Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp36146ybm; Wed, 27 May 2020 18:28:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAzL1/ZAuLSYPLoDDiPKeFhjc6/T0Ru7miMte1A6SRgEjBPxdNVqugCGYVX5aRXCMQEGE3 X-Received: by 2002:a17:906:f112:: with SMTP id gv18mr935731ejb.142.1590629314908; Wed, 27 May 2020 18:28:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590629314; cv=none; d=google.com; s=arc-20160816; b=BkNc/Qa7o39O78kVgnTC1DXRHLJYa6th7TkcgocSyrLAMxi2ukwCDEjH7QGi1sL7G1 MhaFlcTC+uvDNlN89difo2cJwCLJJGxaVlEMxxVou9HI5I7WOt/8wAyhBaAdYnkY6BNu SgO+i+ZYqLFX8h7kK9CDzS5sUcizSAab9gi35sHGEESMBNxOsflB4sytsi5L4p0aiD5e qlMkKJka/nbKSqEMXUwlyljrZJnTyWdrYXu1PsEMnmJxVy45MZWmiNYhjMqn6u8dxsYR TaAP53wojrlMlGtgEoa2dQUal2JDUySjt8nNs80+wkic0SYVnvbY3f3FnGhNdGnw8fv4 W2UQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=teyqHTbf2d397UdYdiP+zuzDune1ce474Ew51zbEk8A=; b=vnUN9MF2NQkngVAzi7F2PX1IgA3TsQF9W06+L70agbnsJLMXmdJEKlOpFdNLsl0tS/ PHRxP/wgtaOXjVhceRxrlBN/1CCDIgCTYN81F8vO4JcU3IkDapLDh4EhIPRGCNPekbN5 5td0hUEGCPN5wwDJvW+8RknkzaT6pTsEPZg1xzKoRRrT6QhBUkuZiGU/2ZA0KsN+XCJv XYw9Az31/Uyx/w5OqXeKt87LnxFX98iZ+4VS7A2l+AWI5qghZStJ6KCpm5etbAQNFc1D myAWPW05daAOwBvRMF5VV5qTOOtFDNfxxTA57ZumeC7DuqBQrlcu6nxeqs0jVqsUXd33 wNUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p4si2663489edd.374.2020.05.27.18.28.11; Wed, 27 May 2020 18:28:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726518AbgE1BXr (ORCPT + 99 others); Wed, 27 May 2020 21:23:47 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:5293 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725747AbgE1BXr (ORCPT ); Wed, 27 May 2020 21:23:47 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 3C1F627917DD431B090D; Thu, 28 May 2020 09:23:45 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.202) with Microsoft SMTP Server (TLS) id 14.3.487.0; Thu, 28 May 2020 09:23:44 +0800 Subject: Re: [PATCH 3/3] f2fs: fix to cover meta flush with cp_lock To: Jaegeuk Kim CC: , , References: <20200527102753.15743-1-yuchao0@huawei.com> <20200527102753.15743-3-yuchao0@huawei.com> <20200527210233.GC206249@google.com> From: Chao Yu Message-ID: <23245f6e-528d-43ab-57b6-4ca16db43fe5@huawei.com> Date: Thu, 28 May 2020 09:23:40 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20200527210233.GC206249@google.com> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/5/28 5:02, Jaegeuk Kim wrote: > On 05/27, Chao Yu wrote: >> meta inode page should be flushed under cp_lock, fix it. > > It doesn't matter for this case, yes? It's not related to discard issue. Now, I got some progress, I can reproduce that bug occasionally. Thanks, > >> >> Signed-off-by: Chao Yu >> --- >> fs/f2fs/file.c | 2 ++ >> 1 file changed, 2 insertions(+) >> >> diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c >> index f7de2a1da528..0fcae4d90074 100644 >> --- a/fs/f2fs/file.c >> +++ b/fs/f2fs/file.c >> @@ -2260,7 +2260,9 @@ static int f2fs_ioc_shutdown(struct file *filp, unsigned long arg) >> set_sbi_flag(sbi, SBI_IS_SHUTDOWN); >> break; >> case F2FS_GOING_DOWN_METAFLUSH: >> + mutex_lock(&sbi->cp_mutex); >> f2fs_sync_meta_pages(sbi, META, LONG_MAX, FS_META_IO); >> + mutex_unlock(&sbi->cp_mutex); >> f2fs_stop_checkpoint(sbi, false); >> set_sbi_flag(sbi, SBI_IS_SHUTDOWN); >> break; >> -- >> 2.18.0.rc1 > . >