2017-08-08 05:05:45

by Wang Shilong

[permalink] [raw]
Subject: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

From: Wang Shilong <[email protected]>

While running number of creating file threads concurrently,
we found heavy lock contention on group spinlock:

FUNC TOTAL_TIME(us) COUNT AVG(us)
ext4_create 1707443399 1440000 1185.72
_raw_spin_lock 1317641501 180899929 7.28
jbd2__journal_start 287821030 1453950 197.96
jbd2_journal_get_write_access 33441470 73077185 0.46
ext4_add_nondir 29435963 1440000 20.44
ext4_add_entry 26015166 1440049 18.07
ext4_dx_add_entry 25729337 1432814 17.96
ext4_mark_inode_dirty 12302433 5774407 2.13

most of cpu time blames to _raw_spin_lock, here is some testing
numbers with/without patch.

Test environment:
Server : SuperMicro Sever (2 x E5-2690 [email protected], 128GB 2133MHz
DDR4 Memory, 8GbFC)
Storage : 2 x RAID1 (DDN SFA7700X, 4 x Toshiba PX02SMU020 200GB
Read Intensive SSD)

format command:
mkfs.ext4 -J size=4096

test command:
mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
-r -i 1 -v -p 10 -u #first run to load inode

mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
-r -i 5 -v -p 10 -u

Kernel version: 4.13.0-rc3

Test 1,440,000 files with 48 directories by 48 processes:

Without patch:

File Creation File removal
79,033 289,569 ops/per second
81,463 285,359
79,875 288,475
79,917 284,624
79,420 290,91

with patch:
File Creation File removal
691,528 296,574 ops/per second
691,946 297,106
692,030 296,238
691,005 299,249
692,871 300,664

Creation performance is improved more than 8X with large
journal size. The main problem here is we test bitmap
and do some check and journal operations which could be
slept, then we test and set with lock hold, this could
be racy, and make 'inode' steal by other process.

However, after first try, we could confirm handle has
been started and inode bitmap journaled too, then
we could find and set bit with lock hold directly, this
will mostly gurateee success with second try.

This patch dosen't change logic if it comes to
no journal mode, luckily this is not normal
use cases i believe.

Tested-by: Shuichi Ihara <[email protected]>
Signed-off-by: Wang Shilong <[email protected]>
---
v3->v4: codes cleanup and avoid sleep.
---
fs/ext4/ialloc.c | 30 +++++++++++++++++++++++++++++-
1 file changed, 29 insertions(+), 1 deletion(-)

diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
index 507bfb3..23380f39 100644
--- a/fs/ext4/ialloc.c
+++ b/fs/ext4/ialloc.c
@@ -761,6 +761,7 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
ext4_group_t flex_group;
struct ext4_group_info *grp;
int encrypt = 0;
+ bool hold_lock;

/* Cannot create files in a deleted directory */
if (!dir || !dir->i_nlink)
@@ -917,17 +918,40 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
continue;
}

+ hold_lock = false;
repeat_in_this_group:
+ /* if @hold_lock is ture, that means, journal
+ * is properly setup and inode bitmap buffer has
+ * been journaled already, we can directly hold
+ * lock and set bit if found, this will mostly
+ * gurantee forward progress for each thread.
+ */
+ if (hold_lock)
+ ext4_lock_group(sb, group);
+
ino = ext4_find_next_zero_bit((unsigned long *)
inode_bitmap_bh->b_data,
EXT4_INODES_PER_GROUP(sb), ino);
- if (ino >= EXT4_INODES_PER_GROUP(sb))
+ if (ino >= EXT4_INODES_PER_GROUP(sb)) {
+ if (hold_lock)
+ ext4_unlock_group(sb, group);
goto next_group;
+ }
if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
+ if (hold_lock)
+ ext4_unlock_group(sb, group);
ext4_error(sb, "reserved inode found cleared - "
"inode=%lu", ino + 1);
continue;
}
+
+ if (hold_lock) {
+ ext4_set_bit(ino, inode_bitmap_bh->b_data);
+ ext4_unlock_group(sb, group);
+ ino++;
+ goto got;
+ }
+
if ((EXT4_SB(sb)->s_journal == NULL) &&
recently_deleted(sb, group, ino)) {
ino++;
@@ -950,6 +974,10 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
ext4_std_error(sb, err);
goto out;
}
+
+ if (EXT4_SB(sb)->s_journal)
+ hold_lock = true;
+
ext4_lock_group(sb, group);
ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
ext4_unlock_group(sb, group);
--
2.9.3


2017-08-16 16:42:14

by Jan Kara

[permalink] [raw]
Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

On Tue 08-08-17 13:05:17, Wang Shilong wrote:
> From: Wang Shilong <[email protected]>
>
> While running number of creating file threads concurrently,
> we found heavy lock contention on group spinlock:
>
> FUNC TOTAL_TIME(us) COUNT AVG(us)
> ext4_create 1707443399 1440000 1185.72
> _raw_spin_lock 1317641501 180899929 7.28
> jbd2__journal_start 287821030 1453950 197.96
> jbd2_journal_get_write_access 33441470 73077185 0.46
> ext4_add_nondir 29435963 1440000 20.44
> ext4_add_entry 26015166 1440049 18.07
> ext4_dx_add_entry 25729337 1432814 17.96
> ext4_mark_inode_dirty 12302433 5774407 2.13
>
> most of cpu time blames to _raw_spin_lock, here is some testing
> numbers with/without patch.
>
> Test environment:
> Server : SuperMicro Sever (2 x E5-2690 [email protected], 128GB 2133MHz
> DDR4 Memory, 8GbFC)
> Storage : 2 x RAID1 (DDN SFA7700X, 4 x Toshiba PX02SMU020 200GB
> Read Intensive SSD)
>
> format command:
> mkfs.ext4 -J size=4096
>
> test command:
> mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> -r -i 1 -v -p 10 -u #first run to load inode
>
> mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> -r -i 5 -v -p 10 -u
>
> Kernel version: 4.13.0-rc3
>
> Test 1,440,000 files with 48 directories by 48 processes:
>
> Without patch:
>
> File Creation File removal
> 79,033 289,569 ops/per second
> 81,463 285,359
> 79,875 288,475
> 79,917 284,624
> 79,420 290,91
>
> with patch:
> File Creation File removal
> 691,528 296,574 ops/per second
> 691,946 297,106
> 692,030 296,238
> 691,005 299,249
> 692,871 300,664
>
> Creation performance is improved more than 8X with large
> journal size. The main problem here is we test bitmap
> and do some check and journal operations which could be
> slept, then we test and set with lock hold, this could
> be racy, and make 'inode' steal by other process.
>
> However, after first try, we could confirm handle has
> been started and inode bitmap journaled too, then
> we could find and set bit with lock hold directly, this
> will mostly gurateee success with second try.
>
> This patch dosen't change logic if it comes to
> no journal mode, luckily this is not normal
> use cases i believe.
>
> Tested-by: Shuichi Ihara <[email protected]>
> Signed-off-by: Wang Shilong <[email protected]>

