciOBptk59wBrMNgIYsZbdu1Lus8d1U32pgagUyuh4f81idfKgNN3rj0r3 utSO4PoXDLIWl7OKsvYSZgz5ztjTIIE5wKGNEE6ghfMV7W5Y/R2O6niSSnaUOglw42P0 Bfvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jBby6sSl; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si1362104pla.393.2021.04.28.17.57.59; Wed, 28 Apr 2021 17:58:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jBby6sSl; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230084AbhD2A6f (ORCPT + 99 others); Wed, 28 Apr 2021 20:58:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:50848 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229479AbhD2A6e (ORCPT ); Wed, 28 Apr 2021 20:58:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 07B9661423; Thu, 29 Apr 2021 00:57:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1619657869; bh=gnim+zpxDvmUPkterXp3NMO9ZofgKmb2jTya0X5ziN0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jBby6sSl0WJQNyesYT6YXQHmd4+0H3ZMt2ZP4YcW/Xs0UBKyKiX93yqleYBw+ziaT D1ep1SpSQa6JpWhYzaAaQ8fj9wAB4RkcJC+D0WpmG/jxquHZecttVdhkZCnXpHvwGi PiNqhuZNnOmh9hFyN6muSRG88qSHhtyFUGTNrh5geqkncc8vL83qjnMcRMePY54AiT zPUW9wlbRPmT0/F88JxuVTlqXE4KFWIkEcACesRO8LpswmyZw2Fy3QGcoZ15b4y7Qs Gqf949pY9bMFY8QZlBxsvEHMUnjK4GwNQJpdA7IceLEnZZ7CU+ksWGCErTSZcWsMn2 9LMYoz2zdTc+w== Date: Wed, 28 Apr 2021 17:57:49 -0700 From: "Darrick J. Wong" To: Gabriel Krisman Bertazi Cc: amir73il@gmail.com, tytso@mit.edu, david@fromorbit.com, jack@suse.com, dhowells@redhat.com, khazhy@google.com, linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, kernel@collabora.com Subject: Re: [PATCH RFC 13/15] ext4: Send notifications on error Message-ID: <20210429005749.GH1251862@magnolia> References: <20210426184201.4177978-1-krisman@collabora.com> <20210426184201.4177978-14-krisman@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210426184201.4177978-14-krisman@collabora.com> Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Apr 26, 2021 at 02:41:59PM -0400, Gabriel Krisman Bertazi wrote: > Send a FS_ERROR message via fsnotify to a userspace monitoring tool > whenever a ext4 error condition is triggered. This follows the existing > error conditions in ext4, so it is hooked to the ext4_error* functions. > > It also follows the current dmesg reporting in the format. The > filesystem message is composed mostly by the string that would be > otherwise printed in dmesg. > > A new ext4 specific record format is exposed in the uapi, such that a > monitoring tool knows what to expect when listening errors of an ext4 > filesystem. > > Signed-off-by: Gabriel Krisman Bertazi > --- > fs/ext4/super.c | 60 ++++++++++++++++++++++++-------- > include/uapi/linux/ext4-notify.h | 17 +++++++++ > 2 files changed, 62 insertions(+), 15 deletions(-) > create mode 100644 include/uapi/linux/ext4-notify.h > > diff --git a/fs/ext4/super.c b/fs/ext4/super.c > index b9693680463a..032e29e7ff6a 100644 > --- a/fs/ext4/super.c > +++ b/fs/ext4/super.c > @@ -46,6 +46,8 @@ > #include > #include > #include > +#include > +#include > > #include "ext4.h" > #include "ext4_extents.h" /* Needed for trace points definition */ > @@ -727,6 +729,22 @@ static void flush_stashed_error_work(struct work_struct *work) > ext4_commit_super(sbi->s_sb); > } > > +static void ext4_fsnotify_error(int error, struct inode *inode, __u64 block, > + const char *func, int line, > + const char *desc, struct va_format *vaf) > +{ > + struct ext4_error_inode_report report; > + > + if (inode->i_sb->s_fsnotify_marks) { > + report.inode = inode ? inode->i_ino : -1L; > + report.block = block ? block : -1L; > + > + snprintf(report.desc, EXT4_FSN_DESC_LEN, "%s%pV\n", desc?:"", vaf); > + > + fsnotify_error_event(error, inode, func, line, &report, sizeof(report)); > + } > +} > + > #define ext4_error_ratelimit(sb) \ > ___ratelimit(&(EXT4_SB(sb)->s_err_ratelimit_state), \ > "EXT4-fs error") > @@ -742,15 +760,18 @@ void __ext4_error(struct super_block *sb, const char *function, > return; > > trace_ext4_error(sb, function, line); > + > + va_start(args, fmt); > + vaf.fmt = fmt; > + vaf.va = &args; > if (ext4_error_ratelimit(sb)) { > - va_start(args, fmt); > - vaf.fmt = fmt; > - vaf.va = &args; > printk(KERN_CRIT > "EXT4-fs error (device %s): %s:%d: comm %s: %pV\n", > sb->s_id, function, line, current->comm, &vaf); > - va_end(args); > + > } > + ext4_fsnotify_error(error, sb->s_root->d_inode, block, function, line, NULL, &vaf); > + va_end(args); > ext4_handle_error(sb, force_ro, error, 0, block, function, line); > } > > @@ -765,10 +786,10 @@ void __ext4_error_inode(struct inode *inode, const char *function, > return; > > trace_ext4_error(inode->i_sb, function, line); > + va_start(args, fmt); > + vaf.fmt = fmt; > + vaf.va = &args; > if (ext4_error_ratelimit(inode->i_sb)) { > - va_start(args, fmt); > - vaf.fmt = fmt; > - vaf.va = &args; > if (block) > printk(KERN_CRIT "EXT4-fs error (device %s): %s:%d: " > "inode #%lu: block %llu: comm %s: %pV\n", > @@ -779,8 +800,11 @@ void __ext4_error_inode(struct inode *inode, const char *function, > "inode #%lu: comm %s: %pV\n", > inode->i_sb->s_id, function, line, inode->i_ino, > current->comm, &vaf); > - va_end(args); > } > + > + ext4_fsnotify_error(error, inode, block, function, line, NULL, &vaf); > + va_end(args); > + > ext4_handle_error(inode->i_sb, false, error, inode->i_ino, block, > function, line); > } > @@ -798,13 +822,16 @@ void __ext4_error_file(struct file *file, const char *function, > return; > > trace_ext4_error(inode->i_sb, function, line); > + > + path = file_path(file, pathname, sizeof(pathname)); > + if (IS_ERR(path)) > + path = "(unknown)"; > + > + va_start(args, fmt); > + vaf.fmt = fmt; > + vaf.va = &args; > + > if (ext4_error_ratelimit(inode->i_sb)) { > - path = file_path(file, pathname, sizeof(pathname)); > - if (IS_ERR(path)) > - path = "(unknown)"; > - va_start(args, fmt); > - vaf.fmt = fmt; > - vaf.va = &args; > if (block) > printk(KERN_CRIT > "EXT4-fs error (device %s): %s:%d: inode #%lu: " > @@ -817,8 +844,10 @@ void __ext4_error_file(struct file *file, const char *function, > "comm %s: path %s: %pV\n", > inode->i_sb->s_id, function, line, inode->i_ino, > current->comm, path, &vaf); > - va_end(args); > } > + ext4_fsnotify_error(EFSCORRUPTED, inode, block, function, line, NULL, &vaf); > + va_end(args); > + > ext4_handle_error(inode->i_sb, false, EFSCORRUPTED, inode->i_ino, block, > function, line); > } > @@ -886,6 +915,7 @@ void __ext4_std_error(struct super_block *sb, const char *function, > printk(KERN_CRIT "EXT4-fs error (device %s) in %s:%d: %s\n", > sb->s_id, function, line, errstr); > } > + ext4_fsnotify_error(errno, NULL, -1L, function, line, errstr, NULL); > > ext4_handle_error(sb, false, -errno, 0, 0, function, line); > } > diff --git a/include/uapi/linux/ext4-notify.h b/include/uapi/linux/ext4-notify.h > new file mode 100644 > index 000000000000..31a3bbcafd13 > --- /dev/null > +++ b/include/uapi/linux/ext4-notify.h > @@ -0,0 +1,17 @@ > +/* SPDX-License-Identifier: GPL-2.0+ WITH Linux-syscall-note */ > +/* > + * Copyright 2021, Collabora Ltd. > + */ > + > +#ifndef EXT4_NOTIFY_H > +#define EXT4_NOTIFY_H > + > +#define EXT4_FSN_DESC_LEN 256 > + > +struct ext4_error_inode_report { > + u64 inode; I don't have much to contribute this time, other than suggesting that you might want to encode the inode generation here so that forensics tools won't waste their time if the inode has been deleted and recreated in between when the error happens and when the fs gets pulled offline for analysis. (...and maybe add a u32 flags field that can remain zero for now) > + u64 block; ...and maybe call this "lblk" (assuming this is the logical block offset within the file?) since that's already in wide use around e2fsprogs and fs/ext4/. --D > + char desc[EXT4_FSN_DESC_LEN]; > +}; > + > +#endif > -- > 2.31.0 >