Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4E2D7C61DA4 for ; Thu, 9 Mar 2023 07:45:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230027AbjCIHpg (ORCPT ); Thu, 9 Mar 2023 02:45:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229692AbjCIHpd (ORCPT ); Thu, 9 Mar 2023 02:45:33 -0500 Received: from dggsgout11.his.huawei.com (dggsgout11.his.huawei.com [45.249.212.51]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 840F0D23BF; Wed, 8 Mar 2023 23:45:31 -0800 (PST) Received: from mail02.huawei.com (unknown [172.30.67.169]) by dggsgout11.his.huawei.com (SkyGuard) with ESMTP id 4PXLnd6LTTz4f41SK; Thu, 9 Mar 2023 15:45:25 +0800 (CST) Received: from [10.174.176.73] (unknown [10.174.176.73]) by APP3 (Coremail) with SMTP id _Ch0CgBH9CGVjglkITJqEg--.53163S3; Thu, 09 Mar 2023 15:45:27 +0800 (CST) Subject: Re: [PATCH -next] raid10: fix leak of io accounting To: Guoqing Jiang , Yu Kuai , song@kernel.org Cc: linux-raid@vger.kernel.org, linux-kernel@vger.kernel.org, yi.zhang@huawei.com, yangerkun@huawei.com, "yukuai (C)" References: <20230304070133.1134975-1-yukuai1@huaweicloud.com> <76d32496-641e-c93a-df77-9ce9d9c1a1e1@huaweicloud.com> From: Yu Kuai Message-ID: <66e481e6-ed2c-2ac2-bdd0-9e20a0ec9771@huaweicloud.com> Date: Thu, 9 Mar 2023 15:45:25 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-CM-TRANSID: _Ch0CgBH9CGVjglkITJqEg--.53163S3 X-Coremail-Antispam: 1UD129KBjvJXoWxWw1UArWrtr4DAr4Dtr4DCFg_yoW5Jw1kpw 4kJa90yrW5Jry8ur1Ut34UAasYywsrt3W7ZryrJ3WrXrnFvr9YqF1UXFZ09rn5XrZ3WF1j qF1Ygr9rursFyFDanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUkE14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26F1j6w1UM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4U JVWxJr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Gc CE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E 2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJV W8JwACjcxG0xvEwIxGrwACjI8F5VA0II8E6IAqYI8I648v4I1lc7I2V7IY0VAS07AlzVAY IcxG8wCF04k20xvY0x0EwIxGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14 v26r1j6r18MI8I3I0E7480Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkG c2Ij64vIr41lIxAIcVC0I7IYx2IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI 0_Jr0_Gr1lIxAIcVCF04k26cxKx2IYs7xG6rWUJVWrZr1UMIIF0xvEx4A2jsIE14v26r1j 6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Gr0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x0JUdHU DUUUUU= X-CM-SenderInfo: 51xn3trlr6x35dzhxuhorxvhhfrp/ X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, 在 2023/03/09 15:27, Guoqing Jiang 写道: > > > On 3/9/23 14:56, Yu Kuai wrote: >> Hi, >> >> 在 2023/03/09 14:36, Guoqing Jiang 写道: >>> Hi, >>> >>> What do you mean 'leak' here? >> >> I try to mean that inflight counting is leaked, because it's increased >> twice for one io. > > How about change the subject to something like? > > 'md/raid10: Don't call bio_start_io_acct twice for bio which experienced > read error' > Of course, I'll change that in v2. >> >>> >>> On 3/4/23 15:01, Yu Kuai wrote: >>>> From: Yu Kuai >>>> >>>> handle_read_error() will resumit r10_bio by raid10_read_request(), >>>> which >>>> will call bio_start_io_acct() again, while bio_end_io_acct() will only >>>> be called once. >>>> >>>> Fix the problem by don't account io again from handle_read_error(). >>> >>> My understanding is it caused inaccurate io stats for bio which had a >>> read >>> error. >>> >>>> Fixes: 528bc2cf2fcc ("md/raid10: enable io accounting") >>>> Signed-off-by: Yu Kuai >>>> --- >>>>   drivers/md/raid10.c | 8 ++++---- >>>>   1 file changed, 4 insertions(+), 4 deletions(-) >>>> >>>> diff --git a/drivers/md/raid10.c b/drivers/md/raid10.c >>>> index 6c66357f92f5..4f8edb6ea3e2 100644 >>>> --- a/drivers/md/raid10.c >>>> +++ b/drivers/md/raid10.c >>>> @@ -1173,7 +1173,7 @@ static bool regular_request_wait(struct mddev >>>> *mddev, struct r10conf *conf, >>>>   } >>>>   static void raid10_read_request(struct mddev *mddev, struct bio *bio, >>>> -                struct r10bio *r10_bio) >>>> +                struct r10bio *r10_bio, bool handle_error) >>>>   { >>>>       struct r10conf *conf = mddev->private; >>>>       struct bio *read_bio; >>>> @@ -1244,7 +1244,7 @@ static void raid10_read_request(struct mddev >>>> *mddev, struct bio *bio, >>>>       } >>>>       slot = r10_bio->read_slot; >>>> -    if (blk_queue_io_stat(bio->bi_bdev->bd_disk->queue)) >>>> +    if (!handle_error && >>>> blk_queue_io_stat(bio->bi_bdev->bd_disk->queue)) >>>>           r10_bio->start_time = bio_start_io_acct(bio); >>> >>> I think a simpler way is just check R10BIO_ReadError here. >> >> No, I'm afraid this is incorrect because handle_read_error clears the >> state before resubmiting the r10bio. > > Right, > > Acked-by: Guoqing Jiang Thanks for the review. Kuai > > Thanks, > Guoqing > . >