Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp2729722rdb; Mon, 4 Dec 2023 06:09:45 -0800 (PST) X-Google-Smtp-Source: AGHT+IFFUFMCWRJ0T2qNBgSjlVwwNvMRCYba/nYejUVoIHOPDN2FDyrn2aEGFhG84Udqd5ZpmwG0 X-Received: by 2002:a17:903:41d2:b0:1d0:9feb:b73c with SMTP id u18-20020a17090341d200b001d09febb73cmr1379587ple.30.1701698985110; Mon, 04 Dec 2023 06:09:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701698985; cv=none; d=google.com; s=arc-20160816; b=v4ZnuJciyqblGZf+mB3bPgfwLe6U7joz73XAdj1S6jdZ9xAY/PM4d0qjQCipltPBJw e24QYgBtqyVKotVafJxscAts2yuHckIbVDzSiWkw17xrGEwCTriitapzeVk0VwxH32uN AsOWh4lfUNeWOZ4HA63hiAyM5TZ2MlbUyTf/PSmanJntfHwuqCFhSVtU4OFxrnFbTX6d 32LrMMlyyF045thK1A6zUfabtCjr8oA7BvYxB4aat05PP0H/R3fxEYWe0RtgiMxcgm7L pHwWsOHbR0dRYoXvftJ/EbAsAyNr7kO6kUldLK+cUn2NMBd6k2fAnxxEJ7D/aRojB69V 0I3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=q9buizu/CsyB1/+5AQ9tOdZA7cKw1l9ZoiEk33ziMvk=; fh=6wtiWKaTnBKNmlZE3swu0ut3zq0707ISGjFRV03sVg8=; b=npJoON5LZSEroHQICMw7undOKNuGjSadEv15N6mzA/buAK+6W9Ga6AU6yHJ6DPq5ME aB8hE2y/StYQ0jKuErUkYsJ0zCkzrCvgw+ezocxN7T6em5mqgWYhF7UK1wfNWRZQPIEU UnT/Obe25yYaNQxn+AqwJEEPcNlXspOxeOs7nuymfqdnz2mVIHr2HepskOENSaBywihy utuWBPlEMwmAt0k9uXflf2ouXZBSFiT9HowUnth9zJWUhNcmsvfQ8qUxubOyl3PjX7CB WIXZVY2Q8jJzZM3IKCiTv9/dT2v7SquG9gPPjqIoZfAIN8vOP2rr0B3GKYQYs+sKgYM4 Si3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id jk5-20020a170903330500b001d0748f1dffsi3752127plb.162.2023.12.04.06.09.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Dec 2023 06:09:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 343098078CA4; Mon, 4 Dec 2023 06:09:38 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344917AbjLDOJT (ORCPT + 99 others); Mon, 4 Dec 2023 09:09:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42532 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233342AbjLDOJS (ORCPT ); Mon, 4 Dec 2023 09:09:18 -0500 Received: from mx3.molgen.mpg.de (mx3.molgen.mpg.de [141.14.17.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5E33683; Mon, 4 Dec 2023 06:09:23 -0800 (PST) Received: from [141.14.220.40] (g40.guest.molgen.mpg.de [141.14.220.40]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id 371C261E5FE03; Mon, 4 Dec 2023 15:08:20 +0100 (CET) Message-ID: <83ad1add-314e-4e1a-bfd4-30123b032460@molgen.mpg.de> Date: Mon, 4 Dec 2023 15:08:19 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH -next] md: split MD_RECOVERY_NEEDED out of mddev_resume Content-Language: en-US To: Yu Kuai Cc: agk@redhat.com, snitzer@kernel.org, mpatocka@redhat.com, dm-devel@lists.linux.dev, song@kernel.org, yukuai3@huawei.com, janpieter.sollie@edpnet.be, linux-kernel@vger.kernel.org, linux-raid@vger.kernel.org, yi.zhang@huawei.com, yangerkun@huawei.com References: <20231204031703.3102254-1-yukuai1@huaweicloud.com> From: Paul Menzel In-Reply-To: <20231204031703.3102254-1-yukuai1@huaweicloud.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Mon, 04 Dec 2023 06:09:38 -0800 (PST) Dear Yu, Thank you for your patch. Am 04.12.23 um 04:17 schrieb Yu Kuai: > From: Yu Kuai > > New mddev_resume() calls are added to synchroniza IO with array synchronize > reconfiguration, however, this introduce a regression while adding it in 1. Maybe: … performance regression … 2. introduce*s* > md_start_sync(): > > 1) someone set MD_RECOVERY_NEEDED first; set*s* > 2) daemon thread grab reconfig_mutex, then clear MD_RECOVERY_NEEDED and > queue a new sync work; grab*s*, clear*s*, queue*s* > 3) daemon thread release reconfig_mutex; release*s* > 4) in md_start_sync > a) check that there are spares that can be added/removed, then suspend > the array; > b) remove_and_add_spares may not be called, or called without really > add/remove spares; > c) resume the array, then set MD_RECOVERY_NEEDED again! > > Loop between 2 - 4, then mddev_suspend() will be called quite often, for > consequence, normal IO will be quite slow. It’d be great if you could document the exact “test case”, and numbers. > Fix this problem by spliting