Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp1038494ybj; Tue, 5 May 2020 11:53:17 -0700 (PDT) X-Google-Smtp-Source: APiQypKs8nxJvmJ/M5WT36PTJp6j3hlW+zniRKXGC5IE2wDRT7TNY9h+fXzKcPAB3/wxU7SCPa6j X-Received: by 2002:aa7:c499:: with SMTP id m25mr3807939edq.122.1588704797303; Tue, 05 May 2020 11:53:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588704797; cv=none; d=google.com; s=arc-20160816; b=zfRlRrQpVDd++l+GC8cptetJ9h4ECaGYmP3Fo5Tfy3XPQLu4AQ9PZ6JSlJjAt/0Jwx 29gro7iNBP8qvoXJz37/p6zGtZwCiHNKkP6RXb8GVQh+2Oxemv82uM99iiNFKWDmQMmv uhVv8dhd2U+afp6gRVmEDzxFAL+vTdRuMvz7OiwDzWLWMZetQjTVpH92x9+iAAgj+v+W ptaXqLA7RtmQYE0iAWC4RsM0hzvw05S2wJPNFEu2TV5JTCz0OxUTkFeliQNwh5WVBhEw 6Ur+MEJQG3wNDyZUZ2XxWLrbFvT1Zp029QKrhZKy7cHHBv9Y/5c0RSEim/TCkN6s1ReP ceqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=ksPsJIaeL0ncNKYh89JwB4sw5OL93cz9qyv0XitmxJI=; b=QGubbGsC+CYJM8l8mYRNuBsmyehel7flJ8Wsl2viz0rWq5ZDbbzYvsVhCiCoZb0z+I gfaQUwsiVBfpDfC8AoS3J76lNfoGqyowMmDV2+0kClQX1Y6cL2uvXQlfQ54uWlZD47Rj LkSb6taaPB2Zugwg0TEetfv/0FKoRZWBKkm9aTbGQoGnDgb6hBZHvGTsDBpHqQIo3w74 GQU45iN04E18XjzTutL95Sjl2WBgp7lM83te1yGaLuMoPu7CKEWaQacXaLcCl/l98WuC rJ9tITg47Bl4nTUyJFNOn/Uoi+vDSoDQ+JdniAIr0SIhWuhxEIP9awTXyUY89X9B/eOa Ef7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1w9SfD7t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u2si1769035edx.530.2020.05.05.11.52.53; Tue, 05 May 2020 11:53:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1w9SfD7t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728512AbgEESte (ORCPT + 99 others); Tue, 5 May 2020 14:49:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:49280 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726350AbgEESte (ORCPT ); Tue, 5 May 2020 14:49:34 -0400 Received: from localhost (unknown [104.132.1.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 67636206CC; Tue, 5 May 2020 18:49:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588704573; bh=ULAX6o6dV7Arr39+KWwF1GLk85Khtp18oTR1aa35nLc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1w9SfD7t0QHoi2Cuzb+TJydGS28cJWuN2dBuFs/WTVmLa5agDw0MHj2ayxSZZ790F fHkgDJ+uzz9rUmekT3oDLN+PyV+1P3AW4zpEGR2yyY6aJKenZhrZtCclrTwq5OKst2 CN/xctFxbvpOV/AqzClp23pP5MHFTtrspZn+2WVA= Date: Tue, 5 May 2020 11:49:32 -0700 From: Jaegeuk Kim To: Eric Biggers Cc: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, kernel-team@android.com Subject: Re: [f2fs-dev] [PATCH] f2fs: get parent inode when recovering pino Message-ID: <20200505184932.GC55221@google.com> References: <20200505153139.201697-1-jaegeuk@kernel.org> <20200505165847.GA98848@gmail.com> <20200505181323.GA55221@google.com> <20200505181941.GC98848@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200505181941.GC98848@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/05, Eric Biggers wrote: > On Tue, May 05, 2020 at 11:13:23AM -0700, Jaegeuk Kim wrote: > > On 05/05, Eric Biggers wrote: > > > On Tue, May 05, 2020 at 08:31:39AM -0700, Jaegeuk Kim wrote: > > > > We had to grab the inode before retrieving i_ino. > > > > > > > > Signed-off-by: Jaegeuk Kim > > > > --- > > > > fs/f2fs/file.c | 8 +++++++- > > > > 1 file changed, 7 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c > > > > index a0a4413d6083b..9d4c3e3503567 100644 > > > > --- a/fs/f2fs/file.c > > > > +++ b/fs/f2fs/file.c > > > > @@ -168,6 +168,7 @@ static const struct vm_operations_struct f2fs_file_vm_ops = { > > > > static int get_parent_ino(struct inode *inode, nid_t *pino) > > > > { > > > > struct dentry *dentry; > > > > + struct inode *parent; > > > > > > > > inode = igrab(inode); > > > > dentry = d_find_any_alias(inode); > > > > @@ -175,8 +176,13 @@ static int get_parent_ino(struct inode *inode, nid_t *pino) > > > > if (!dentry) > > > > return 0; > > > > > > > > - *pino = parent_ino(dentry); > > > > + parent = igrab(d_inode(dentry->d_parent)); > > > > dput(dentry); > > > > + if (!parent) > > > > + return 0; > > > > + > > > > + *pino = parent->i_ino; > > > > + iput(parent); > > > > return 1; > > > > Hi Eric, > > > > > > > > This doesn't appear to be necessary. parent_ino() is: > > > > > > spin_lock(&dentry->d_lock); > > > res = dentry->d_parent->d_inode->i_ino; > > > spin_unlock(&dentry->d_lock); > > > > > > Since dentry is locked and referenced, ->d_parent is stable and positive. > > > > I see, thanks. :) > > > > > > > > In the encrypt+casefold patch I was reviewing, it's indeed necessary, but only > > > because there was a check