Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp2103429rwb; Sat, 8 Oct 2022 02:15:34 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6cx8SrNzrQ9FgQ1FarwOVDgcXJAw8FeYkvSvCnM/OOEH0OEZNEM2b+leJwHHukUaQ2kXta X-Received: by 2002:a05:6402:34c6:b0:459:f52e:ccc6 with SMTP id w6-20020a05640234c600b00459f52eccc6mr8174045edc.341.1665220534716; Sat, 08 Oct 2022 02:15:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665220534; cv=none; d=google.com; s=arc-20160816; b=YPx3QPCHoKmxYFNSfO/mkIjuqZ5lMgf/TLAze5xQQGsIZVz4hC7/limpcDkRSfP3uP APrjjLwPMs9TuiNVkVwhC8cZ+JIjbxc2JfAqmR9CMzOXR0rwl7DLRyxpv783DvFoMa+k VucmwpjLZe0C19yWDAV0MyjO4OIhIoxazramRwgTM+ORp9C25XIy5zowEWZUlgSC5Q6O SeDPSGWZfREiPL+AKHRMWjgO+HgSMm8gbW6ZlaSnnvCnhBgj1TGodbzyzkKulAGXlsS/ n3LLUFRH85rNyB7mQG8RMijBv79ZCDI4kke7yFtUNfSSnxoQ+jQKAeL+taWbgWKuBavg q8ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=mo/7GrXIPUdRilM3NKir6A0Ty+VVAXcMHzmqzv5ro3M=; b=LPBO+8vTkPQ6dT9RK/PM24S3Z6Lf1GKoWLDBMYI/4kx1fS3KsOvaXxWkJqz0KouUyj TB3fShJTHcmNba0SjERJvfx1A9SfnIXtNRxjELzeetPL9E+afESun9i8lzIZgYVA7xl+ xqO+oUAQkshEZL5JttrI4cDxodt6Wt5/RGuw9MXO7dYaZHy4vGlFlU/3vUA64mNTR3JA lzkEzbCxpj/MVSQdNfrhIIR4ql6l62oDAi/d56O/74GD+K3XEkS350S/tSoF5lljRp9P csqEsZ1YDzjr3vaS+aQ1GIZPvVHIZ+baKN10QRlqggHBtVSWY0lSiZYlazl39MkRYIar KZzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oz30-20020a1709077d9e00b0078cf86b12e5si5039933ejc.221.2022.10.08.02.15.05; Sat, 08 Oct 2022 02:15:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229732AbiJHJGF (ORCPT + 99 others); Sat, 8 Oct 2022 05:06:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48318 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229379AbiJHJGC (ORCPT ); Sat, 8 Oct 2022 05:06:02 -0400 Received: from out30-130.freemail.mail.aliyun.com (out30-130.freemail.mail.aliyun.com [115.124.30.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D79EA4A130; Sat, 8 Oct 2022 02:06:00 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R191e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046050;MF=jefflexu@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0VRbkoWW_1665219956; Received: from 30.221.130.66(mailfrom:jefflexu@linux.alibaba.com fp:SMTPD_---0VRbkoWW_1665219956) by smtp.aliyun-inc.com; Sat, 08 Oct 2022 17:05:58 +0800 Message-ID: <206e172c-5ba0-1233-f46d-edb828df53ad@linux.alibaba.com> Date: Sat, 8 Oct 2022 17:05:56 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.3.0 Subject: Re: [RFC PATCH 3/5] cachefiles: resend an open request if the read request's object is closed Content-Language: en-US To: Jia Zhu , dhowells@redhat.com, xiang@kernel.org Cc: linux-cachefs@redhat.com, linux-erofs@lists.ozlabs.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, yinxin.x@bytedance.com References: <20220818135204.49878-1-zhujia.zj@bytedance.com> <20220818135204.49878-4-zhujia.zj@bytedance.com> From: JeffleXu In-Reply-To: <20220818135204.49878-4-zhujia.zj@bytedance.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-13.5 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/18/22 9:52 PM, Jia Zhu wrote: > When an anonymous fd is closed by user daemon, if there is a new read > request for this file comes up, the anonymous fd should be re-opened > to handle that read request rather than fail it directly. > > 1. Introduce reopening state for objects that are closed but have > inflight/subsequent read requests. > 2. No longer flush READ requests but only CLOSE requests when anonymous > fd is closed. > 3. Enqueue the reopen work to workqueue, thus user daemon could get rid > of daemon_read context and handle that request smoothly. Otherwise, > the user daemon will send a reopen request and wait for itself to > process the request. > > Signed-off-by: Jia Zhu > Reviewed-by: Xin Yin > --- > fs/cachefiles/internal.h | 3 ++ > fs/cachefiles/ondemand.c | 79 +++++++++++++++++++++++++++------------- > 2 files changed, 56 insertions(+), 26 deletions(-) > > diff --git a/fs/cachefiles/internal.h