From: Brian Foster <bfoster@redhat.com>
To: Eric Sandeen <sandeen@redhat.com>, xfs-oss <xfs@oss.sgi.com>
Subject: Re: [PATCH] xfs: limit superblock corruption errors to probable corruption
Date: Thu, 30 Jan 2014 15:54:16 -0500 [thread overview]
Message-ID: <52EABBF8.5070309@redhat.com> (raw)
In-Reply-To: <52EAB66E.204@redhat.com>
On 01/30/2014 03:30 PM, Eric Sandeen wrote:
> On 1/30/14, 2:26 PM, Brian Foster wrote:
>>> diff --git a/fs/xfs/xfs_sb.c b/fs/xfs/xfs_sb.c
>>>> index 511cce9..b575317 100644
>>>> --- a/fs/xfs/xfs_sb.c
>>>> +++ b/fs/xfs/xfs_sb.c
>>>> @@ -617,6 +617,8 @@ xfs_sb_read_verify(
>>>> /* Only fail bad secondaries on a known V5 filesystem */
>>>> if (bp->b_bn != XFS_SB_DADDR &&
>>>> xfs_sb_version_hascrc(&mp->m_sb)) {
>>>> + XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW,
>>>> + mp, bp->b_addr);
>>>> error = EFSCORRUPTED;
>>>> goto out_error;
>>>> }
>>>> @@ -625,12 +627,8 @@ xfs_sb_read_verify(
>>>> error = xfs_sb_verify(bp, true);
>>>>
>>>> out_error:
>>>> - if (error) {
>>>> - if (error != EWRONGFS)
>>>> - XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW,
>>>> - mp, bp->b_addr);
>>>> + if (error)
>>>> xfs_buf_ioerror(bp, error);
>>>> - }
>>>> }
>> ... but why not leave the corruption output here in out_error, change
>> the check to (error == EFSCORRUPTED) and remove the now duplicate
>> corruption message in xfs_mount_validate_sb() (or replace it with a
>> warn/notice message)? This would catch the other EFSCORRUPTED returns in
>> a consistent manner, including another potential duplicate in the write
>> verifier. I guess we'd lose a little specificity between the crc failure
>> and sb validation, but we could add a warn/notice for the former too.
>>
>> Brian
>>
>
> Well, I went back and forth on this. It's probably philosophical. ;)
>
> Should we emit the corruption error at the point of corruption detection,
> or at a higher level? I guess my concern was that while *this* caller
> might catch the return & yell, if another caller got added it might not.
>
> Putting it at the point of detection seemed foolproof in that regard.
>
Yeah, that makes sense too. If we were consistent, that model would
suggest the write verifier corruption message could go and we'd embed
corruption errors along with the other associated EFSCORRUPTED returns
(at least where the resulting message is appropriate) in
xfs_mount_validate_sb().
Either way seems reasonable to me. I guess if all the remaining
situations are in fact real corruption situations, the point of
detection approach is probably more resilient. It would still be nice to
make the verifiers consistent in that though. ;)
Brian
> -Eric
>
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
next prev parent reply other threads:[~2014-01-30 20:54 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-01-29 5:11 [PATCH] xfs: limit superblock corruption errors to probable corruption Eric Sandeen
2014-01-30 20:26 ` Brian Foster
2014-01-30 20:30 ` Eric Sandeen
2014-01-30 20:54 ` Brian Foster [this message]
2014-02-06 6:43 ` Dave Chinner
2014-02-07 4:23 ` Eric Sandeen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=52EABBF8.5070309@redhat.com \
--to=bfoster@redhat.com \
--cc=sandeen@redhat.com \
--cc=xfs@oss.sgi.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).