of inode->i_flags added outside the locked region. > > > The following would be simpler: > > > > > > spin_lock(&dentry->d_lock); > > > dir = dentry->d_parent->d_inode; > > > *pino = dir->i_ino; > > > needs_recovery = IS_ENCRYPTED(dir) && IS_CASEFOLDED(dir); > > > spin_unlock(&dentry->d_lock); > > > > Ack. > > > > > > > > BTW, d_find_any_alias() is unnecessary too. This code should just be using > > > file_dentry(file) from f2fs_do_sync_file(). > > > > How about this? > > > > From 9aee969a413b1ed22b48573071bc93fbb4a2002d Mon Sep 17 00:00:00 2001 > > From: Jaegeuk Kim > > Date: Tue, 5 May 2020 11:08:58 -0700 > > Subject: [PATCH] f2fs: remove unnecessary dentry locks > > > > As Eric commented, let's kill unnecessary dentry ops when recovering > > parent inode number. > > > > Suggested-by: Eric Biggers > > Signed-off-by: Jaegeuk Kim > > --- > > fs/f2fs/file.c | 26 ++++++-------------------- > > 1 file changed, 6 insertions(+), 20 deletions(-) > > > > diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c > > index a0a4413d6083b..711cebad36fc5 100644 > > --- a/fs/f2fs/file.c > > +++ b/fs/f2fs/file.c > > @@ -165,21 +165,6 @@ static const struct vm_operations_struct f2fs_file_vm_ops = { > > .page_mkwrite = f2fs_vm_page_mkwrite, > > }; > > > > -static int get_parent_ino(struct inode *inode, nid_t *pino) > > -{ > > - struct dentry *dentry; > > - > > - inode = igrab(inode); > > - dentry = d_find_any_alias(inode); > > - iput(inode); > > - if (!dentry) > > - return 0; > > - > > - *pino = parent_ino(dentry); > > - dput(dentry); > > - return 1; > > -} > > - > > static inline enum cp_reason_type need_do_checkpoint(struct inode *inode) > > { > > struct f2fs_sb_info *sbi = F2FS_I_SB(inode); > > @@ -223,14 +208,15 @@ static bool need_inode_page_update(struct f2fs_sb_info *sbi, nid_t ino) > > return ret; > > } > > > > -static void try_to_fix_pino(struct inode *inode) > > +static void try_to_fix_pino(struct dentry *dentry) > > { > > + struct inode *inode = d_inode(dentry); > > struct f2fs_inode_info *fi = F2FS_I(inode); > > - nid_t pino; > > > > down_write(&fi->i_sem); > > - if (file_wrong_pino(inode) && inode->i_nlink == 1 && > > - get_parent_ino(inode, &pino)) { > > + if (file_wrong_pino(inode) && inode->i_nlink == 1) { > > + nid_t pino = parent_ino(dentry); > > + > > f2fs_i_pino_write(inode, pino); > > file_got_pino(inode); > > } > > @@ -310,7 +296,7 @@ static int f2fs_do_sync_file(struct file *file, loff_t start, loff_t end, > > * We've secured consistency through sync_fs. Following pino > > * will be used only for fsynced inodes after checkpoint. > > */ > > - try_to_fix_pino(inode); > > + try_to_fix_pino(file_dentry(file)); > > clear_inode_flag(inode, FI_APPEND_WRITE); > > clear_inode_flag(inode, FI_UPDATE_WRITE); > > goto out; > > Actually, I think this is wrong because the fsync can be done via a file > descriptor that was opened to a now-deleted link to the file. > > We need to find the dentry whose parent directory is still exists, i.e. the > parent directory that is counting towards 'inode->i_nlink == 1'. > > I think d_find_alias() is what we're looking for. Yeah, it seems to happen when open/rename/fsync calls, or race condition of file deletion. > diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c > index 6ab8f621a3c5..855f27468baa 100644 > --- a/fs/f2fs/file.c > +++ b/fs/f2fs/file.c > @@ -165,13 +165,13 @@ static int get_parent_ino(struct inode *inode, nid_t *pino) > { > struct dentry *dentry; > > - inode = igrab(inode); > - dentry = d_find_any_alias(inode); > - iput(inode); > + dentry = d_find_alias(inode); > if (!dentry) > return 0; How about this? From 2a6b0e53e592854306062a2dc35db2d8f79062f2 Mon Sep 17 00:00:00 2001 From: Jaegeuk Kim Date: Tue, 5 May 2020 11:33:29 -0700 Subject: [PATCH] f2fs: find a living dentry when finding parent ino We need to check any dentry still alive to get parent inode number. Suggested-by: Eric Biggers Signed-off-by: Jaegeuk Kim --- fs/f2fs/file.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c index a0a4413d6083b..95139cb85faca 100644 --- a/fs/f2fs/file.c +++ b/fs/f2fs/file.c @@ -169,9 +169,8 @@ static int get_parent_ino(struct inode *inode, nid_t *pino) { struct dentry *dentry; - inode = igrab(inode); - dentry = d_find_any_alias(inode); - iput(inode); + /* Need to check if valid dentry still exists. */ + dentry = d_find_alias(inode); if (!dentry) return 0; -- 2.26.2.526.g744177e7f7-goog