Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3098392ybb; Mon, 30 Mar 2020 20:55:51 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtXUcO/ccBklD21P0FdRM17elhdjQLGETgeynDjZqLc6UhB3Bx1aDjrRjqdBekIQ/YREjvK X-Received: by 2002:a9d:6d04:: with SMTP id o4mr7705857otp.101.1585626951834; Mon, 30 Mar 2020 20:55:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585626951; cv=none; d=google.com; s=arc-20160816; b=jwDPvTjA1motgJVPPcRHtXn8BJ9TFN0WCxeh7zGOnlOsx9lBL1HsHw6b2yvQJb4bpl 6kbMy8HbEQt8qa1r55xp1CGfMYESPWZfITX8zQs1y4tZ76WHY88lBzljbxcZPawMSZmJ +zQVzYOsV+RcI5BapahI2mGIKbSTFLDyPmjmqxktwBq6+cvnr7IS8Aw84t8qi6pC7M+Y X7t7WMuZcLzs1qZqDRDIF5f6aNvZuUoQ65obuCWIuvt4RHTmeZQXSCalVBH69x/+jiuZ MRIXAJrVRzRAGTjSiC9AkBLOsEtaBjfCD/87/EsliI4Z/+pWlAnb5QaLb29SmbyyAcLG ueHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=W8K4sUyTH5nY+O4iQ0xGUcxh/+3/TigXPzNNVq7SAPY=; b=MJuTs3gsY0LMn8+icvPRlJYF/azwspJwOOa3itrauCq1TD0aKviOrZBoaka9z45a65 2cSQQTToLcbAc5rYPRh/au7JIr+1FQXfqsUSFeqCNzpnrYg1z9sBMzCSD8bREDIOrkLC 0x4uCv//SHQ/i4iu40QhCciV65XXSLjGH9F6SLmTxJtyJjozGuJxq5ESJyl0wh52Iux3 tMgK+l3Rwy6yVj9oZ6EG5mAb9oN9JfAoQahdYhHAXQOAZGgsByqn04ILQJVa4B/9B02t VHxxawQFhfydGe83bAKiHwx9g9R5W8hGy0kQZszpBAIZM9Xoy4hbcpZQ3IKoFlKI52G6 ylhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cW8tGpMd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n125si6523057oib.97.2020.03.30.20.55.39; Mon, 30 Mar 2020 20:55:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cW8tGpMd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729704AbgCaDyU (ORCPT + 99 others); Mon, 30 Mar 2020 23:54:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:36938 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727358AbgCaDyU (ORCPT ); Mon, 30 Mar 2020 23:54:20 -0400 Received: from localhost (unknown [104.132.1.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B8A412072D; Tue, 31 Mar 2020 03:54:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585626859; bh=TKTh/9sPD0psIzinZfSfayKwQQgwyOsyAnSJ/BrlOqY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cW8tGpMd0n2m42LIs3mSyPV9ZWV48h64ZooNkJZ3pbkRkYwanhso3jeRjBAvAtFf0 81/AwUWRodIV0LkhSn60s5JyJ8BP11lAXjObarjnHMhJ0xXAA5FseeOk5ttlRACfRQ 2KmETlalnf650sJTyIqnznFmXC2Xb+0RlbDZiXKk= Date: Mon, 30 Mar 2020 20:54:19 -0700 From: Jaegeuk Kim To: Sahitya Tummala Cc: Chao Yu , linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [PATCH] f2fs: prevent meta updates while checkpoint is in progress Message-ID: <20200331035419.GB79749@google.com> References: <1585219019-24831-1-git-send-email-stummala@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1585219019-24831-1-git-send-email-stummala@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/26, Sahitya Tummala wrote: > allocate_segment_for_resize() can cause metapage updates if > it requires to change the current node/data segments for resizing. > Stop these meta updates when there is a checkpoint already > in progress to prevent inconsistent CP data. I'd prefer to use f2fs_lock_op() in bigger coverage. > > Signed-off-by: Sahitya Tummala > --- > fs/f2fs/gc.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c > index 5bca560..6122bad 100644 > --- a/fs/f2fs/gc.c > +++ b/fs/f2fs/gc.c > @@ -1399,8 +1399,10 @@ static int free_segment_range(struct f2fs_sb_info *sbi, unsigned int start, > int err = 0; > > /* Move out cursegs from the target range */ > + f2fs_lock_op(sbi); > for (type = CURSEG_HOT_DATA; type < NR_CURSEG_TYPE; type++) > allocate_segment_for_resize(sbi, type, start, end); > + f2fs_unlock_op(sbi); > > /* do GC to move out valid blocks in the range */ > for (segno = start; segno <= end; segno += sbi->segs_per_sec) { > -- > Qualcomm India Private Limited, on behalf of Qualcomm Innovation Center, Inc. > Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, a Linux Foundation Collaborative Project.