b/fs/cachefiles/internal.h > index cdf4ec781933..66bbd4f1d22a 100644 > --- a/fs/cachefiles/internal.h > +++ b/fs/cachefiles/internal.h > @@ -48,9 +48,11 @@ struct cachefiles_volume { > enum cachefiles_object_state { > CACHEFILES_ONDEMAND_OBJSTATE_close, /* Anonymous fd closed by daemon or initial state */ > CACHEFILES_ONDEMAND_OBJSTATE_open, /* Anonymous fd associated with object is available */ > + CACHEFILES_ONDEMAND_OBJSTATE_reopening, /* Object that was closed and is being reopened. */ > }; > > struct cachefiles_ondemand_info { > + struct work_struct work; > int ondemand_id; > enum cachefiles_object_state state; > struct cachefiles_object *object; > @@ -341,6 +343,7 @@ cachefiles_ondemand_set_object_##_state(struct cachefiles_object *object) \ > > CACHEFILES_OBJECT_STATE_FUNCS(open); > CACHEFILES_OBJECT_STATE_FUNCS(close); > +CACHEFILES_OBJECT_STATE_FUNCS(reopening); > #else > #define CACHEFILES_ONDEMAND_OBJINFO(object) NULL > > diff --git a/fs/cachefiles/ondemand.c b/fs/cachefiles/ondemand.c > index f51266554e4d..79ffb19380cd 100644 > --- a/fs/cachefiles/ondemand.c > +++ b/fs/cachefiles/ondemand.c > @@ -18,14 +18,10 @@ static int cachefiles_ondemand_fd_release(struct inode *inode, > info->ondemand_id = CACHEFILES_ONDEMAND_ID_CLOSED; > cachefiles_ondemand_set_object_close(object); > > - /* > - * Flush all pending READ requests since their completion depends on > - * anon_fd. > - */ > - xas_for_each(&xas, req, ULONG_MAX) { > + /* Only flush CACHEFILES_REQ_NEW marked req to avoid race with daemon_read */ > + xas_for_each_marked(&xas, req, ULONG_MAX, CACHEFILES_REQ_NEW) { Could you please add a more detailed comment here, explaing why flushing CLOSE requests when anony fd gets closed is needed, and why the original xas_for_each() would race with daemon_read()? There are some refs at [1] and [2]. [1] https://hackmd.io/YNsTQqLcQYOZ4gAlFWrNcA#flush-CLOSE-requests-when-anon-fd-is-closed [2] https://hackmd.io/YNsTQqLcQYOZ4gAlFWrNcA#race-between-readingflush-requests The sequence chart is welcome to be added into the comment to explain the race, or the code will be difficult to understand since the subtlety of the race. > if (req->msg.object_id == object_id && > - req->msg.opcode == CACHEFILES_OP_READ) { > - req->error = -EIO; > + req->msg.opcode == CACHEFILES_OP_CLOSE) { > complete(&req->done); > xas_store(&xas, NULL); > } > @@ -175,6 +171,7 @@ int cachefiles_ondemand_copen(struct cachefiles_cache *cache, char *args) > trace_cachefiles_ondemand_copen(req->object, id, size); > > cachefiles_ondemand_set_object_open(req->object); > + wake_up_all(&cache->daemon_pollwq); > > out: > complete(&req->done); > @@ -234,6 +231,14 @@ static int cachefiles_ondemand_get_fd(struct cachefiles_req *req) > return ret; > } > > +static void ondemand_object_worker(struct work_struct *work) > +{ > + struct cachefiles_object *object = > + ((struct cachefiles_ondemand_info *)work)->object; > + > + cachefiles_ondemand_init_object(object); > +} > + > ssize_t cachefiles_ondemand_daemon_read(struct cachefiles_cache *cache, > char __user *_buffer, size_t buflen) > { > @@ -249,7 +254,27 @@ ssize_t cachefiles_ondemand_daemon_read(struct cachefiles_cache *cache, > * requests from being processed repeatedly. > */ > xa_lock(&cache->reqs); > - req = xas_find_marked(&xas, UINT_MAX, CACHEFILES_REQ_NEW); > + xas_for_each_marked(&xas, req, UINT_MAX, CACHEFILES_REQ_NEW) { > + /* > + * Reopen the closed object with associated read request. > + * Skip read requests whose related object are reopening. > + */ > + if (req->msg.opcode == CACHEFILES_OP_READ) { > + ret = cmpxchg(&CACHEFILES_ONDEMAND_OBJINFO(req->object)->state, > + CACHEFILES_ONDEMAND_OBJSTATE_close, > + CACHEFILES_ONDEMAND_OBJSTATE_reopening); > + if (ret == CACHEFILES_ONDEMAND_OBJSTATE_close) { > + INIT_WORK(&CACHEFILES_ONDEMAND_OBJINFO(req->object)->work, > + ondemand_object_worker); How about initializing @work in