The results look great and the code looks correct however I dislike the
somewhat complex codeflow with your hold_lock variable. So how about
cleaning up the code as follows:

Create function like

unsigned long find_inode_bit(struct super_block *sb, ext4_group_t group,
struct buffer_head *bitmap, unsigned long start_ino)
{
unsigned long ino;

next:
ino = ext4_find_next_zero_bit(...);
if (ino >= EXT4_INODES_PER_GROUP(sb))
return 0;
if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
...
return 0;
}
if ((EXT4_SB(sb)->s_journal == NULL) &&
recently_deleted(sb, group, ino)) {
start_ino = ino + 1;
if (start_ino < EXT4_INODES_PER_GROUP(sb))
goto next;
}
return ino;
}

Then you can use this function from __ext4_new_inode() when looking for
free ino and also in case test_and_set_bit() fails you could just do:

ext4_lock_group(sb, group);
ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
if (ret2) {
/* Someone already took the bit. Repeat the search with lock held.*/
ino = find_inode_bit(sb, group, inode_bitmap_bh, ino);
if (ino) {
ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
WARN_ON_ONCE(!ret2);
}
}
ext4_unlock_group(sb, group);

And that's it, no strange bool variables and conditional locking. And as a
bonus it also works for nojournal mode in the same way.

Honza

> ---
> v3->v4: codes cleanup and avoid sleep.
> ---
> fs/ext4/ialloc.c | 30 +++++++++++++++++++++++++++++-
> 1 file changed, 29 insertions(+), 1 deletion(-)
>
> diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
> index 507bfb3..23380f39 100644
> --- a/fs/ext4/ialloc.c
> +++ b/fs/ext4/ialloc.c
> @@ -761,6 +761,7 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> ext4_group_t flex_group;
> struct ext4_group_info *grp;
> int encrypt = 0;
> + bool hold_lock;
>
> /* Cannot create files in a deleted directory */
> if (!dir || !dir->i_nlink)
> @@ -917,17 +918,40 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> continue;
> }
>
> + hold_lock = false;
> repeat_in_this_group:
> + /* if @hold_lock is ture, that means, journal
> + * is properly setup and inode bitmap buffer has
> + * been journaled already, we can directly hold
> + * lock and set bit if found, this will mostly
> + * gurantee forward progress for each thread.
> + */
> + if (hold_lock)
> + ext4_lock_group(sb, group);
> +
> ino = ext4_find_next_zero_bit((unsigned long *)
> inode_bitmap_bh->b_data,
> EXT4_INODES_PER_GROUP(sb), ino);
> - if (ino >= EXT4_INODES_PER_GROUP(sb))
> + if (ino >= EXT4_INODES_PER_GROUP(sb)) {
> + if (hold_lock)
> + ext4_unlock_group(sb, group);
> goto next_group;
> + }
> if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> + if (hold_lock)
> + ext4_unlock_group(sb, group);
> ext4_error(sb, "reserved inode found cleared - "
> "inode=%lu", ino + 1);
> continue;
> }
> +
> + if (hold_lock) {
> + ext4_set_bit(ino, inode_bitmap_bh->b_data);
> + ext4_unlock_group(sb, group);
> + ino++;
> + goto got;
> + }
> +
> if ((EXT4_SB(sb)->s_journal == NULL) &&
> recently_deleted(sb, group, ino)) {
> ino++;
> @@ -950,6 +974,10 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> ext4_std_error(sb, err);
> goto out;
> }
> +
> + if (EXT4_SB(sb)->s_journal)
> + hold_lock = true;
> +
> ext4_lock_group(sb, group);
> ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> ext4_unlock_group(sb, group);
> --
> 2.9.3
>
--
Jan Kara <[email protected]>
SUSE Labs, CR

2017-08-17 06:23:29

by Wang Shilong

[permalink] [raw]
Subject: RE: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

Hi Jan,

thanks for good suggestion, just one question we could not hold lock
with nojounal mode, how about something attached one?

please let me know if you have better taste for it, much appreciated!


Thanks,
Shilong


________________________________________
From: Jan Kara [[email protected]]
Sent: Thursday, August 17, 2017 0:42
To: Wang Shilong
Cc: [email protected]; [email protected]; Wang Shilong; [email protected]; Shuichi Ihara; Li Xi
Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

On Tue 08-08-17 13:05:17, Wang Shilong wrote:
> From: Wang Shilong <[email protected]>
>
> While running number of creating file threads concurrently,
> we found heavy lock contention on group spinlock:
>
> FUNC TOTAL_TIME(us) COUNT AVG(us)
> ext4_create 1707443399 1440000 1185.72
> _raw_spin_lock 1317641501 180899929 7.28
> jbd2__journal_start 287821030 1453950 197.96
> jbd2_journal_get_write_access 33441470 73077185 0.46
> ext4_add_nondir 29435963 1440000 20.44
> ext4_add_entry 26015166 1440049 18.07
> ext4_dx_add_entry 25729337 1432814 17.96
> ext4_mark_inode_dirty 12302433 5774407 2.13
>
> most of cpu time blames to _raw_spin_lock, here is some testing
> numbers with/without patch.
>
> Test environment:
> Server : SuperMicro Sever (2 x E5-2690 [email protected], 128GB 2133MHz
> DDR4 Memory, 8GbFC)
> Storage : 2 x RAID1 (DDN SFA7700X, 4 x Toshiba PX02SMU020 200GB
> Read Intensive SSD)
>
> format command:
> mkfs.ext4 -J size=4096
>
> test command:
> mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> -r -i 1 -v -p 10 -u #first run to load inode
>
> mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> -r -i 5 -v -p 10 -u
>
> Kernel version: 4.13.0-rc3
>
> Test 1,440,000 files with 48 directories by 48 processes:
>
> Without patch:
>
> File Creation File removal
> 79,033 289,569 ops/per second
> 81,463 285,359
> 79,875 288,475
> 79,917 284,624
> 79,420 290,91
>
> with patch:
> File Creation File removal
> 691,528 296,574 ops/per second
> 691,946 297,106
> 692,030 296,238
> 691,005 299,249
> 692,871 300,664
>
> Creation performance is improved more than 8X with large
> journal size. The main problem here is we test bitmap
> and do some check and journal operations which could be
> slept, then we test and set with lock hold, this could
> be racy, and make 'inode' steal by other process.
>
> However, after first try, we could confirm handle has
> been started and inode bitmap journaled too, then
> we could find and set bit with lock hold directly, this
> will mostly gurateee success with second try.
>
> This patch dosen't change logic if it comes to
> no journal mode, luckily this is not normal
> use cases i believe.
>
> Tested-by: Shuichi Ihara <[email protected]>
> Signed-off-by: Wang Shilong <[email protected]>

The results look great and the code looks correct however I dislike the
somewhat complex codeflow with your hold_lock variable. So how about
cleaning up the code as follows:

Create function like

unsigned long find_inode_bit(struct super_block *sb, ext4_group_t group,
struct buffer_head *bitmap, unsigned long start_ino)
{
unsigned long ino;

next:
ino = ext4_find_next_zero_bit(...);
if (ino >= EXT4_INODES_PER_GROUP(sb))
return 0;
if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
...
return 0;
}
if ((EXT4_SB(sb)->s_journal == NULL) &&
recently_deleted(sb, group, ino)) {
start_ino = ino + 1;
if (start_ino < EXT4_INODES_PER_GROUP(sb))
goto next;
}
return ino;
}

Then you can use this function from __ext4_new_inode() when looking for
free ino and also in case test_and_set_bit() fails you could just do:

ext4_lock_group(sb, group);
ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
if (ret2) {
/* Someone already took the bit. Repeat the search with lock held.*/
ino = find_inode_bit(sb, group, inode_bitmap_bh, ino);
if (ino) {
ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
WARN_ON_ONCE(!ret2);
}
}
ext4_unlock_group(sb, group);

And that's it, no strange bool variables and conditional locking. And as a
bonus it also works for nojournal mode in the same way.

