lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c7a79489-c0d7-968b-4fa5-c698ceb63bf9@huawei.com>
Date:   Wed, 8 Feb 2023 15:10:35 +0800
From:   zhanchengbin <zhanchengbin1@...wei.com>
To:     Jan Kara <jack@...e.cz>
CC:     <tytso@....edu>, <jack@...e.com>, <linux-ext4@...r.kernel.org>,
        <yi.zhang@...wei.com>, <linfeilong@...wei.com>,
        <liuzhiqiang26@...wei.com>
Subject: Re: [PATCH v3 2/2] ext4: restore len when ext4_ext_insert_extent
 failed

Thanks for your comments.
I've analyzed this situation, If a failure occurs at a certain layer, the
start of the upper and lower logical blocks is different, this's same as
ext4_ext_rm_idx.
If this happens data is not flushed to disks so data on disks is
consistent, but data on the memory is inconsistent (have journal). In my
opinion, we just need to ensure that we don't use the wrong data and flush
to disk. Look code we can know if ext4_ext_get_access and ext4_ext_dirty
faild, the verified flag of bh will be cleared, if read this bad inode
again, read_extent_tree_block will check verified flag and goto
__ext4_ext_check, finally, return error in the ext4_valid_extent_entries
function if the logical block start is incorrect, So does not change the
consistency of data on the disk. (Emmmmmm, I misunderstand the judgment in
ext4_valid_extent_entries. Later, I will clear the verified flag from the
modified bh when ext4_valid_extent_entries fails.)
If no journal, the data on the disk is inconsistent, too. Can use fsck to
fix it.
What do you think?

  - bin.

On 2023/2/7 22:23, Jan Kara wrote:
> On Tue 07-02-23 15:09:31, zhanchengbin wrote:
>> Inside the ext4_ext_insert_extent function, every error returned will
>> not destroy the consistency of the tree. Even if it fails after changing
>> half of the tree, can also ensure that the tree is self-consistent, like
>> function ext4_ext_create_new_leaf.
> 
> Hum, but e.g. if ext4_ext_correct_indexes() fails, we *will* end up with
> corrupted extent tree pretty much without a chance for recovery, won't we?
> 
> 								Honza
> 
>> After ext4_ext_insert_extent fails, update extent status tree depends on
>> the incoming split_flag. So restore the len of extent to be split when
>> ext4_ext_insert_extent return failed in ext4_split_extent_at.
>>
>> Signed-off-by: zhanchengbin <zhanchengbin1@...wei.com>
>> Signed-off-by: Zhang Yi <yi.zhang@...wei.com>
>> ---
>>   fs/ext4/extents.c | 3 ++-
>>   1 file changed, 2 insertions(+), 1 deletion(-)
>>
>> diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c
>> index 3559ea6b0781..b926fef73de4 100644
>> --- a/fs/ext4/extents.c
>> +++ b/fs/ext4/extents.c
>> @@ -935,6 +935,7 @@ ext4_find_extent(struct inode *inode, ext4_lblk_t block,
>>   
>>   		bh = read_extent_tree_block(inode, path[ppos].p_idx, --i, flags);
>>   		if (IS_ERR(bh)) {
>> +			EXT4_ERROR_INODE(inode, "IO error reading extent block");
>>   			ret = PTR_ERR(bh);
>>   			goto err;
>>   		}
>> @@ -3251,7 +3252,7 @@ static int ext4_split_extent_at(handle_t *handle,
>>   		ext4_ext_mark_unwritten(ex2);
>>   
>>   	err = ext4_ext_insert_extent(handle, inode, ppath, &newex, flags);
>> -	if (err != -ENOSPC && err != -EDQUOT && err != -ENOMEM)
>> +	if (!err)
>>   		goto out;
>>   
>>   	if (EXT4_EXT_MAY_ZEROOUT & split_flag) {
>> -- 
>> 2.31.1
>>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