Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3653119ybf; Tue, 3 Mar 2020 09:51:10 -0800 (PST) X-Google-Smtp-Source: ADFU+vsOGzw3CfqckgQM7edQP6+QgPfEqIHlwhgJqrogmVQn3sruSGEb61V9kMMpw1nhYEp4s1xs X-Received: by 2002:aca:57ce:: with SMTP id l197mr3281137oib.76.1583257870179; Tue, 03 Mar 2020 09:51:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583257870; cv=none; d=google.com; s=arc-20160816; b=RerFI6cvOhlGxZIkOv51WclcYht1XG1lrLajiK1efXsWWGyjdHDdj3OP6CtL/XtI6P a1RzHJIKWYsBwBidm+nhKM7KR8szhxqtD9twbqMuxbYQS6j3Q5h4vTrQmCz6KzJwno0D cSfQy8w11lBkDPcjxHlmkvvHN7eJfmrl1kBSvA/9bs10DFkPe0+FP5pBXV29zYiFl0Rb e7fAuPu8DOuzP3KnSJ2rvtR8gGRm/7cdaMXn0DRMpszNrF59p8SId5rqIL3FAffjhyct tJFbUlkAPcALhyOgEGEotzWRWpz+RVT+8L1Zsu1g8yUbUreAj6M23Gn69E0FCGJFCzZR z8iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yFMl4EvdxQAs9YR7UMQZxogGW4lsPClJfxKj4vsjETo=; b=kTYeztxJIOhURd7a7s2kA14C3UJy1EyYcu+J57RaTdXAHaSYREvGTSoIFMslcT11f8 AYGAHzMoXcA8ew5CrK/gsrZmZo70f2KmIUQUDZ8qNeqj0VK051kBmFKx1So4FtVAO3bx ITYIFogWYoTeU1hmjwEL9f98VZQGIcwgexzyx6VLppyY1xrOmDdPGkMffIW1HFxLSHE4 Ihu/OWUldoW6cYKkRZn0wwf2abHyJZcK7ZzRip9MAqMNUDYU/WuK7OVBeR+tRuqcmxA+ hoFzfnjH+/UrwoNJYqPCe0bcS2ApsCJjaPZkUy6Jaq0v8eICGDPv8SafjNvC6lOHcv+b Xj7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0TpKIjLN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3si8304833otp.292.2020.03.03.09.50.58; Tue, 03 Mar 2020 09:51:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0TpKIjLN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731376AbgCCRrd (ORCPT + 99 others); Tue, 3 Mar 2020 12:47:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:54432 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731351AbgCCRr3 (ORCPT ); Tue, 3 Mar 2020 12:47:29 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 32B3A208C3; Tue, 3 Mar 2020 17:47:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583257648; bh=+0DCorTTN4tjWO1sG8JADOF2c+tIaEeqv2Mh+42zHBw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0TpKIjLNGmBHfa6LcDfinnag6Jo4P7P/TnlsJkEzUwmP+xTccwnbs4U5DFM0XD4/T uZWMn+VpOT7HlW8nODikc0Q9HvXH1zUARqNq/49ApO3r+ElFh6QSKCDwKWD/C/s3SI Gdx7Z2OfZCYmVqybKvGexLG6b3Yaq87iHoeyhlH4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xiubo Li , Jeff Layton , Ilya Dryomov , Sasha Levin Subject: [PATCH 5.5 043/176] ceph: do not execute direct write in parallel if O_APPEND is specified Date: Tue, 3 Mar 2020 18:41:47 +0100 Message-Id: <20200303174309.514277525@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200303174304.593872177@linuxfoundation.org> References: <20200303174304.593872177@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xiubo Li [ Upstream commit 8e4473bb50a1796c9c32b244e5dbc5ee24ead937 ] In O_APPEND & O_DIRECT mode, the data from different writers will be possibly overlapping each other since they take the shared lock. For example, both Writer1 and Writer2 are in O_APPEND and O_DIRECT mode: Writer1 Writer2 shared_lock() shared_lock() getattr(CAP_SIZE) getattr(CAP_SIZE) iocb->ki_pos = EOF iocb->ki_pos = EOF write(data1) write(data2) shared_unlock() shared_unlock() The data2 will overlap the data1 from the same file offset, the old EOF. Switch to exclusive lock instead when O_APPEND is specified. Signed-off-by: Xiubo Li Reviewed-by: Jeff Layton Signed-off-by: Ilya Dryomov Signed-off-by: Sasha Levin --- fs/ceph/file.c | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/fs/ceph/file.c b/fs/ceph/file.c index 11929d2bb594c..cd09e63d682b7 100644 --- a/fs/ceph/file.c +++ b/fs/ceph/file.c @@ -1418,6 +1418,7 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) struct ceph_cap_flush *prealloc_cf; ssize_t count, written = 0; int err, want, got; + bool direct_lock = false; loff_t pos; loff_t limit = max(i_size_read(inode), fsc->max_file_size); @@ -1428,8 +1429,11 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) if (!prealloc_cf) return -ENOMEM; + if ((iocb->ki_flags & (IOCB_DIRECT | IOCB_APPEND)) == IOCB_DIRECT) + direct_lock = true; + retry_snap: - if (iocb->ki_flags & IOCB_DIRECT) + if (direct_lock) ceph_start_io_direct(inode); else ceph_start_io_write(inode); @@ -1519,14 +1523,15 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) /* we might need to revert back to that point */ data = *from; - if (iocb->ki_flags & IOCB_DIRECT) { + if (iocb->ki_flags & IOCB_DIRECT) written = ceph_direct_read_write(iocb, &data, snapc, &prealloc_cf); - ceph_end_io_direct(inode); - } else { + else written = ceph_sync_write(iocb, &data, pos, snapc); + if (direct_lock) + ceph_end_io_direct(inode); + else ceph_end_io_write(inode); - } if (written > 0) iov_iter_advance(from, written); ceph_put_snap_context(snapc); @@ -1577,7 +1582,7 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) goto out_unlocked; out: - if (iocb->ki_flags & IOCB_DIRECT) + if (direct_lock) ceph_end_io_direct(inode); else ceph_end_io_write(inode); -- 2.20.1