Honza

> ---
> v3->v4: codes cleanup and avoid sleep.
> ---
> fs/ext4/ialloc.c | 30 +++++++++++++++++++++++++++++-
> 1 file changed, 29 insertions(+), 1 deletion(-)
>
> diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
> index 507bfb3..23380f39 100644
> --- a/fs/ext4/ialloc.c
> +++ b/fs/ext4/ialloc.c
> @@ -761,6 +761,7 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> ext4_group_t flex_group;
> struct ext4_group_info *grp;
> int encrypt = 0;
> + bool hold_lock;
>
> /* Cannot create files in a deleted directory */
> if (!dir || !dir->i_nlink)
> @@ -917,17 +918,40 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> continue;
> }
>
> + hold_lock = false;
> repeat_in_this_group:
> + /* if @hold_lock is ture, that means, journal
> + * is properly setup and inode bitmap buffer has
> + * been journaled already, we can directly hold
> + * lock and set bit if found, this will mostly
> + * gurantee forward progress for each thread.
> + */
> + if (hold_lock)
> + ext4_lock_group(sb, group);
> +
> ino = ext4_find_next_zero_bit((unsigned long *)
> inode_bitmap_bh->b_data,
> EXT4_INODES_PER_GROUP(sb), ino);
> - if (ino >= EXT4_INODES_PER_GROUP(sb))
> + if (ino >= EXT4_INODES_PER_GROUP(sb)) {
> + if (hold_lock)
> + ext4_unlock_group(sb, group);
> goto next_group;
> + }
> if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> + if (hold_lock)
> + ext4_unlock_group(sb, group);
> ext4_error(sb, "reserved inode found cleared - "
> "inode=%lu", ino + 1);
> continue;
> }
> +
> + if (hold_lock) {
> + ext4_set_bit(ino, inode_bitmap_bh->b_data);
> + ext4_unlock_group(sb, group);
> + ino++;
> + goto got;
> + }
> +
> if ((EXT4_SB(sb)->s_journal == NULL) &&
> recently_deleted(sb, group, ino)) {
> ino++;
> @@ -950,6 +974,10 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> ext4_std_error(sb, err);
> goto out;
> }
> +
> + if (EXT4_SB(sb)->s_journal)
> + hold_lock = true;
> +
> ext4_lock_group(sb, group);
> ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> ext4_unlock_group(sb, group);
> --
> 2.9.3
>
--
Jan Kara <[email protected]>
SUSE Labs, CR


Attachments:
modfied.patch (3.08 kB)
modfied.patch

2017-08-17 09:20:13

by Jan Kara

[permalink] [raw]
Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

Hi Shilong!

On Thu 17-08-17 06:23:26, Wang Shilong wrote:
> thanks for good suggestion, just one question we could not hold lock
> with nojounal mode, how about something attached one?
>
> please let me know if you have better taste for it, much appreciated!

Thanks for quickly updating the patch! Is the only reason why you cannot
hold the lock in the nojournal mode that sb_getblk() might sleep? The
attached patch should fix that so that you don't have to special-case the
nojournal mode anymore.

Also looking at your patch I'd just move the check for EXT4_FIRST_INO() out
of find_ino_bit() - that way you can avoid special-casing the error as well
and the check makes sense only when using find_next_zero_bit() for the
first time anyway (after that we are guaranteed that we start searching at
inode number that is big enough).