MD_RECOVERY_NEEDED out of mddev_resume(), so split*t*ing > that md_start_sync() won't set such flag and hence the loop will be broken. > > Fixes: bc08041b32ab ("md: suspend array in md_start_sync() if array need reconfiguration") > Reported-and-tested-by: Janpieter Sollie > Closes: https://bugzilla.kernel.org/show_bug.cgi?id=218200 > Signed-off-by: Yu Kuai > --- > drivers/md/dm-raid.c | 1 + > drivers/md/md-bitmap.c | 2 ++ > drivers/md/md.c | 6 +++++- > drivers/md/raid5.c | 4 ++++ > 4 files changed, 12 insertions(+), 1 deletion(-) > > diff --git a/drivers/md/dm-raid.c b/drivers/md/dm-raid.c > index eb009d6bb03a..e9c0d70f7fe5 100644 > --- a/drivers/md/dm-raid.c > +++ b/drivers/md/dm-raid.c > @@ -4059,6 +4059,7 @@ static void raid_resume(struct dm_target *ti) > clear_bit(MD_RECOVERY_FROZEN, &mddev->recovery); > mddev->ro = 0; > mddev->in_sync = 0; > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > } > } > diff --git a/drivers/md/md-bitmap.c b/drivers/md/md-bitmap.c > index 9672f75c3050..16112750ee64 100644 > --- a/drivers/md/md-bitmap.c > +++ b/drivers/md/md-bitmap.c > @@ -2428,6 +2428,7 @@ location_store(struct mddev *mddev, const char *buf, size_t len) > } > rv = 0; > out: > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > if (rv) > return rv; > @@ -2571,6 +2572,7 @@ backlog_store(struct mddev *mddev, const char *buf, size_t len) > if (old_mwb != backlog) > md_bitmap_update_sb(mddev->bitmap); > > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > return len; > } > diff --git a/drivers/md/md.c b/drivers/md/md.c > index 4b1e8007dd15..48a1b12f3c2c 100644 > --- a/drivers/md/md.c > +++ b/drivers/md/md.c > @@ -515,7 +515,6 @@ void mddev_resume(struct mddev *mddev) > percpu_ref_resurrect(&mddev->active_io); > wake_up(&mddev->sb_wait); > > - set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > md_wakeup_thread(mddev->thread); > md_wakeup_thread(mddev->sync_thread); /* possibly kick off a reshape */ > > @@ -4146,6 +4145,7 @@ level_store(struct mddev *mddev, const char *buf, size_t len) > md_new_event(); > rv = len; > out_unlock: > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > return rv; > } > @@ -4652,6 +4652,8 @@ new_dev_store(struct mddev *mddev, const char *buf, size_t len) > out: > if (err) > export_rdev(rdev, mddev); > + else > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > if (!err) > md_new_event(); > @@ -5533,6 +5535,7 @@ serialize_policy_store(struct mddev *mddev, const char *buf, size_t len) > mddev_destroy_serial_pool(mddev, NULL); > mddev->serialize_policy = value; > unlock: > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > return err ?: len; > } > @@ -6593,6 +6596,7 @@ static void autorun_devices(int part) > export_rdev(rdev, mddev); > } > autorun_array(mddev); > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > } > /* on success, candidates will be empty, on error > diff --git a/drivers/md/raid5.c b/drivers/md/raid5.c > index 42ba3581cfea..f88f92517a18 100644 > --- a/drivers/md/raid5.c > +++ b/drivers/md/raid5.c > @@ -6989,6 +6989,7 @@ raid5_store_stripe_size(struct mddev *mddev, const char *page, size_t len) > mutex_unlock(&conf->cache_size_mutex); > > out_unlock: > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > return err ?: len; > } > @@ -7090,6 +7091,7 @@ raid5_store_skip_copy(struct mddev *mddev, const char *page, size_t len) > else > blk_queue_flag_clear(QUEUE_FLAG_STABLE_WRITES, q); > } > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > return err ?: len; > } > @@ -7169,6 +7171,7 @@ raid5_store_group_thread_cnt(struct mddev *mddev, const char *page, size_t len) > kfree(old_groups); > } > } > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > > return err ?: len; > @@ -8920,6 +8923,7 @@ static int raid5_change_consistency_policy(struct mddev *mddev, const char *buf) > if (!err) > md_update_sb(mddev, 1); > > + set_bit(MD_RECOVERY_NEEDED, &mddev->recovery); > mddev_unlock_and_resume(mddev); > > return err; Acked-by: Paul Menzel Kind regards, Paul