Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2630046pxb; Mon, 19 Apr 2021 09:59:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz13244SqqKYaq91JoqdjJASPW5ntF228sHFEe9FdffilRXTuwq3Mq+Yaoc4GThlaOJsKtU X-Received: by 2002:a17:902:8688:b029:ea:f782:5eae with SMTP id g8-20020a1709028688b02900eaf7825eaemr23845643plo.15.1618851540359; Mon, 19 Apr 2021 09:59:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618851540; cv=none; d=google.com; s=arc-20160816; b=LHLsmXWwhWtxMcP+qfZwqRCFJUWGofb8xCUCabTNaux+tcWZpwaXAIjI5ni2PPKrAo AW51w3qXv7/rnmOlUokvO0Lggj9Ytdzdc/TJOIQoQptrJrSjZTT5KUN3ghpFk6aK0qim lLWmyPTpi/Eg+XEHWrOoNpnm2nqGQGlX+jMqkHCagPuBIQEEO7TdtpOTPfPlcy7T2YUd zbqeFkQv8M0HmrxjEJ50sd0o7cQEzpwbDaAZntpLOkjfbynmlGUhE2KsMalcfr/DQEL1 7cRRVHZWqm4FLVKqyVUS58yFyw9EmBzSV3/MVmZXkCb5RuWTh9vpJKUsmaDcIOkAssEb AiSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AamghkwKfeaEmplQ+BF976fFUNVO5q6O3UPxzvgoDkE=; b=RvfgPszepE+AEpm2uxnGhRUtZyciTg9tc4z0HcRWZ5H6lHsEwWjuJ/aEy+/9f/mtWG /D6szwxbhvo+e4eLClKXnqAM1rDu+lpaiMI4buBIN/cVjKI0xmjKO8gtRBByf7jyKMAJ oifBm+UCoe+JN9dV6oVPxbi2mQZjXrclX5TJV4VA334mf/c9PQuiBKkYAFGxGem0R5mq eGo2wi5f6Q5AWQoCFhZXOhqwMM5XM/q8CfkAYNqJcpz6PWfTPR3Yx3lkWeOZDMronEg7 cZazlodqE4y5K6rI4T73aiXPOymJX9xS09ENTiBRqbBL1h7HDjodVFBxJb7Qpp9oLI3Y ic2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=upUv8v+s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n19si17917012pgv.400.2021.04.19.09.58.48; Mon, 19 Apr 2021 09:59:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=upUv8v+s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239434AbhDSQ5v (ORCPT + 99 others); Mon, 19 Apr 2021 12:57:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:59602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239432AbhDSQ5r (ORCPT ); Mon, 19 Apr 2021 12:57:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1902F61157; Mon, 19 Apr 2021 16:57:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618851437; bh=3dmEuV6yQnYs+WvENMHQ1GFdBQ3rQzjD8hIFXwwaDEY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=upUv8v+s/Hv7tEJrZ8W+uGHlGnRmuCZFWdOlt+hLPf4JJgSz48dQ+1OSjcWw8k2g3 shPYs5CIpoDtZ9v0YVVnPPMrzSFuYonPB/r08c0Lo+nThMX52yU1ceP63LLnUz9fwb MNBOo/wZwIX/O72FFKMx2OjkDRfoREzvXkdqecEHvLrW17LNrvClnOyJjCHgqsGNSf k3ujEbqNdwdG5sgoU4qj6FzzVymP9dXprWSuxacId4lVpr6Dtq76Sp99YBxcSI21WO m9mX4teKXFRJH8eEVUr5v+2KjUcGUT5jZhtZTVDZP9Lcb7dyxMLzuky/S9Z4CGOjab ev3KYtBrejrlw== Date: Mon, 19 Apr 2021 09:57:15 -0700 From: Jaegeuk Kim To: Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, chao@kernel.org Subject: Re: [PATCH] f2fs: fix to cover allocate_segment() with lock Message-ID: References: <20210414012134.128066-1-yuchao0@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210414012134.128066-1-yuchao0@huawei.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/14, Chao Yu wrote: > As we did for other cases, in fix_curseg_write_pointer(), let's > change as below: > - use callback function s_ops->allocate_segment() instead of > raw function allocate_segment_by_default(); > - cover allocate_segment() with curseg_lock and sentry_lock. > > Signed-off-by: Chao Yu > --- > fs/f2fs/segment.c | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > index b2ee6b7791b0..daf9531ec58f 100644 > --- a/fs/f2fs/segment.c > +++ b/fs/f2fs/segment.c > @@ -4848,7 +4848,12 @@ static int fix_curseg_write_pointer(struct f2fs_sb_info *sbi, int type) > > f2fs_notice(sbi, "Assign new section to curseg[%d]: " > "curseg[0x%x,0x%x]", type, cs->segno, cs->next_blkoff); > - allocate_segment_by_default(sbi, type, true); > + > + down_read(&SM_I(sbi)->curseg_lock); > + down_write(&SIT_I(sbi)->sentry_lock); > + SIT_I(sbi)->s_ops->allocate_segment(sbi, type, true); > + up_write(&SIT_I(sbi)->sentry_lock); > + up_read(&SM_I(sbi)->curseg_lock); Seems f2fs_allocate_new_section()? > > /* check consistency of the zone curseg pointed to */ > if (check_zone_write_pointer(sbi, zbd, &zone)) > -- > 2.29.2