Honza

> ________________________________________
> From: Jan Kara [[email protected]]
> Sent: Thursday, August 17, 2017 0:42
> To: Wang Shilong
> Cc: [email protected]; [email protected]; Wang Shilong; [email protected]; Shuichi Ihara; Li Xi
> Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode
>
> On Tue 08-08-17 13:05:17, Wang Shilong wrote:
> > From: Wang Shilong <[email protected]>
> >
> > While running number of creating file threads concurrently,
> > we found heavy lock contention on group spinlock:
> >
> > FUNC TOTAL_TIME(us) COUNT AVG(us)
> > ext4_create 1707443399 1440000 1185.72
> > _raw_spin_lock 1317641501 180899929 7.28
> > jbd2__journal_start 287821030 1453950 197.96
> > jbd2_journal_get_write_access 33441470 73077185 0.46
> > ext4_add_nondir 29435963 1440000 20.44
> > ext4_add_entry 26015166 1440049 18.07
> > ext4_dx_add_entry 25729337 1432814 17.96
> > ext4_mark_inode_dirty 12302433 5774407 2.13
> >
> > most of cpu time blames to _raw_spin_lock, here is some testing
> > numbers with/without patch.
> >
> > Test environment:
> > Server : SuperMicro Sever (2 x E5-2690 [email protected], 128GB 2133MHz
> > DDR4 Memory, 8GbFC)
> > Storage : 2 x RAID1 (DDN SFA7700X, 4 x Toshiba PX02SMU020 200GB
> > Read Intensive SSD)
> >
> > format command:
> > mkfs.ext4 -J size=4096
> >
> > test command:
> > mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> > -r -i 1 -v -p 10 -u #first run to load inode
> >
> > mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> > -r -i 5 -v -p 10 -u
> >
> > Kernel version: 4.13.0-rc3
> >
> > Test 1,440,000 files with 48 directories by 48 processes:
> >
> > Without patch:
> >
> > File Creation File removal
> > 79,033 289,569 ops/per second
> > 81,463 285,359
> > 79,875 288,475
> > 79,917 284,624
> > 79,420 290,91
> >
> > with patch:
> > File Creation File removal
> > 691,528 296,574 ops/per second
> > 691,946 297,106
> > 692,030 296,238
> > 691,005 299,249
> > 692,871 300,664
> >
> > Creation performance is improved more than 8X with large
> > journal size. The main problem here is we test bitmap
> > and do some check and journal operations which could be
> > slept, then we test and set with lock hold, this could
> > be racy, and make 'inode' steal by other process.
> >
> > However, after first try, we could confirm handle has
> > been started and inode bitmap journaled too, then
> > we could find and set bit with lock hold directly, this
> > will mostly gurateee success with second try.
> >
> > This patch dosen't change logic if it comes to
> > no journal mode, luckily this is not normal
> > use cases i believe.
> >
> > Tested-by: Shuichi Ihara <[email protected]>
> > Signed-off-by: Wang Shilong <[email protected]>
>
> The results look great and the code looks correct however I dislike the
> somewhat complex codeflow with your hold_lock variable. So how about
> cleaning up the code as follows:
>
> Create function like
>
> unsigned long find_inode_bit(struct super_block *sb, ext4_group_t group,
> struct buffer_head *bitmap, unsigned long start_ino)
> {
> unsigned long ino;
>
> next:
> ino = ext4_find_next_zero_bit(...);
> if (ino >= EXT4_INODES_PER_GROUP(sb))
> return 0;
> if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> ...
> return 0;
> }
> if ((EXT4_SB(sb)->s_journal == NULL) &&
> recently_deleted(sb, group, ino)) {
> start_ino = ino + 1;
> if (start_ino < EXT4_INODES_PER_GROUP(sb))
> goto next;
> }
> return ino;
> }
>
> Then you can use this function from __ext4_new_inode() when looking for
> free ino and also in case test_and_set_bit() fails you could just do:
>
> ext4_lock_group(sb, group);
> ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> if (ret2) {
> /* Someone already took the bit. Repeat the search with lock held.*/
> ino = find_inode_bit(sb, group, inode_bitmap_bh, ino);
> if (ino) {
> ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> WARN_ON_ONCE(!ret2);
> }
> }
> ext4_unlock_group(sb, group);
>
> And that's it, no strange bool variables and conditional locking. And as a
> bonus it also works for nojournal mode in the same way.
>
> Honza
>
> > ---
> > v3->v4: codes cleanup and avoid sleep.
> > ---
> > fs/ext4/ialloc.c | 30 +++++++++++++++++++++++++++++-
> > 1 file changed, 29 insertions(+), 1 deletion(-)
> >
> > diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
> > index 507bfb3..23380f39 100644
> > --- a/fs/ext4/ialloc.c
> > +++ b/fs/ext4/ialloc.c
> > @@ -761,6 +761,7 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > ext4_group_t flex_group;
> > struct ext4_group_info *grp;
> > int encrypt = 0;
> > + bool hold_lock;
> >
> > /* Cannot create files in a deleted directory */
> > if (!dir || !dir->i_nlink)
> > @@ -917,17 +918,40 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > continue;
> > }
> >
> > + hold_lock = false;
> > repeat_in_this_group:
> > + /* if @hold_lock is ture, that means, journal
> > + * is properly setup and inode bitmap buffer has
> > + * been journaled already, we can directly hold
> > + * lock and set bit if found, this will mostly
> > + * gurantee forward progress for each thread.
> > + */
> > + if (hold_lock)
> > + ext4_lock_group(sb, group);
> > +
> > ino = ext4_find_next_zero_bit((unsigned long *)
> > inode_bitmap_bh->b_data,
> > EXT4_INODES_PER_GROUP(sb), ino);
> > - if (ino >= EXT4_INODES_PER_GROUP(sb))
> > + if (ino >= EXT4_INODES_PER_GROUP(sb)) {
> > + if (hold_lock)
> > + ext4_unlock_group(sb, group);
> > goto next_group;
> > + }
> > if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> > + if (hold_lock)
> > + ext4_unlock_group(sb, group);
> > ext4_error(sb, "reserved inode found cleared - "
> > "inode=%lu", ino + 1);
> > continue;
> > }
> > +
> > + if (hold_lock) {
> > + ext4_set_bit(ino, inode_bitmap_bh->b_data);
> > + ext4_unlock_group(sb, group);
> > + ino++;
> > + goto got;
> > + }
> > +
> > if ((EXT4_SB(sb)->s_journal == NULL) &&
> > recently_deleted(sb, group, ino)) {
> > ino++;
> > @@ -950,6 +974,10 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > ext4_std_error(sb, err);
> > goto out;
> > }
> > +
> > + if (EXT4_SB(sb)->s_journal)
> > + hold_lock = true;
> > +
> > ext4_lock_group(sb, group);
> > ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> > ext4_unlock_group(sb, group);
> > --
> > 2.9.3
> >
> --
> Jan Kara <[email protected]>
> SUSE Labs, CR


--
Jan Kara <[email protected]>
SUSE Labs, CR

2017-08-17 09:21:56

by Jan Kara

[permalink] [raw]
Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode

On Thu 17-08-17 11:19:59, Jan Kara wrote:
> Hi Shilong!
>
> On Thu 17-08-17 06:23:26, Wang Shilong wrote:
> > thanks for good suggestion, just one question we could not hold lock
> > with nojounal mode, how about something attached one?
> >
> > please let me know if you have better taste for it, much appreciated!
>
> Thanks for quickly updating the patch! Is the only reason why you cannot
> hold the lock in the nojournal mode that sb_getblk() might sleep? The
> attached patch should fix that so that you don't have to special-case the
> nojournal mode anymore.

Forgot to attach the patch - here it is. Feel free to include it in your
series as a preparatory patch.

