Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1656788pxv; Fri, 23 Jul 2021 14:02:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy0qgrTYYGPeK6GO3zMSHJjcQOjIQ6nkDr291Ck9w4cnTBzniFawGhcP09YPTsguc44PC2g X-Received: by 2002:a6b:ba02:: with SMTP id k2mr5376574iof.164.1627074130997; Fri, 23 Jul 2021 14:02:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627074130; cv=none; d=google.com; s=arc-20160816; b=uxhwn+sVs5+F93tMaWgroVfN6bc1fWp0h8BIsQnGa0p/9nyyot+Atj+U7zK1coATvd +SnTdgJmnzQnY5hZ6kJTedwOeUEXGtDC+qM8SEDxbD0OqYnXsUYNZi35BG9TakAWZSwk 212U60Ss72cWmSdOAbLBzI2mx3bkreXh8w6RPoydpfC6LgGOMUTMptoBg4msAyhY3my7 GnyETLMFRC8QvLtzRqEXoc/LF05H4oVEG6JRxWcnyTew9WddD80vZsskQqwfS8OY4+I8 41HCEsCLIfgESETXyZEe/mlSSWRHJqRnW0P+PmeS7oJ2x4X5FNsRfcVsi1Yx5FMqVZI4 EdHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=uFO7RXxVKFSfj+JbYdfvdLiEFoV9tSxk0YcX6nQXpmY=; b=MvUF27RZruu2zOtKOfyJm+hotZzHdYnmZXAJ97ERhFM6kWZfJtS3jb9T5Qeb96N6bT N+z5Z0I/PGWQhb3UPD3spMIVBomYxzwA/ymMq3qUxq6K/K7msteQWZHewjJdC35/YNAN LNL/SbzdKNa4bfHLJyRh7gDwPGWm+2Kbv60gIQJDeF5z2MDkhz6dNWqzkaxY4wH+PfOo Aw0dU6/0XnPNo+9LzFRwlLCo388AXO10Y2D7l7UbaBRF7CT3agWx/O3Nnj5v+H//7n7A /1CzokVEkFB3ia9jgx4nkmMJigDoyqqKCV4eNs7glRrF3WtSabgGsWJKdVzuVt3XaGaw IiWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dAxvkXn1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e16si2883384ils.75.2021.07.23.14.01.58; Fri, 23 Jul 2021 14:02:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dAxvkXn1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231903AbhGWUSp (ORCPT + 99 others); Fri, 23 Jul 2021 16:18:45 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:32637 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231912AbhGWUSm (ORCPT ); Fri, 23 Jul 2021 16:18:42 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1627073954; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uFO7RXxVKFSfj+JbYdfvdLiEFoV9tSxk0YcX6nQXpmY=; b=dAxvkXn17udjAepVWMZ/JusQR0QK1b5x0TrHF17+d0OefwjWE+W4V1GrbQ8M0eA492hf1n e1AjMI69XH+jBG60tp/XfdRGjDr3+PXPR2zcv1+PnypIqabDQUpLvp0pTNhNXAz5CqtHCD FCjG2iq68c3QShcUGWzydOSzNKJsxfY= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-423-dhkyPezkPFe-gRt0owe1lw-1; Fri, 23 Jul 2021 16:59:13 -0400 X-MC-Unique: dhkyPezkPFe-gRt0owe1lw-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id BAEDD801A92; Fri, 23 Jul 2021 20:59:11 +0000 (UTC) Received: from max.com (unknown [10.40.194.164]) by smtp.corp.redhat.com (Postfix) with ESMTP id 58A98100238C; Fri, 23 Jul 2021 20:59:09 +0000 (UTC) From: Andreas Gruenbacher To: Linus Torvalds , Alexander Viro , Christoph Hellwig , "Darrick J. Wong" Cc: Jan Kara , Matthew Wilcox , cluster-devel@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com, Andreas Gruenbacher Subject: [PATCH v3 7/7] gfs2: Fix mmap + page fault deadlocks for direct I/O Date: Fri, 23 Jul 2021 22:58:40 +0200 Message-Id: <20210723205840.299280-8-agruenba@redhat.com> In-Reply-To: <20210723205840.299280-1-agruenba@redhat.com> References: <20210723205840.299280-1-agruenba@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Also