From: Brian Foster <bfoster@redhat.com>
To: "Darrick J. Wong" <darrick.wong@oracle.com>
Cc: david@fromorbit.com, linux-xfs@vger.kernel.org
Subject: Re: [PATCH 2/3] xfs: always assign buffer verifiers when one is provided
Date: Fri, 5 Oct 2018 07:57:13 -0400 [thread overview]
Message-ID: <20181005115712.GB54400@bfoster> (raw)
In-Reply-To: <153870047100.29695.14645106534029933489.stgit@magnolia>
On Thu, Oct 04, 2018 at 05:47:51PM -0700, Darrick J. Wong wrote:
> From: Darrick J. Wong <darrick.wong@oracle.com>
>
> If a caller supplies buffer ops when trying to read a buffer and the
> buffer doesn't already have buf ops assigned, ensure that the ops are
> assigned to the buffer and the verifier is run on that buffer.
>
> Note that current XFS code is careful to assign buffer ops after a
> xfs_{trans_,}buf_read call in which ops were not supplied. However, we
> should apply ops defensively in case there is ever a coding mistake; and
> an upcoming repair patch will need to be able to read a buffer without
> assigning buf ops.
>
> Signed-off-by: Darrick J. Wong <darrick.wong@oracle.com>
> ---
Just a few nits..
> fs/xfs/xfs_buf.c | 64 +++++++++++++++++++++++++++++++++++-------------
> fs/xfs/xfs_buf.h | 3 ++
> fs/xfs/xfs_trans_buf.c | 28 +++++++++++++++++++++
> 3 files changed, 78 insertions(+), 17 deletions(-)
>
>
> diff --git a/fs/xfs/xfs_buf.c b/fs/xfs/xfs_buf.c
> index e839907e8492..3adfa139dcfe 100644
> --- a/fs/xfs/xfs_buf.c
> +++ b/fs/xfs/xfs_buf.c
> @@ -749,6 +749,29 @@ _xfs_buf_read(
> return xfs_buf_submit(bp);
> }
>
> +/*
> + * If the caller passed in an ops structure and the buffer doesn't have ops
> + * assigned, set the ops and use them to verify the contents. If the contents
> + * cannot be verified, we'll clear XBF_DONE.
> + */
> +int
> +xfs_buf_ensure_ops(
> + struct xfs_buf *bp,
> + const struct xfs_buf_ops *ops)
> +{
> + ASSERT(bp->b_flags & XBF_DONE);
> +
> + if (!ops || bp->b_ops)
> + return 0;
> +
> + bp->b_error = 0;
If we only call this for XBF_DONE buffers, does that mean that ->b_error
should also be zero already? Is it worth adding that to the assert above
instead of resetting it?
> + bp->b_ops = ops;
> + bp->b_ops->verify_read(bp);
> + if (bp->b_error)
> + bp->b_flags &= ~XBF_DONE;
> + return bp->b_error;
> +}
> +
> xfs_buf_t *
> xfs_buf_read_map(
> struct xfs_buftarg *target,
> @@ -762,26 +785,33 @@ xfs_buf_read_map(
> flags |= XBF_READ;
>
> bp = xfs_buf_get_map(target, map, nmaps, flags);
> - if (bp) {
> - trace_xfs_buf_read(bp, flags, _RET_IP_);
> + if (!bp)
> + return NULL;
>
> - if (!(bp->b_flags & XBF_DONE)) {
> - XFS_STATS_INC(target->bt_mount, xb_get_read);
> - bp->b_ops = ops;
> - _xfs_buf_read(bp, flags);
> - } else if (flags & XBF_ASYNC) {
> - /*
> - * Read ahead call which is already satisfied,
> - * drop the buffer
> - */
> - xfs_buf_relse(bp);
> - return NULL;
> - } else {
> - /* We do not want read in the flags */
> - bp->b_flags &= ~XBF_READ;
> - }
> + trace_xfs_buf_read(bp, flags, _RET_IP_);
> +
> + if (!(bp->b_flags & XBF_DONE)) {
> + XFS_STATS_INC(target->bt_mount, xb_get_read);
> + bp->b_ops = ops;
> + _xfs_buf_read(bp, flags);
> + ASSERT(bp->b_ops != NULL || ops == NULL);
I like having this assert sprinkled around as well, but I'm wondering if
we can (safely) make it a bit stronger:
ASSERT(bp->b_ops == ops || !ops);
I think the !ops check is necessary to cover the case of reading a
verified buffer from scrub context (where we don't know the appropriate
verifier), but with the current approach we should never pass in the
wrong ops for a verified buffer, right?