Honza

> > ________________________________________
> > From: Jan Kara [[email protected]]
> > Sent: Thursday, August 17, 2017 0:42
> > To: Wang Shilong
> > Cc: [email protected]; [email protected]; Wang Shilong; [email protected]; Shuichi Ihara; Li Xi
> > Subject: Re: [PATCH v4] ext4: reduce lock contention in __ext4_new_inode
> >
> > On Tue 08-08-17 13:05:17, Wang Shilong wrote:
> > > From: Wang Shilong <[email protected]>
> > >
> > > While running number of creating file threads concurrently,
> > > we found heavy lock contention on group spinlock:
> > >
> > > FUNC TOTAL_TIME(us) COUNT AVG(us)
> > > ext4_create 1707443399 1440000 1185.72
> > > _raw_spin_lock 1317641501 180899929 7.28
> > > jbd2__journal_start 287821030 1453950 197.96
> > > jbd2_journal_get_write_access 33441470 73077185 0.46
> > > ext4_add_nondir 29435963 1440000 20.44
> > > ext4_add_entry 26015166 1440049 18.07
> > > ext4_dx_add_entry 25729337 1432814 17.96
> > > ext4_mark_inode_dirty 12302433 5774407 2.13
> > >
> > > most of cpu time blames to _raw_spin_lock, here is some testing
> > > numbers with/without patch.
> > >
> > > Test environment:
> > > Server : SuperMicro Sever (2 x E5-2690 [email protected], 128GB 2133MHz
> > > DDR4 Memory, 8GbFC)
> > > Storage : 2 x RAID1 (DDN SFA7700X, 4 x Toshiba PX02SMU020 200GB
> > > Read Intensive SSD)
> > >
> > > format command:
> > > mkfs.ext4 -J size=4096
> > >
> > > test command:
> > > mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> > > -r -i 1 -v -p 10 -u #first run to load inode
> > >
> > > mpirun -np 48 mdtest -n 30000 -d /ext4/mdtest.out -F -C \
> > > -r -i 5 -v -p 10 -u
> > >
> > > Kernel version: 4.13.0-rc3
> > >
> > > Test 1,440,000 files with 48 directories by 48 processes:
> > >
> > > Without patch:
> > >
> > > File Creation File removal
> > > 79,033 289,569 ops/per second
> > > 81,463 285,359
> > > 79,875 288,475
> > > 79,917 284,624
> > > 79,420 290,91
> > >
> > > with patch:
> > > File Creation File removal
> > > 691,528 296,574 ops/per second
> > > 691,946 297,106
> > > 692,030 296,238
> > > 691,005 299,249
> > > 692,871 300,664
> > >
> > > Creation performance is improved more than 8X with large
> > > journal size. The main problem here is we test bitmap
> > > and do some check and journal operations which could be
> > > slept, then we test and set with lock hold, this could
> > > be racy, and make 'inode' steal by other process.
> > >
> > > However, after first try, we could confirm handle has
> > > been started and inode bitmap journaled too, then
> > > we could find and set bit with lock hold directly, this
> > > will mostly gurateee success with second try.
> > >
> > > This patch dosen't change logic if it comes to
> > > no journal mode, luckily this is not normal
> > > use cases i believe.
> > >
> > > Tested-by: Shuichi Ihara <[email protected]>
> > > Signed-off-by: Wang Shilong <[email protected]>
> >
> > The results look great and the code looks correct however I dislike the
> > somewhat complex codeflow with your hold_lock variable. So how about
> > cleaning up the code as follows:
> >
> > Create function like
> >
> > unsigned long find_inode_bit(struct super_block *sb, ext4_group_t group,
> > struct buffer_head *bitmap, unsigned long start_ino)
> > {
> > unsigned long ino;
> >
> > next:
> > ino = ext4_find_next_zero_bit(...);
> > if (ino >= EXT4_INODES_PER_GROUP(sb))
> > return 0;
> > if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> > ...
> > return 0;
> > }
> > if ((EXT4_SB(sb)->s_journal == NULL) &&
> > recently_deleted(sb, group, ino)) {
> > start_ino = ino + 1;
> > if (start_ino < EXT4_INODES_PER_GROUP(sb))
> > goto next;
> > }
> > return ino;
> > }
> >
> > Then you can use this function from __ext4_new_inode() when looking for
> > free ino and also in case test_and_set_bit() fails you could just do:
> >
> > ext4_lock_group(sb, group);
> > ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> > if (ret2) {
> > /* Someone already took the bit. Repeat the search with lock held.*/
> > ino = find_inode_bit(sb, group, inode_bitmap_bh, ino);
> > if (ino) {
> > ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> > WARN_ON_ONCE(!ret2);
> > }
> > }
> > ext4_unlock_group(sb, group);
> >
> > And that's it, no strange bool variables and conditional locking. And as a
> > bonus it also works for nojournal mode in the same way.
> >
> > Honza
> >
> > > ---
> > > v3->v4: codes cleanup and avoid sleep.
> > > ---
> > > fs/ext4/ialloc.c | 30 +++++++++++++++++++++++++++++-
> > > 1 file changed, 29 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
> > > index 507bfb3..23380f39 100644
> > > --- a/fs/ext4/ialloc.c
> > > +++ b/fs/ext4/ialloc.c
> > > @@ -761,6 +761,7 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > > ext4_group_t flex_group;
> > > struct ext4_group_info *grp;
> > > int encrypt = 0;
> > > + bool hold_lock;
> > >
> > > /* Cannot create files in a deleted directory */
> > > if (!dir || !dir->i_nlink)
> > > @@ -917,17 +918,40 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > > continue;
> > > }
> > >
> > > + hold_lock = false;
> > > repeat_in_this_group:
> > > + /* if @hold_lock is ture, that means, journal
> > > + * is properly setup and inode bitmap buffer has
> > > + * been journaled already, we can directly hold
> > > + * lock and set bit if found, this will mostly
> > > + * gurantee forward progress for each thread.
> > > + */
> > > + if (hold_lock)
> > > + ext4_lock_group(sb, group);
> > > +
> > > ino = ext4_find_next_zero_bit((unsigned long *)
> > > inode_bitmap_bh->b_data,
> > > EXT4_INODES_PER_GROUP(sb), ino);
> > > - if (ino >= EXT4_INODES_PER_GROUP(sb))
> > > + if (ino >= EXT4_INODES_PER_GROUP(sb)) {
> > > + if (hold_lock)
> > > + ext4_unlock_group(sb, group);
> > > goto next_group;
> > > + }
> > > if (group == 0 && (ino+1) < EXT4_FIRST_INO(sb)) {
> > > + if (hold_lock)
> > > + ext4_unlock_group(sb, group);
> > > ext4_error(sb, "reserved inode found cleared - "
> > > "inode=%lu", ino + 1);
> > > continue;
> > > }
> > > +
> > > + if (hold_lock) {
> > > + ext4_set_bit(ino, inode_bitmap_bh->b_data);
> > > + ext4_unlock_group(sb, group);
> > > + ino++;
> > > + goto got;
> > > + }
> > > +
> > > if ((EXT4_SB(sb)->s_journal == NULL) &&
> > > recently_deleted(sb, group, ino)) {
> > > ino++;
> > > @@ -950,6 +974,10 @@ struct inode *__ext4_new_inode(handle_t *handle, struct inode *dir,
> > > ext4_std_error(sb, err);
> > > goto out;
> > > }
> > > +
> > > + if (EXT4_SB(sb)->s_journal)
> > > + hold_lock = true;
> > > +
> > > ext4_lock_group(sb, group);
> > > ret2 = ext4_test_and_set_bit(ino, inode_bitmap_bh->b_data);
> > > ext4_unlock_group(sb, group);
> > > --
> > > 2.9.3
> > >
> > --
> > Jan Kara <[email protected]>
> > SUSE Labs, CR
>
>
> --
> Jan Kara <[email protected]>
> SUSE Labs, CR
--
Jan Kara <[email protected]>
SUSE Labs, CR


Attachments:
(No filename) (9.01 kB)
0001-ext4-Do-not-unnecessarily-allocate-buffer-in-recentl.patch (1.13 kB)
Download all attachments

2017-08-17 21:51:50

by Andreas Dilger

[permalink] [raw]
Subject: Y2038 bug in ext4 recently_deleted() function

On Aug 17, 2017, at 3:21 AM, Jan Kara <[email protected]> wrote:
>
> On Thu 17-08-17 11:19:59, Jan Kara wrote:
>> Hi Shilong!
>>
>> On Thu 17-08-17 06:23:26, Wang Shilong wrote:
>>> thanks for good suggestion, just one question we could not hold lock
>>> with nojounal mode, how about something attached one?
>>>
>>> please let me know if you have better taste for it, much appreciated!
>>
>> Thanks for quickly updating the patch! Is the only reason why you cannot
>> hold the lock in the nojournal mode that sb_getblk() might sleep? The
>> attached patch should fix that so that you don't have to special-case the
>> nojournal mode anymore.
>
> Forgot to attach the patch - here it is. Feel free to include it in your
> series as a preparatory patch.

Strange, I never even knew recently_deleted() existed, even though it was
added to the tree 4 years ago yesterday. It looks like this is only used
with the no-journal code, which I don't really interact with.