disable page faults during direct I/O requests and implement the same kind of retry logic as in the buffered I/O case. Direct I/O requests differ from buffered I/O requests in that they use bio_iov_iter_get_pages for grabbing page references and faulting in pages instead of triggering real page faults. Those manual page faults can be disabled with the iocb->noio flag. Signed-off-by: Andreas Gruenbacher --- fs/gfs2/file.c | 34 +++++++++++++++++++++++++++++++++- 1 file changed, 33 insertions(+), 1 deletion(-) diff --git a/fs/gfs2/file.c b/fs/gfs2/file.c index f66ac7f56f6d..7986f3be69d2 100644 --- a/fs/gfs2/file.c +++ b/fs/gfs2/file.c @@ -782,21 +782,41 @@ static ssize_t gfs2_file_direct_read(struct kiocb *iocb, struct iov_iter *to, struct file *file = iocb->ki_filp; struct gfs2_inode *ip = GFS2_I(file->f_mapping->host); size_t count = iov_iter_count(to); + size_t written = 0; ssize_t ret; + /* + * In this function, we disable page faults when we're holding the + * inode glock while doing I/O. If a page fault occurs, we drop the + * inode glock, fault in the pages manually, and then we retry. Other + * than in gfs2_file_read_iter, iomap_dio_rw can trigger implicit as + * well as manual page faults, and we need to disable both kinds + * separately. + */ + if (!count) return 0; /* skip atime */ gfs2_holder_init(ip->i_gl, LM_ST_DEFERRED, 0, gh); +retry: ret = gfs2_glock_nq(gh); if (ret) goto out_uninit; + pagefault_disable(); + to->noio = true; ret = iomap_dio_rw(iocb, to, &gfs2_iomap_ops, NULL, 0); + to->noio = false; + pagefault_enable(); + gfs2_glock_dq(gh); + if (ret > 0) + written += ret; + if (unlikely(ret == -EFAULT) && fault_in_iov_iter(to)) + goto retry; out_uninit: gfs2_holder_uninit(gh); - return ret; + return written ? written : ret; } static ssize_t gfs2_file_direct_write(struct kiocb *iocb, struct iov_iter *from, @@ -809,6 +829,12 @@ static ssize_t gfs2_file_direct_write(struct kiocb *iocb, struct iov_iter *from, loff_t offset = iocb->ki_pos; ssize_t ret; + /* + * In this function, we disable page faults when we're holding the + * inode glock while doing I/O. If a page fault occurs, we drop the + * inode glock, fault in the pages manually, and then we retry. + */ + /* * Deferred lock, even if its a write, since we do no allocation on * this path. All we need to change is the atime, and this lock mode @@ -818,6 +844,7 @@ static ssize_t gfs2_file_direct_write(struct kiocb *iocb, struct iov_iter *from, * VFS does. */ gfs2_holder_init(ip->i_gl, LM_ST_DEFERRED, 0, gh); +retry: ret = gfs2_glock_nq(gh); if (ret) goto out_uninit; @@ -826,11 +853,16 @@ static ssize_t gfs2_file_direct_write(struct kiocb *iocb, struct iov_iter *from, if (offset + len > i_size_read(&ip->i_inode)) goto out; + from->noio = true; ret = iomap_dio_rw(iocb, from, &gfs2_iomap_ops, NULL, 0); + from->noio = false; + if (ret == -ENOTBLK) ret = 0; out: gfs2_glock_dq(gh); + if (unlikely(ret == -EFAULT) && fault_in_iov_iter(from)) + goto retry; out_uninit: gfs2_holder_uninit(gh); return ret; -- 2.26.3