> + return bp;
> + }
> +
> + xfs_buf_ensure_ops(bp, ops);
> +
> + if (flags & XBF_ASYNC) {
> + /*
> + * Read ahead call which is already satisfied,
> + * drop the buffer
> + */
> + xfs_buf_relse(bp);
> + return NULL;
> }
>
> + /* We do not want read in the flags */
> + bp->b_flags &= ~XBF_READ;
> + ASSERT(bp->b_ops != NULL || ops == NULL);
> return bp;
> }
>
> diff --git a/fs/xfs/xfs_buf.h b/fs/xfs/xfs_buf.h
> index 4e3171acd0f8..526bc7e9e7fc 100644
> --- a/fs/xfs/xfs_buf.h
> +++ b/fs/xfs/xfs_buf.h
> @@ -385,4 +385,7 @@ extern int xfs_setsize_buftarg(xfs_buftarg_t *, unsigned int);
> #define xfs_getsize_buftarg(buftarg) block_size((buftarg)->bt_bdev)
> #define xfs_readonly_buftarg(buftarg) bdev_read_only((buftarg)->bt_bdev)
>
> +extern int xfs_buf_ensure_ops(struct xfs_buf *bp,
> + const struct xfs_buf_ops *ops);
> +
> #endif /* __XFS_BUF_H__ */
> diff --git a/fs/xfs/xfs_trans_buf.c b/fs/xfs/xfs_trans_buf.c
> index 15919f67a88f..b0ba2ca9cca3 100644
> --- a/fs/xfs/xfs_trans_buf.c
> +++ b/fs/xfs/xfs_trans_buf.c
> @@ -264,11 +264,38 @@ xfs_trans_read_buf_map(
> return -EIO;
> }
>
> + /*
> + * The caller is trying to read a buffer that is already
"Check if the caller is trying ..." ?
Nits aside:
Reviewed-by: Brian Foster <bfoster@redhat.com>
> + * attached to the transaction yet has no buffer ops assigned.
> + * Ops are usually attached when the buffer is attached to the
> + * transaction, or by the read caller in special circumstances.
> + * That didn't happen, which is not how this is supposed to go.
> + *
> + * If the buffer passes verification we'll let this go, but if
> + * not we have to shut down. Let the transaction cleanup code
> + * release this buffer when it kills the tranaction.
> + */
> + ASSERT(bp->b_ops != NULL);
> + error = xfs_buf_ensure_ops(bp, ops);
> + if (error) {
> + xfs_buf_ioerror_alert(bp, __func__);
> +
> + if (tp->t_flags & XFS_TRANS_DIRTY)
> + xfs_force_shutdown(tp->t_mountp,
> + SHUTDOWN_META_IO_ERROR);
> +
> + /* bad CRC means corrupted metadata */
> + if (error == -EFSBADCRC)
> + error = -EFSCORRUPTED;
> + return error;
> + }
> +
> bip = bp->b_log_item;
> bip->bli_recur++;
>
> ASSERT(atomic_read(&bip->bli_refcount) > 0);
> trace_xfs_trans_read_buf_recur(bip);
> + ASSERT(bp->b_ops != NULL || ops == NULL);
> *bpp = bp;
> return 0;
> }
> @@ -316,6 +343,7 @@ xfs_trans_read_buf_map(
> _xfs_trans_bjoin(tp, bp, 1);
> trace_xfs_trans_read_buf(bp->b_log_item);
> }
> + ASSERT(bp->b_ops != NULL || ops == NULL);
> *bpp = bp;
> return 0;
>
>
next prev parent reply other threads:[~2018-10-05 18:55 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-05 0:47 [PATCH v3 0/3] xfs-4.20: scrub fixes Darrick J. Wong
2018-10-05 0:47 ` [PATCH 1/3] xfs: xrep_findroot_block should reject root blocks with siblings Darrick J. Wong
2018-10-05 0:47 ` [PATCH 2/3] xfs: always assign buffer verifiers when one is provided Darrick J. Wong
2018-10-05 11:57 ` Brian Foster [this message]
2018-10-05 17:02 ` Darrick J. Wong
2018-10-06 3:15 ` Darrick J. Wong
2018-10-06 10:25 ` Christoph Hellwig
2018-10-05 0:47 ` [PATCH 3/3] xfs: fix buffer state management in xrep_findroot_block Darrick J. Wong
2018-10-05 11:59 ` Brian Foster
2018-10-05 15:11 ` Darrick J. Wong
-- strict thread matches above, loose matches on Subject: below --
2018-10-09 4:19 [PATCH v4 0/3] xfs-4.20: scrub fixes Darrick J. Wong
2018-10-09 4:19 ` [PATCH 2/3] xfs: always assign buffer verifiers when one is provided Darrick J. Wong
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181005115712.GB54400@bfoster \
--to=bfoster@redhat.com \
--cc=darrick.wong@oracle.com \
--cc=david@fromorbit.com \
--cc=linux-xfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).