public inbox for linux-xfs@vger.kernel.org
 help / color / mirror / Atom feed
From: Dave Chinner <david@fromorbit.com>
To: Eric Sandeen <sandeen@sandeen.net>
Cc: xfs@oss.sgi.com
Subject: Re: [PATCH 1/2] xfs: don't leak EFSBADCRC to userspace
Date: Tue, 4 Mar 2014 09:31:02 +1100	[thread overview]
Message-ID: <20140303223102.GK13647@dastard> (raw)
In-Reply-To: <53150032.9050801@sandeen.net>

On Mon, Mar 03, 2014 at 04:20:34PM -0600, Eric Sandeen wrote:
> On 3/3/14, 4:13 PM, Dave Chinner wrote:
> > On Mon, Mar 03, 2014 at 11:34:35AM -0600, Eric Sandeen wrote:
> >> On 3/2/14, 11:39 PM, Dave Chinner wrote:
> >>> From: Dave Chinner <dchinner@redhat.com>
> >>>
> >>> While the verifier reoutines may return EFSBADCRC when a buffer ahs
> >>> a bad CRC, we need to translate that to EFSCORRUPTED so that the
> >>> higher layers treat the error appropriately and so we return a
> >>> consistent error to userspace. This fixes a xfs/005 regression.
> >>
> >> Can you say a little more about the philosophy here?
> >>
> >> xfs/005 regresses because it expects "structure needs cleaning"
> >>
> >> So if we instead return our (icky) CRC error code, we get something else.
> >>
> >> But it is truly a different root cause.
> >>
> >> So the goal is to NEVER leak EFSBADCRC to userspace?  Maybe a comment
> >> above that error definition would help document that.
> > 
> > Not permanently.  At the moment, none of the code handles it
> > correctly, and the leak to userspace is just a symptom that tells us
> > we got somethign wrong. We have plenty of places where we check for
> > EFSCORRUPTED and do something special, but if we get EFSBADCRC
> > instead it will do the wrong thing....
> > 
> >> And I'm bit worried that we'll leak more in the future if things changed,
> >> or if things got missed here.  Everything you have here looks fine, but
> >> it's not obvious that every path has been caught; it seems a bit random.
> > 
> > It's not random. It's buffer reads that matter, and I
> > checked all the calls to xfs_buf_read, xfs_buf_read_map,
> > xfs_trans_read_buf and xfs_trans_read_buf. There aren't any other
> > read interfaces that use verifiers, and so nothing else can return
> > EFSBADCRC. For the log recovery cases, the buffer reads don' use
> > verifiers, and those that do won't return EFSBADCRC (e.g. inode
> > buffers).
> > 
> >> I know we _just_ merged my "differentiator" patches, but I wonder if
> >> it would be better to add XFS_BSTATE_BADCRC to b_state or some other 
> >> field, and go back to always assigning EFSCORRUPTED.  What do you think?
> > 
> > It's just the first layer of adding differentiating support. We've
> > just put the mechanism in place to do the differentiation because we
> > need it for *userspace functionality* before we need it for
> > in-kernel functionality. We put it in the kernel because it has
> > value to us developers to indicate what type of corruption error was
> > detected in the dmesg output. We can't however, do everything at
> > once, so for the moment the kernel code needs to translate it back
> > to something the higher layers understand and treat correctly.
> > 
> >> When I wrote those I wasn't thinking about keeping it all internal
> >> to the filesystem.
> > 
> > Only for the moment, until there's code in the kernel that makes it
> > a meaningfully different error.
> 
> Ok, thanks.  Modulo Brian's question about other paths, what is here
> so far looks ok to me, then.  A commit message that indicates that
> this is somewhat temporary might be in order?

Sure, I can improve the commit message by including a summary of
this discussion. ;)

Cheers,

Dave.
-- 
Dave Chinner
david@fromorbit.com

_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs

  reply	other threads:[~2014-03-03 22:31 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-03  5:39 [PATCH 0/2] xfs: fixes for for-next Dave Chinner
2014-03-03  5:39 ` [PATCH 1/2] xfs: don't leak EFSBADCRC to userspace Dave Chinner
2014-03-03 17:34   ` Eric Sandeen
2014-03-03 22:13     ` Dave Chinner
2014-03-03 22:20       ` Eric Sandeen
2014-03-03 22:31         ` Dave Chinner [this message]
2014-03-03 17:44   ` Brian Foster
2014-03-03 22:29     ` Dave Chinner
2014-03-04  1:20       ` Brian Foster
2014-03-04  4:32         ` Dave Chinner
2014-03-04 14:01           ` Brian Foster
2014-03-05 15:48   ` Brian Foster
2014-03-03  5:39 ` [PATCH 2/2] xfs: use NOIO contexts for vm_map_ram Dave Chinner
2014-03-05 16:58   ` Christoph Hellwig

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140303223102.GK13647@dastard \
    --to=david@fromorbit.com \
    --cc=sandeen@sandeen.net \
    --cc=xfs@oss.sgi.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox