Received: by 2002:a17:90a:9307:0:0:0:0 with SMTP id p7csp3946586pjo; Tue, 3 Mar 2020 09:54:36 -0800 (PST) X-Google-Smtp-Source: ADFU+vsJ+Cs9CZXMvrhwLWihKST4qLgLEnRfEaTgZokwb1wyZGcQYm6ph2vENIghwy2JOe+Bh/ZE X-Received: by 2002:aca:57ce:: with SMTP id l197mr3288754oib.76.1583258076606; Tue, 03 Mar 2020 09:54:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583258076; cv=none; d=google.com; s=arc-20160816; b=lIgN+ffEdWBKe0IdlETnDOOa4OGif+LBE09bvf1VxUNWPgtwZ1RKOkS5Kk9HDWN1m2 cFpDzk94M6YziI5Y+8LRV6977ieXkcyA2XaeKAdjS/hxJKYe4Twh7f+4LWDbSJdaN7e8 ffeIYHf4qfGZl0tRTDmVCykspVL49K6LEdV5plxgCXJYZXrXhPiG2SJj1Hdq1VsaR8mD m/B4pNNZ9OcEtrHfPyaIUNxeJ8yoq2ixlMv7PG/YTDWynl3zgW5hghHP2pd2SAsUp3No vkZHPN/iA6cB5EfxIbWgFuTURhM0epU0tJNMZn2ZImx7DWTKX70tCCNPjjVKQH0VEh2a 2xJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yFMl4EvdxQAs9YR7UMQZxogGW4lsPClJfxKj4vsjETo=; b=z7mDouOd1/N1OdAIK2UmZzD4pyOiNfn46J4J34n5sSiuXauzt6Rtg40crIw05oksEQ KhODw0MVRoBBQKzk2XfK8xTf5mtp3G/m7Fo99NyAC17EP2SM8dE9Kgx9RYvVQrDWf22H wZ9JPZE4PheKRDpzUNBAMULiB5rTUHiUVWiG3sC6JBlBzo6VpnKf72EPPLHQKrzT0rOp fimhMB6908dqZoI3pkIY5CgegVAA4CyvzDhMX4LtUejYsY4WOj6oMpEWDGfm30jMf5Q3 w3PRDsRGli4PKbYQ+YsCHLoT62C4xNzdi60MfiZYaZd1BV2y5keK6qANvWiliBWvhuWW ec5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FaWgWIVO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l1si1264345oib.263.2020.03.03.09.54.24; Tue, 03 Mar 2020 09:54:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FaWgWIVO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732412AbgCCRxn (ORCPT + 99 others); Tue, 3 Mar 2020 12:53:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:34316 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731683AbgCCRxl (ORCPT ); Tue, 3 Mar 2020 12:53:41 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 47A2220728; Tue, 3 Mar 2020 17:53:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583258020; bh=+0DCorTTN4tjWO1sG8JADOF2c+tIaEeqv2Mh+42zHBw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FaWgWIVO/lbbfsTvRWtCLGC5sAUklpTfj/4vo6JhR4XK469hC1DF5lmgVlX+Tla+N z7HPEUH01JsJW8G7MYG24X9BdrnzsBFS4BCab8zPkHc1EEJ+jLSuzGtvpxx0WhFEH9 pI338gAbkJDJwCAYapT/Ji9YndFJEVzLUTuE+xnc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xiubo Li , Jeff Layton , Ilya Dryomov , Sasha Levin Subject: [PATCH 5.4 039/152] ceph: do not execute direct write in parallel if O_APPEND is specified Date: Tue, 3 Mar 2020 18:42:17 +0100 Message-Id: <20200303174306.860687401@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200303174302.523080016@linuxfoundation.org> References: <20200303174302.523080016@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xiubo Li [ Upstream commit 8e4473bb50a1796c9c32b244e5dbc5ee24ead937 ] In O_APPEND & O_DIRECT mode, the data from different writers will be possibly overlapping each other since they take the shared lock. For example, both Writer1 and Writer2 are in O_APPEND and O_DIRECT mode: Writer1 Writer2 shared_lock() shared_lock() getattr(CAP_SIZE) getattr(CAP_SIZE) iocb->ki_pos = EOF iocb->ki_pos = EOF write(data1) write(data2) shared_unlock() shared_unlock() The data2 will overlap the data1 from the same file offset, the old EOF. Switch to exclusive lock instead when O_APPEND is specified. Signed-off-by: Xiubo Li Reviewed-by: Jeff Layton Signed-off-by: Ilya Dryomov Signed-off-by: Sasha Levin --- fs/ceph/file.c | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/fs/ceph/file.c b/fs/ceph/file.c index 11929d2bb594c..cd09e63d682b7 100644 --- a/fs/ceph/file.c +++ b/fs/ceph/file.c @@ -1418,6 +1418,7 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) struct ceph_cap_flush *prealloc_cf; ssize_t count, written = 0; int err, want, got; + bool direct_lock = false; loff_t pos; loff_t limit = max(i_size_read(inode), fsc->max_file_size); @@ -1428,8 +1429,11 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) if (!prealloc_cf) return -ENOMEM; + if ((iocb->ki_flags & (IOCB_DIRECT | IOCB_APPEND)) == IOCB_DIRECT) + direct_lock = true; + retry_snap: - if (iocb->ki_flags & IOCB_DIRECT) + if (direct_lock) ceph_start_io_direct(inode); else ceph_start_io_write(inode); @@ -1519,14 +1523,15 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) /* we might need to revert back to that point */ data = *from; - if (iocb->ki_flags & IOCB_DIRECT) { + if (iocb->ki_flags & IOCB_DIRECT) written = ceph_direct_read_write(iocb, &data, snapc, &prealloc_cf); - ceph_end_io_direct(inode); - } else { + else written = ceph_sync_write(iocb, &data, pos, snapc); + if (direct_lock) + ceph_end_io_direct(inode); + else ceph_end_io_write(inode); - } if (written > 0) iov_iter_advance(from, written); ceph_put_snap_context(snapc); @@ -1577,7 +1582,7 @@ static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from) goto out_unlocked; out: - if (iocb->ki_flags & IOCB_DIRECT) + if (direct_lock) ceph_end_io_direct(inode); else ceph_end_io_write(inode); -- 2.20.1