Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp605756ybg; Wed, 23 Oct 2019 03:05:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqx6znEPdT0Yd22dgHLbGcJbGZ6ZADEUa4yoFxQNTczBgHQ0+VWDxBdzpIwtefBzWEdGyanb X-Received: by 2002:a17:907:2139:: with SMTP id qo25mr7124676ejb.207.1571825140574; Wed, 23 Oct 2019 03:05:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571825140; cv=none; d=google.com; s=arc-20160816; b=L/kw54QHv6RIu82c5Gloa4EacvhpLfMvjEe/ZGRE3bFHw9yh+SZtKKgZZhUwx/Lrlw L+QNlL77v8ObsazhEZLawN2sQzaCCFaAsTaAsPuJRCbtlzRiwc56wPORr6/ZGM8WKd0t 1LkI/m0TlTxQk3hdZJcvq78KlNVV3YhO9eTloSo+DgOTkC/6WekQeQ+27w+aQnO0ODrt SsZZVGIrIjzR/5dGsWf+xin9uCHlw4dpWW3bZkaqbCnSucXjmpSPkNGhoX46pLj0yoto 5lPJCic0knM+YQVPfTePI5SJdR2lib54WNAETSPxjqeaBzn9gjNyUTIyIEiizlBlqHwZ 3gBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ag0M6i1LMbYqswjFFF6i27/KG6hlk7R4LMvBXwBCOC8=; b=pgz9pRua14H5XeeG+KsSr1YfB1TaWynoV780lqyqWksOWrSgZYV1SJB27YhO8fmc7q i4uAS2vpGNe/c+xAi/AuLMY/5cs7WFV6TuWxBbPmb8CCLy8oM5bYefFi+imIivufGeYT KtHymDLjs0KXZcw1g93F6pgXxr5E1Ccq4dsV/fw5yPsVMxe+9Ti0zxkPgG7vuMw8k3im Fh6wKkpnnneGHxJ/6tqa1632poD4wzsZcOevX50bIcn+wcydmyuGXkRDMB9S/vL9vcAX ZU9ejSvByodTgfzJWD2Sfo8l2HZhf0KvVcDg+u23G0l9vLqoodBmJbOohJRCHmNxUaLe SkCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s52si9118203edd.65.2019.10.23.03.05.03; Wed, 23 Oct 2019 03:05:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404043AbfJWKB4 (ORCPT + 99 others); Wed, 23 Oct 2019 06:01:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:48046 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2390361AbfJWKB4 (ORCPT ); Wed, 23 Oct 2019 06:01:56 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id F32D2AF19; Wed, 23 Oct 2019 10:01:53 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 705B41E4A89; Wed, 23 Oct 2019 12:01:53 +0200 (CEST) Date: Wed, 23 Oct 2019 12:01:53 +0200 From: Jan Kara To: Matthew Bobrowski Cc: Jan Kara , "Theodore Y. Ts'o" , adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, hch@infradead.org, david@fromorbit.com, darrick.wong@oracle.com Subject: Re: [PATCH v5 00/12] ext4: port direct I/O to iomap infrastructure Message-ID: <20191023100153.GB22307@quack2.suse.cz> References: <20191021133111.GA4675@mit.edu> <20191021194330.GJ25184@quack2.suse.cz> <20191023023519.GA16505@bobrowski> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191023023519.GA16505@bobrowski> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed 23-10-19 13:35:19, Matthew Bobrowski wrote: > On Mon, Oct 21, 2019 at 09:43:30PM +0200, Jan Kara wrote: > > On Mon 21-10-19 09:31:12, Theodore Y. Ts'o wrote: > > > Hi Matthew, thanks for your work on this patch series! > > > > > > I applied it against 4c3, and ran a quick test run on it, and found > > > the following locking problem. To reproduce: > > > > > > kvm-xfstests -c nojournal generic/113 > > > > > > generic/113 [09:27:19][ 5.841937] run fstests generic/113 at 2019-10-21 09:27:19 > > > [ 7.959477] > > > [ 7.959798] ============================================ > > > [ 7.960518] WARNING: possible recursive locking detected > > > [ 7.961225] 5.4.0-rc3-xfstests-00012-g7fe6ea084e48 #1238 Not tainted > > > [ 7.961991] -------------------------------------------- > > > [ 7.962569] aio-stress/1516 is trying to acquire lock: > > > [ 7.963129] ffff9fd4791148c8 (&sb->s_type->i_mutex_key#12){++++}, at: __generic_file_fsync+0x3e/0xb0 > > > [ 7.964109] > > > [ 7.964109] but task is already holding lock: > > > [ 7.964740] ffff9fd4791148c8 (&sb->s_type->i_mutex_key#12){++++}, at: ext4_dio_write_iter+0x15b/0x430 > > > > This is going to be a tricky one. With iomap, the inode locking is handled > > by the filesystem while calling generic_write_sync() is done by > > iomap_dio_rw(). I would really prefer to avoid tweaking iomap_dio_rw() not > > to call generic_write_sync(). So we need to remove inode_lock from > > __generic_file_fsync() (used from ext4_sync_file()). This locking is mostly > > for legacy purposes and we don't need this in ext4 AFAICT - but removing > > the lock from __generic_file_fsync() would mean auditing all legacy > > filesystems that use this to make sure flushing inode & its metadata buffer > > list while it is possibly changing cannot result in something unexpected. I > > don't want to clutter this series with it so we are left with > > reimplementing __generic_file_fsync() inside ext4 without inode_lock. Not > > too bad but not great either. Thoughts? > > So, I just looked at this on my lunch break and I think the simplest > approach would be to just transfer the necessary chunks of code from > within __generic_file_fsync() into ext4_sync_file() for !journal cases, > minus the inode lock, and minus calling into __generic_file_fsync(). I > don't forsee this causing any issues, but feel free to correct me if I'm > wrong. Yes, that's what I'd suggest as well. In fact when doing that you can share file_write_and_wait_range() call with the one already in ext4_sync_file() use for other cases. Similarly with file_check_and_advance_wb_err(). So the copied bit will be really only: ret = sync_mapping_buffers(inode->i_mapping); if (!(inode->i_state & I_DIRTY_ALL)) goto out; if (datasync && !(inode->i_state & I_DIRTY_DATASYNC)) goto out; err = sync_inode_metadata(inode, 1); if (ret == 0) ret = err; > If this is deemed to be OK, then I will go ahead and include this as a > separate patch in my series. Yes, please. Honza -- Jan Kara SUSE Labs, CR