One thing I did notice when looking at it is that there is a Y2038 bug in
recently_deleted(), as it is comparing 32-bit i_dtime directly with 64-bit
get_seconds(). To fix this, it would be possible to either use a wrapped
32-bit comparison, like time_after() for jiffies, something like:

u32 now, dtime;

/* assume dtime is within the past 30 years, see time_after() */
now = get_seconds();
if (dtime && (dtime - now < 0) && (dtime + recentcy - now < 0))
ret = 1;

or use i_ctime_extra to implicitly extend i_dtime beyond 2038, something like:

/* assume dtime epoch same as ctime, see EXT4_INODE_GET_XTIME() */
dtime = le32_to_cpu(raw_inode->i_dtime);
if (EXT4_INODE_SIZE(sb) > EXT4_GOOD_OLD_INODE_SIZE &&
offsetof(typeof(*raw_inode), i_ctime_extra) + 4 <=
EXT4_GOOD_OLD_INODE_SIZE + le32_to_cpu(raw_inode->i_extra_isize))
dtime += (long)(le32_to_cpu(raw_inode->i_ctime_extra) &
EXT4_EPOCH_MASK) << 32;

Cheers, Andreas






Attachments:
signature.asc (195.00 B)
Message signed with OpenPGP

2017-08-18 01:23:27

by Deepa Dinamani

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

> Strange, I never even knew recently_deleted() existed, even though it was
> added to the tree 4 years ago yesterday. It looks like this is only used
> with the no-journal code, which I don't really interact with.
>
> One thing I did notice when looking at it is that there is a Y2038 bug in
> recently_deleted(), as it is comparing 32-bit i_dtime directly with 64-bit
> get_seconds().

I don't think dtime has widened on the disk layout for ext4 according
to https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout. So I am
not sure how fixing the internal implementation would be useful until
we do that. Is there a plan for that?

As far as get_seconds() is concerned, get_seconds() returns unsigned
long which is 64 bits on a 64 bit arch and 32 bit on a 32 bit arch.
Since dtime variable is declared as unsigned long in this function,
same holds for the size of this variable.

There is no y2038 problem on a 64 bit machine.

So moving to the case of a 32 bit machine:

get_seconds() can return values until year 2106. And, recentcy at max
can only be 35. Analyzing the current line:

if (dtime && (dtime < now) && (now < dtime + recentcy))

The above equation should work fine at least until 35 seconds before
y2038 deadline.

-Deepa

2017-08-18 09:31:27

by Arnd Bergmann

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Fri, Aug 18, 2017 at 3:23 AM, Deepa Dinamani <[email protected]> wrote:
>> Strange, I never even knew recently_deleted() existed, even though it was
>> added to the tree 4 years ago yesterday. It looks like this is only used
>> with the no-journal code, which I don't really interact with.
>>
>> One thing I did notice when looking at it is that there is a Y2038 bug in
>> recently_deleted(), as it is comparing 32-bit i_dtime directly with 64-bit
>> get_seconds().
>
> I don't think dtime has widened on the disk layout for ext4 according
> to https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout. So I am
> not sure how fixing the internal implementation would be useful until
> we do that. Is there a plan for that?
>
> As far as get_seconds() is concerned, get_seconds() returns unsigned
> long which is 64 bits on a 64 bit arch and 32 bit on a 32 bit arch.
> Since dtime variable is declared as unsigned long in this function,
> same holds for the size of this variable.
>
> There is no y2038 problem on a 64 bit machine.

I think what Andreas was saying is that it's actually the opposite:
on a 32-bit machine, the code will work correctly for 32-bit unsigned
long values as long as 'dtime' and 'now' are in the same epoch,
e.g. both are before 2106 or both are after.

On 64-bit systems it's always wrong after 2106.

> So moving to the case of a 32 bit machine:
>
> get_seconds() can return values until year 2106. And, recentcy at max
> can only be 35. Analyzing the current line:
>
> if (dtime && (dtime < now) && (now < dtime + recentcy))
>
> The above equation should work fine at least until 35 seconds before
> y2038 deadline.

Since it's all unsigned arithmetic, it should be fine until 2106.
However, we should get rid of get_seconds() long before then
and use ktime_get_real_seconds() instead, as most other users
of get_seconds() are (more) broken.

Looking at the two suggested approaches:

>> u32 now, dtime;
>>
>> /* assume dtime is within the past 30 years, see time_after() */
>> now = get_seconds();
>> if (dtime && (dtime - now < 0) && (dtime + recentcy - now < 0))
>> ret = 1;

* As 'dtime' and 'now' are both unsigned, subtracting them will also result
in an unsigned value that is never less than zero, so it won't work.
Adding a cast to 's32' would fix that the same way that time_after() does.

* please use ktime_get_real_seconds() instead of get_seconds(), so we
don't have to replace it later.

* The comment should say '68 years', not 30.

> or use i_ctime_extra to implicitly extend i_dtime beyond 2038, something like:
>
> /* assume dtime epoch same as ctime, see EXT4_INODE_GET_XTIME() */
> dtime = le32_to_cpu(raw_inode->i_dtime);
> if (EXT4_INODE_SIZE(sb) > EXT4_GOOD_OLD_INODE_SIZE &&
> offsetof(typeof(*raw_inode), i_ctime_extra) + 4 <=
> EXT4_GOOD_OLD_INODE_SIZE + le32_to_cpu(raw_inode->i_extra_isize))
> dtime += (long)(le32_to_cpu(raw_inode->i_ctime_extra) &
> EXT4_EPOCH_MASK) << 32;

* This is slightly incorrect when we are close to the epoch boundary, as i_ctime
and i_dtime might end up being in different epochs. I would not go there.

* If we were to pick this approach, a cast to 'long' is obviously wrong on
32-bit systems, better use 'u64' or 'time64_t'.

Arnd

2017-08-18 13:41:35

by Theodore Ts'o

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Thu, Aug 17, 2017 at 06:23:26PM -0700, Deepa Dinamani wrote:
>
> I don't think dtime has widened on the disk layout for ext4 according
> to https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout. So I am
> not sure how fixing the internal implementation would be useful until
> we do that. Is there a plan for that?

The dtime field is not visible to user; it's mostly for debugging
purposes. For debugfs we just are just using i_ctime_extra to compose
the time. (Perhaps we should be using i_mtime_extra, or the max of
the ctime, mtime, and atime extra fields; but it's not really that
important.)

The issue which Andreas pointed out is the only place where we
actually use the dtime field, and that's so we can avoid re-using a
freshly deleted inode until at least N seconds have gone by in
no-journal node. That's because if we don't, there are some
unfortunate effects that can take place if we crash and not all of the
metadata gets updated. Even after running e2fsck -fy, we can end up
having a directory or an immutable file show up where ntp or timed
expects to find a time adjustment file, or some such, that can cause
various system daemons to crash and burn because they aren't expecting
find a file at a particular pathname they own which they can't delete.

There are a number ways we could solve it; one is to just use a new
in-memory variable which can be 64-bits wide. This burns an extra 8
bytes for each inode in the inode cache, which is why we didn't do
that.

