On 2019/2/19 上午12:58, fdman...@kernel.org wrote:
> From: Filipe Manana <fdman...@suse.com>
> 
> When there is a kind of corruption in an extent buffer such that its first
> key does not match the key at the respective parent slot, one of two things
> happens:

Isn't that handled by read_tree_block() already?

Thanks,
Qu

> 
> 1) When assertions are enabled, we effectively hit a BUG_ON() which
>    requires rebooting the machine later. This also does not tell any
>    information about which extent buffer is affected, from which root,
>    the expected and found keys, etc.
> 
> 2) When assertions are disabled, we just ignore the mismatch and assume
>    everything is ok, which can potentially lead to all sorts of unexpected
>    problems later after a tree search (in the worst case, could lead to
>    further silent corruption).
> 
> So improve this by always checking if the first key of an extent buffer is
> what it's supposed to be, when doing a key search at key_search(), and
> report and return an appropriate error. The overhead is just comparing one
> key, which is minimal and is anyway just done in a special case where we
> skip the more expensive binary search (the binary search in the parent
> node returned 0, exact key match).
> 
> Signed-off-by: Filipe Manana <fdman...@suse.com>
> ---
>  fs/btrfs/ctree.c | 38 +++++++++++++++++---------------------
>  1 file changed, 17 insertions(+), 21 deletions(-)
> 
> diff --git a/fs/btrfs/ctree.c b/fs/btrfs/ctree.c
> index 5b9f602fb9e2..a0bd0278208d 100644
> --- a/fs/btrfs/ctree.c
> +++ b/fs/btrfs/ctree.c
> @@ -2529,35 +2529,31 @@ setup_nodes_for_search(struct btrfs_trans_handle 
> *trans,
>       return ret;
>  }
>  
> -static void key_search_validate(struct extent_buffer *b,
> -                             const struct btrfs_key *key,
> -                             int level)
> -{
> -#ifdef CONFIG_BTRFS_ASSERT
> -     struct btrfs_disk_key disk_key;
> -
> -     btrfs_cpu_key_to_disk(&disk_key, key);
> -
> -     if (level == 0)
> -             ASSERT(!memcmp_extent_buffer(b, &disk_key,
> -                 offsetof(struct btrfs_leaf, items[0].key),
> -                 sizeof(disk_key)));
> -     else
> -             ASSERT(!memcmp_extent_buffer(b, &disk_key,
> -                 offsetof(struct btrfs_node, ptrs[0].key),
> -                 sizeof(disk_key)));
> -#endif
> -}
> -
>  static int key_search(struct extent_buffer *b, const struct btrfs_key *key,
>                     int level, int *prev_cmp, int *slot)
>  {
> +     struct btrfs_key found_key;
> +
>       if (*prev_cmp != 0) {
>               *prev_cmp = btrfs_bin_search(b, key, level, slot);
>               return *prev_cmp;
>       }
>  
> -     key_search_validate(b, key, level);
> +     if (level == 0)
> +             btrfs_item_key_to_cpu(b, &found_key, 0);
> +     else
> +             btrfs_node_key_to_cpu(b, &found_key, 0);
> +
> +     if (btrfs_comp_cpu_keys(&found_key, key) != 0) {
> +             btrfs_crit(b->fs_info,
> +"unexpected first key for extent buffer: bytenr=%llu level=%d root=%llu 
> expected key=(%llu %u %llu) found key=(%llu %u %llu)",
> +                        btrfs_header_bytenr(b), level, btrfs_header_owner(b),
> +                        key->objectid, key->type, key->offset,
> +                        found_key.objectid, found_key.type,
> +                        found_key.offset);
> +             return -EUCLEAN;
> +     }
> +
>       *slot = 0;
>  
>       return 0;
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to