cachefiles_ondemand_init_obj_info(), so that the work_struct of each object only needs to be initialized once? > + queue_work(fscache_wq, > + &CACHEFILES_ONDEMAND_OBJINFO(req->object)->work); > + continue; > + } else if (ret == CACHEFILES_ONDEMAND_OBJSTATE_reopening) { > + continue; > + } > + } > + break; > + } > if (!req) { > xa_unlock(&cache->reqs); > return 0; > @@ -267,14 +292,18 @@ ssize_t cachefiles_ondemand_daemon_read(struct cachefiles_cache *cache, > xa_unlock(&cache->reqs); > > id = xas.xa_index; > - msg->msg_id = id; > > if (msg->opcode == CACHEFILES_OP_OPEN) { > ret = cachefiles_ondemand_get_fd(req); > - if (ret) > + if (ret) { > + cachefiles_ondemand_set_object_close(req->object); > goto error; > + } > } > > + msg->msg_id = id; > + msg->object_id = CACHEFILES_ONDEMAND_OBJINFO(req->object)->ondemand_id; > + > if (copy_to_user(_buffer, msg, n) != 0) { > ret = -EFAULT; > goto err_put_fd; > @@ -307,19 +336,23 @@ static int cachefiles_ondemand_send_req(struct cachefiles_object *object, > void *private) > { > struct cachefiles_cache *cache = object->volume->cache; > - struct cachefiles_req *req; > + struct cachefiles_req *req = NULL; > XA_STATE(xas, &cache->reqs, 0); > int ret; > > if (!test_bit(CACHEFILES_ONDEMAND_MODE, &cache->flags)) > return 0; > > - if (test_bit(CACHEFILES_DEAD, &cache->flags)) > - return -EIO; > + if (test_bit(CACHEFILES_DEAD, &cache->flags)) { > + ret = -EIO; > + goto out; > + } > > req = kzalloc(sizeof(*req) + data_len, GFP_KERNEL); > - if (!req) > - return -ENOMEM; > + if (!req) { > + ret = -ENOMEM; > + goto out; > + } > > req->object = object; > init_completion(&req->done); > @@ -357,7 +390,7 @@ static int cachefiles_ondemand_send_req(struct cachefiles_object *object, > /* coupled with the barrier in cachefiles_flush_reqs() */ > smp_mb(); > > - if (opcode != CACHEFILES_OP_OPEN && > + if (opcode == CACHEFILES_OP_CLOSE && > !cachefiles_ondemand_object_is_open(object)) { > WARN_ON_ONCE(CACHEFILES_ONDEMAND_OBJINFO(object)->ondemand_id == 0); > xas_unlock(&xas); > @@ -382,8 +415,12 @@ static int cachefiles_ondemand_send_req(struct cachefiles_object *object, > wake_up_all(&cache->daemon_pollwq); > wait_for_completion(&req->done); > ret = req->error; > + kfree(req); > + return ret; > out: > kfree(req); > + if (opcode == CACHEFILES_OP_OPEN) > + cachefiles_ondemand_set_object_close(req->object); Could you please add a comment here explaining why we need to set the object state back to CLOSE state for OPEN (espectially reopening) requests when error occured, and why we only set it back to CLOSE state when error occured before the anony fd gets initialized? (That's because when the error occures after the anony fd has been initialized, the object will be reset to CLOSE state through cachefiles_ondemand_fd_release() triggered by close_fd().) Or the code is quite difficult to comprehend. > return ret; > } > > @@ -435,7 +472,6 @@ static int cachefiles_ondemand_init_close_req(struct cachefiles_req *req, > if (!cachefiles_ondemand_object_is_open(object)) > return -ENOENT; > > - req->msg.object_id = CACHEFILES_ONDEMAND_OBJINFO(object)->ondemand_id; > trace_cachefiles_ondemand_close(object, &req->msg); > return 0; > } > @@ -451,16 +487,7 @@ static int cachefiles_ondemand_init_read_req(struct cachefiles_req *req, > struct cachefiles_object *object = req->object; > struct cachefiles_read *load = (void *)req->msg.data; > struct cachefiles_read_ctx *read_ctx = private; > - int object_id = CACHEFILES_ONDEMAND_OBJINFO(object)->ondemand_id; > > - /* Stop enqueuing requests when daemon has closed anon_fd. */ > - if (!cachefiles_ondemand_object_is_open(object)) { > - WARN_ON_ONCE(object_id == 0); > - pr_info_once("READ: anonymous fd closed prematurely.\n"); > - return -EIO; > - } > - > - req->msg.object_id = object_id; > load->off = read_ctx->off; > load->len = read_ctx->len; > trace_cachefiles_ondemand_read(object, &req->msg, load); -- Thanks, Jingbo