It doesn't really have to be super exact; if we actually have an inode
that avoids getting reused for 136 years (2**32 seconds), it will have
disappeared from the in-memory inode cache. We just need something
which is valid for N seconds after the deletion time. (I think we may
have upped N to a larger value on our data center kernels --- 300
seconds if I recall correctly --- because there were some edge cases
where 35 seconds wasn't enough.)

- Ted

2017-08-18 15:38:02

by Deepa Dinamani

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Fri, Aug 18, 2017 at 2:31 AM, Arnd Bergmann <[email protected]> wrote:
> On Fri, Aug 18, 2017 at 3:23 AM, Deepa Dinamani <[email protected]> wrote:
>>> Strange, I never even knew recently_deleted() existed, even though it was
>>> added to the tree 4 years ago yesterday. It looks like this is only used
>>> with the no-journal code, which I don't really interact with.
>>>
>>> One thing I did notice when looking at it is that there is a Y2038 bug in
>>> recently_deleted(), as it is comparing 32-bit i_dtime directly with 64-bit
>>> get_seconds().
>>
>> I don't think dtime has widened on the disk layout for ext4 according
>> to https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout. So I am
>> not sure how fixing the internal implementation would be useful until
>> we do that. Is there a plan for that?
>>
>> As far as get_seconds() is concerned, get_seconds() returns unsigned
>> long which is 64 bits on a 64 bit arch and 32 bit on a 32 bit arch.
>> Since dtime variable is declared as unsigned long in this function,
>> same holds for the size of this variable.
>>
>> There is no y2038 problem on a 64 bit machine.
>
> I think what Andreas was saying is that it's actually the opposite:
> on a 32-bit machine, the code will work correctly for 32-bit unsigned
> long values as long as 'dtime' and 'now' are in the same epoch,
> e.g. both are before 2106 or both are after.
> On 64-bit systems it's always wrong after 2106.

There is some confusion here.
I was only referring to the current implementation:

static int recently_deleted(struct super_block *sb, ext4_group_t group, int ino)
{
.
.
.
unsigned long dtime, now;
int offset, ret = 0, recentcy = RECENTCY_MIN;
.
.
.
offset = (ino % inodes_per_block) * EXT4_INODE_SIZE(sb);
raw_inode = (struct ext4_inode *) (bh->b_data + offset);
dtime = le32_to_cpu(raw_inode->i_dtime);
now = get_seconds();
if (buffer_dirty(bh))
recentcy += RECENTCY_DIRTY;

if (dtime && (dtime < now) && (now < dtime + recentcy))
ret = 1;
.
.
.
}

In the above implementation, I do not see any problem on a 64 bit machine.
The only problem is that dtime on disk representation is signed 32 bits only.
If that were not a problem then this would be fine from time prespective.

On 32 bit machine, dtime on disk representation again prevents it from
being able to represent times beyond 2038 unless one of the approaches
Ted mentioned is used to extend/ interpret it.

>> So moving to the case of a 32 bit machine:
>>
>> get_seconds() can return values until year 2106. And, recentcy at max
>> can only be 35. Analyzing the current line:
>>
>> if (dtime && (dtime < now) && (now < dtime + recentcy))
>>
>> The above equation should work fine at least until 35 seconds before
>> y2038 deadline.
>
> Since it's all unsigned arithmetic, it should be fine until 2106.
> However, we should get rid of get_seconds() long before then
> and use ktime_get_real_seconds() instead, as most other users
> of get_seconds() are (more) broken.

Dtime on disk representation again breaks this for certain values in
2038 even though everything is unsigned.

I was just saying that whatever we do here depends on how dtime on
disk is interpreted.

Agree that ktime_get_real_seconds() should be used here. But, the way
we handle new values would rely on this new interpretation of dtime.
Also, using time64_t variables on stack only matters after this. Once
the types are corrected, maybe the comparison expression need not
change at all(after new dtime interpretation is in place).

Let me know if I am missing something here.

-Deepa

2017-08-18 16:09:29

by Andreas Dilger

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function


> On Aug 18, 2017, at 9:38 AM, Deepa Dinamani <[email protected]> wrote:
>
> On Fri, Aug 18, 2017 at 2:31 AM, Arnd Bergmann <[email protected]> wrote:
>> On Fri, Aug 18, 2017 at 3:23 AM, Deepa Dinamani <[email protected]> wrote:
>>>
>>>> One thing I did notice when looking at it is that there is a Y2038 bug in
>>>> recently_deleted(), as it is comparing 32-bit i_dtime directly with 64-bit
>>>> get_seconds().
>>>
>>> I don't think dtime has widened on the disk layout for ext4 according
>>> to https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout. So I am
>>> not sure how fixing the internal implementation would be useful until
>>> we do that. Is there a plan for that?
>>>
>>> As far as get_seconds() is concerned, get_seconds() returns unsigned
>>> long which is 64 bits on a 64 bit arch and 32 bit on a 32 bit arch.
>>> Since dtime variable is declared as unsigned long in this function,
>>> same holds for the size of this variable.
>>>
>>> There is no y2038 problem on a 64 bit machine.
>>
>> I think what Andreas was saying is that it's actually the opposite:
>> on a 32-bit machine, the code will work correctly for 32-bit unsigned
>> long values as long as 'dtime' and 'now' are in the same epoch,
>> e.g. both are before 2106 or both are after.
>> On 64-bit systems it's always wrong after 2106.
>
> There is some confusion here.
> I was only referring to the current implementation:
>
> static int recently_deleted(struct super_block *sb, ext4_group_t group, int ino)
> {
> .
> .
> .
> unsigned long dtime, now;
> int offset, ret = 0, recentcy = RECENTCY_MIN;
> .
> .
> .
> offset = (ino % inodes_per_block) * EXT4_INODE_SIZE(sb);
> raw_inode = (struct ext4_inode *) (bh->b_data + offset);
> dtime = le32_to_cpu(raw_inode->i_dtime);
> now = get_seconds();
> if (buffer_dirty(bh))
> recentcy += RECENTCY_DIRTY;
>
> if (dtime && (dtime < now) && (now < dtime + recentcy))
> ret = 1;
> .
> .
> .
> }
>
> In the above implementation, I do not see any problem on a 64 bit machine.
> The only problem is that dtime on disk representation is signed 32 bits only.
> If that were not a problem then this would be fine from time prespective.

The 32-bit dtime is the root of the problem. There is no plan to extend
the dtime field on disk, because it is used so little (mostly as a boolean
value, and for forensics).

>>> So moving to the case of a 32 bit machine:
>>>
>>> get_seconds() can return values until year 2106. And, recentcy at max
>>> can only be 35. Analyzing the current line:
>>>
>>> if (dtime && (dtime < now) && (now < dtime + recentcy))
>>>
>>> The above equation should work fine at least until 35 seconds before
>>> y2038 deadline.
>>
>> Since it's all unsigned arithmetic, it should be fine until 2106.
>> However, we should get rid of get_seconds() long before then
>> and use ktime_get_real_seconds() instead, as most other users
>> of get_seconds() are (more) broken.
>
> Dtime on disk representation again breaks this for certain values in
> 2038 even though everything is unsigned.
>
> I was just saying that whatever we do here depends on how dtime on
> disk is interpreted.
>
> Agree that ktime_get_real_seconds() should be used here. But, the way
> we handle new values would rely on this new interpretation of dtime.
> Also, using time64_t variables on stack only matters after this. Once
> the types are corrected, maybe the comparison expression need not
> change at all (after new dtime interpretation is in place).

