From nobody Fri Dec 19 18:53:58 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 16F8A13F43F; Sun, 24 Mar 2024 23:10:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321819; cv=none; b=a00h6Dz1I/ZDkqvisEXL0b/J1Yt33Y7C/wuJMlDA/KopGROeSbTVfNnTC2R5utPN4u2fn8AYv/c7alow2J+u2qd2KTbA/pnrxWqsYB7FjLQ3eRXSZkFFBFkSLyqga8KFYOjx3R3+8yGjtgDkL7crFBOXLnz3e7B5G1f/JgTvpVs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321819; c=relaxed/simple; bh=tMWicbAIr0g5I0MKO7SqV44s6RC0VEGCES+SJOJX4vU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=co/aSHv1ZrMMr6a1EX64Jkg5khDotCHrcw7E5vC0+rBq4MWyeSew+IGax76ltiUr4++IkCOy4l3uupUX5Dmp91S5srOIM4QIl0CAhO2KZRzijUwBzlWwGxnAfaQDExeZNZeM1PmEJxVqB3yVkGpLsBRnGzeGGgoICPp7UCHKQ6U= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=HRuV1gJN; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="HRuV1gJN" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 58D3FC433F1; Sun, 24 Mar 2024 23:10:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711321819; bh=tMWicbAIr0g5I0MKO7SqV44s6RC0VEGCES+SJOJX4vU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HRuV1gJNzLOo/uU7UkB0Q6S1TYcdgMhgfNVBB9f7wnG8UvZBy8SqK/G9Ow02qi7Ca X4A08/u9ZwZM5TfYxVsGvA5rE0FPetSroWBrc1l/1GgGMR+9Us6QmAIFhktX64AZ4T jARmsxbkyCRajQdKVVjHKRVPxGu9lJFDuNPH2awVWRIyPR7XUkBJWgRzp7Wn403Bkw ONYySjzygnwZMtKExOFA3segCSGyI7axhJYKRvjGoD2dCbDKaIsW49dMlTFBQKG/t4 M7s2dtk/4vTGTl5sdiHnyJEDRDOG5l9JJqan49xs8S73R/TVbQox74aco81NMlYOSo /7xivRrZHQUKw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 6.6 547/638] f2fs: fix to truncate meta inode pages forcely Date: Sun, 24 Mar 2024 18:59:44 -0400 Message-ID: <20240324230116.1348576-548-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240324230116.1348576-1-sashal@kernel.org> References: <20240324230116.1348576-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Chao Yu [ Upstream commit 9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 ] Below race case can cause data corruption: Thread A GC thread - gc_data_segment - ra_data_block - locked meta_inode page - f2fs_inplace_write_data - invalidate_mapping_pages : fail to invalidate meta_inode page due to lock failure or dirty|writeback status - f2fs_submit_page_bio : write last dirty data to old blkaddr - move_data_block - load old data from meta_inode page - f2fs_submit_page_write : write old data to new blkaddr Because invalidate_mapping_pages() will skip invalidating page which has unclear status including locked, dirty, writeback and so on, so we need to use truncate_inode_pages_range() instead of invalidate_mapping_pages() to make sure meta_inode page will be dropped. Fixes: 6aa58d8ad20a ("f2fs: readahead encrypted block during GC") Fixes: e3b49ea36802 ("f2fs: invalidate META_MAPPING before IPU/DIO write") Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/checkpoint.c | 5 +++-- fs/f2fs/f2fs.h | 28 +++++++++++++++++++++++++++- fs/f2fs/segment.c | 5 ++--- include/linux/f2fs_fs.h | 1 + 4 files changed, 33 insertions(+), 6 deletions(-) diff --git a/fs/f2fs/checkpoint.c b/fs/f2fs/checkpoint.c