From: Omar Sandoval <osandov@osandov.com>
To: "Theodore Ts'o" <tytso@mit.edu>,
"Andreas Dilger" <adilger.kernel@dilger.ca>,
"Lukáš Czerner" <lczerner@redhat.com>,
linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: Chris J Arges <chris.j.arges@canonical.com>
Subject: Re: [PATCH] ext4: fix indirect punch hole corruption
Date: Thu, 5 Feb 2015 12:56:01 -0800 [thread overview]
Message-ID: <20150205205601.GA5205@mew> (raw)
In-Reply-To: <cf81509853ecdbef7d738d8d39abe786f41193ec.1423169101.git.osandov@osandov.com>
[-- Attachment #1: Type: text/plain, Size: 1718 bytes --]
On Thu, Feb 05, 2015 at 12:50:13PM -0800, Omar Sandoval wrote:
> Commit 4f579ae7de56 (ext4: fix punch hole on files with indirect
> mapping) rewrote FALLOC_FL_PUNCH_HOLE for ext4 files with indirect
> mapping. However, the case where the punch happens within one level of
> indirection is incorrect. It assumes that the partial branches returned
> from ext4_find_shared will have the same depth, but this is not
> necessarily the case even when the offsets have the same depth. For
> example, if the last block occurs at the beginning of an indirect group
> (i.e., it has an offset of 0 at the end of the offsets array), then
> ext4_find_shared will return a shallower chain. So, let's handle the
> mismatch and clean up that case. Tested with generic/270, which no
> longer leads to an inconsistent filesystem like before.
>
Ah, forgot to mention that this applies to v3.19-rc7. Additionally,
I've attached a script which reproduces the issue. You can run
xfs_io -c fiemap "$FILE" (after an umount/mount of the filesystem just
be safe) and see that before the fix, a bunch of blocks get swallowed:
/mnt/scratch/test:
0: [0..31]: 1026..1057
1: [32..127]: 930..1025
2: [128..255]: 2114..2241
3: [256..511]: 2306..2561
4: [512..535]: 2818..2841
5: [536..1559]: hole
... but after the fix, the hole is in the right place:
/mnt/scratch/test:
0: [0..31]: 1026..1057
1: [32..127]: 930..1025
2: [128..255]: 2114..2241
3: [256..511]: 2306..2561
4: [512..791]: 2818..3097
5: [792..1047]: hole
6: [1048..1559]: 4122..4633
(These examples are from a 1k-block ext3 filesystem with
CONFIG_EXT4_USE_FOR_EXT23=y).
--
Omar
[-- Attachment #2: ext4punch.sh --]
[-- Type: application/x-sh, Size: 606 bytes --]
next prev parent reply other threads:[~2015-02-05 20:56 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-02-05 20:50 [PATCH] ext4: fix indirect punch hole corruption Omar Sandoval
2015-02-05 20:56 ` Omar Sandoval [this message]
2015-02-05 21:30 ` Chris J Arges
2015-02-05 21:41 ` Omar Sandoval
2015-02-07 0:28 ` Omar Sandoval
2015-02-07 0:35 ` Chris J Arges
2015-02-07 21:57 ` [PATCH v2] " Omar Sandoval
2015-02-08 12:15 ` [PATCH v3] " Omar Sandoval
2015-02-09 18:21 ` Chris J Arges
2015-02-09 21:03 ` Chris J Arges
2015-02-09 21:28 ` Omar Sandoval
2015-02-10 21:44 ` [PATCH v4] " Omar Sandoval
2015-02-11 2:59 ` Chris J Arges
2015-02-11 3:37 ` Omar Sandoval
2015-02-17 18:59 ` Omar Sandoval
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150205205601.GA5205@mew \
--to=osandov@osandov.com \
--cc=adilger.kernel@dilger.ca \
--cc=chris.j.arges@canonical.com \
--cc=lczerner@redhat.com \
--cc=linux-ext4@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=tytso@mit.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).