There will not be a new dtime format on disk, but since the calculation
here only depends on relative times (within a few minutes), then it would
be fine to use only 32-bit timestamps, and truncate off the high bits
from get_seconds()/ktime_get_real_seconds().

Cheers, Andreas






Attachments:
signature.asc (195.00 B)
Message signed with OpenPGP

2017-08-22 15:18:15

by Arnd Bergmann

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Fri, Aug 18, 2017 at 6:09 PM, Andreas Dilger <[email protected]> wrote:
>
>>>> So moving to the case of a 32 bit machine:
>>>>
>>>> get_seconds() can return values until year 2106. And, recentcy at max
>>>> can only be 35. Analyzing the current line:
>>>>
>>>> if (dtime && (dtime < now) && (now < dtime + recentcy))
>>>>
>>>> The above equation should work fine at least until 35 seconds before
>>>> y2038 deadline.
>>>
>>> Since it's all unsigned arithmetic, it should be fine until 2106.
>>> However, we should get rid of get_seconds() long before then
>>> and use ktime_get_real_seconds() instead, as most other users
>>> of get_seconds() are (more) broken.
>>
>> Dtime on disk representation again breaks this for certain values in
>> 2038 even though everything is unsigned.
>>
>> I was just saying that whatever we do here depends on how dtime on
>> disk is interpreted.
>>
>> Agree that ktime_get_real_seconds() should be used here. But, the way
>> we handle new values would rely on this new interpretation of dtime.
>> Also, using time64_t variables on stack only matters after this. Once
>> the types are corrected, maybe the comparison expression need not
>> change at all (after new dtime interpretation is in place).
>
> There will not be a new dtime format on disk, but since the calculation
> here only depends on relative times (within a few minutes), then it would
> be fine to use only 32-bit timestamps, and truncate off the high bits
> from get_seconds()/ktime_get_real_seconds().

Agreed.

Are you planning to apply your fix for it then? I think your first
suggestion is all we need, aside from the three minor comments
I had.

Arnd

2017-08-22 16:20:19

by Andreas Dilger

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Aug 22, 2017, at 9:18 AM, Arnd Bergmann <[email protected]> wrote:
>
> On Fri, Aug 18, 2017 at 6:09 PM, Andreas Dilger <[email protected]> wrote:
>>
>>>>> So moving to the case of a 32 bit machine:
>>>>>
>>>>> get_seconds() can return values until year 2106. And, recentcy at max
>>>>> can only be 35. Analyzing the current line:
>>>>>
>>>>> if (dtime && (dtime < now) && (now < dtime + recentcy))
>>>>>
>>>>> The above equation should work fine at least until 35 seconds before
>>>>> y2038 deadline.
>>>>
>>>> Since it's all unsigned arithmetic, it should be fine until 2106.
>>>> However, we should get rid of get_seconds() long before then
>>>> and use ktime_get_real_seconds() instead, as most other users
>>>> of get_seconds() are (more) broken.
>>>
>>> Dtime on disk representation again breaks this for certain values in
>>> 2038 even though everything is unsigned.
>>>
>>> I was just saying that whatever we do here depends on how dtime on
>>> disk is interpreted.
>>>
>>> Agree that ktime_get_real_seconds() should be used here. But, the way
>>> we handle new values would rely on this new interpretation of dtime.
>>> Also, using time64_t variables on stack only matters after this. Once
>>> the types are corrected, maybe the comparison expression need not
>>> change at all (after new dtime interpretation is in place).
>>
>> There will not be a new dtime format on disk, but since the calculation
>> here only depends on relative times (within a few minutes), then it would
>> be fine to use only 32-bit timestamps, and truncate off the high bits
>> from get_seconds()/ktime_get_real_seconds().
>
> Agreed.
>
> Are you planning to apply your fix for it then? I think your first
> suggestion is all we need, aside from the three minor comments
> I had.

Do you think it is worthwhile to introduce a "time_after32()" helper for this?
I suspect that this will also be useful for other parts of the kernel that
deal with relative 32-bit timestamps.


Cheers, Andreas






Attachments:
signature.asc (195.00 B)
Message signed with OpenPGP

2017-08-22 19:35:47

by Arnd Bergmann

[permalink] [raw]
Subject: Re: Y2038 bug in ext4 recently_deleted() function

On Tue, Aug 22, 2017 at 6:20 PM, Andreas Dilger <[email protected]> wrote:
> On Aug 22, 2017, at 9:18 AM, Arnd Bergmann <[email protected]> wrote:
>>
>> On Fri, Aug 18, 2017 at 6:09 PM, Andreas Dilger <[email protected]> wrote:
>>>
>>>>>> So moving to the case of a 32 bit machine:
>>>>>>
>>>>>> get_seconds() can return values until year 2106. And, recentcy at max
>>>>>> can only be 35. Analyzing the current line:
>>>>>>
>>>>>> if (dtime && (dtime < now) && (now < dtime + recentcy))
>>>>>>
>>>>>> The above equation should work fine at least until 35 seconds before
>>>>>> y2038 deadline.
>>>>>
>>>>> Since it's all unsigned arithmetic, it should be fine until 2106.
>>>>> However, we should get rid of get_seconds() long before then
>>>>> and use ktime_get_real_seconds() instead, as most other users
>>>>> of get_seconds() are (more) broken.
>>>>
>>>> Dtime on disk representation again breaks this for certain values in
>>>> 2038 even though everything is unsigned.
>>>>
>>>> I was just saying that whatever we do here depends on how dtime on
>>>> disk is interpreted.
>>>>
>>>> Agree that ktime_get_real_seconds() should be used here. But, the way
>>>> we handle new values would rely on this new interpretation of dtime.
>>>> Also, using time64_t variables on stack only matters after this. Once
>>>> the types are corrected, maybe the comparison expression need not
>>>> change at all (after new dtime interpretation is in place).
>>>
>>> There will not be a new dtime format on disk, but since the calculation
>>> here only depends on relative times (within a few minutes), then it would
>>> be fine to use only 32-bit timestamps, and truncate off the high bits
>>> from get_seconds()/ktime_get_real_seconds().
>>
>> Agreed.
>>
>> Are you planning to apply your fix for it then? I think your first
>> suggestion is all we need, aside from the three minor comments
>> I had.
>
> Do you think it is worthwhile to introduce a "time_after32()" helper for this?
> I suspect that this will also be useful for other parts of the kernel that
> deal with relative 32-bit timestamps.

I can't think of any other one at the moment. The RTC code may need a
similar check somewhere but it's more likely that they want something
slightly different.

No objections to introducing a time_after32() from my side if only
for documentation purposes, but we probably won't use it elsewhere.

Arnd