index b0597a539fc54..9afc8d24dc369 100644 --- a/fs/f2fs/checkpoint.c +++ b/fs/f2fs/checkpoint.c @@ -1587,8 +1587,9 @@ static int do_checkpoint(struct f2fs_sb_info *sbi, st= ruct cp_control *cpc) */ if (f2fs_sb_has_encrypt(sbi) || f2fs_sb_has_verity(sbi) || f2fs_sb_has_compression(sbi)) - invalidate_mapping_pages(META_MAPPING(sbi), - MAIN_BLKADDR(sbi), MAX_BLKADDR(sbi) - 1); + f2fs_bug_on(sbi, + invalidate_inode_pages2_range(META_MAPPING(sbi), + MAIN_BLKADDR(sbi), MAX_BLKADDR(sbi) - 1)); =20 f2fs_release_ino_entry(sbi, false); =20 diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h index bf4a7f98e3476..5c87f472da3d3 100644 --- a/fs/f2fs/f2fs.h +++ b/fs/f2fs/f2fs.h @@ -4625,10 +4625,36 @@ static inline bool f2fs_is_readonly(struct f2fs_sb_= info *sbi) return f2fs_sb_has_readonly(sbi) || f2fs_readonly(sbi->sb); } =20 +static inline void f2fs_truncate_meta_inode_pages(struct f2fs_sb_info *sbi, + block_t blkaddr, unsigned int cnt) +{ + bool need_submit =3D false; + int i =3D 0; + + do { + struct page *page; + + page =3D find_get_page(META_MAPPING(sbi), blkaddr + i); + if (page) { + if (PageWriteback(page)) + need_submit =3D true; + f2fs_put_page(page, 0); + } + } while (++i < cnt && !need_submit); + + if (need_submit) + f2fs_submit_merged_write_cond(sbi, sbi->meta_inode, + NULL, 0, DATA); + + truncate_inode_pages_range(META_MAPPING(sbi), + F2FS_BLK_TO_BYTES((loff_t)blkaddr), + F2FS_BLK_END_BYTES((loff_t)(blkaddr + cnt - 1))); +} + static inline void f2fs_invalidate_internal_cache(struct f2fs_sb_info *sbi, block_t blkaddr) { - invalidate_mapping_pages(META_MAPPING(sbi), blkaddr, blkaddr); + f2fs_truncate_meta_inode_pages(sbi, blkaddr, 1); f2fs_invalidate_compress_page(sbi, blkaddr); } =20 diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c index 311769872b84e..0edd9feff6185 100644 --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -3651,8 +3651,7 @@ int f2fs_inplace_write_data(struct f2fs_io_info *fio) } =20 if (fio->post_read) - invalidate_mapping_pages(META_MAPPING(sbi), - fio->new_blkaddr, fio->new_blkaddr); + f2fs_truncate_meta_inode_pages(sbi, fio->new_blkaddr, 1); =20 stat_inc_inplace_blocks(fio->sbi); =20 @@ -3842,7 +3841,7 @@ void f2fs_wait_on_block_writeback_range(struct inode = *inode, block_t blkaddr, for (i =3D 0; i < len; i++) f2fs_wait_on_block_writeback(inode, blkaddr + i); =20 - invalidate_mapping_pages(META_MAPPING(sbi), blkaddr, blkaddr + len - 1); + f2fs_truncate_meta_inode_pages(sbi, blkaddr, len); } =20 static int read_compacted_summaries(struct f2fs_sb_info *sbi) diff --git a/include/linux/f2fs_fs.h b/include/linux/f2fs_fs.h index cf1adceb02697..5aa00bcd42fe9 100644 --- a/include/linux/f2fs_fs.h +++ b/include/linux/f2fs_fs.h @@ -27,6 +27,7 @@ =20 #define F2FS_BYTES_TO_BLK(bytes) ((bytes) >> F2FS_BLKSIZE_BITS) #define F2FS_BLK_TO_BYTES(blk) ((blk) << F2FS_BLKSIZE_BITS) +#define F2FS_BLK_END_BYTES(blk) (F2FS_BLK_TO_BYTES(blk + 1) - 1) =20 /* 0, 1(node nid), 2(meta nid) are reserved node id */ #define F2FS_RESERVED_NODE_NUM 3 --=20 2.43.0