Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp8369376ybc; Fri, 29 Nov 2019 09:24:40 -0800 (PST) X-Google-Smtp-Source: APXvYqwHLap8to3DjG9SKX+SxMKOgE+edCcdFevT75/pSr3Aq6G7wcmcftIN9J4vZ6B2635nlN0C X-Received: by 2002:a17:906:5ac2:: with SMTP id x2mr19809639ejs.29.1575048280600; Fri, 29 Nov 2019 09:24:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575048280; cv=none; d=google.com; s=arc-20160816; b=UCcVdbjCN4z1D5bLAsfrWQImEwLJo984Rw6dsRYrLWfzBievfz7QrIciqWOm650sl8 GMXZv8J1wV265DekUcg+Zz+j7lC3enaYus+vw/YTqgciulnAAK1AzofHeOfF/9/lNAT/ YBHd1QI0vd6g0dQGMT/KvFPwAg5M4udvOp0ajfEqy85ZrAH0+q5AWRxSVDRbMxhkCNTj BDsnBIc19dIJGs/R7qbUm6mAASzJz1KqBnoLQB55Xr11eBG1NALpe/YXGmmdT2UBad+d hKqaTFQKUm0ZgAoM9Xp2LeLK/gn97ElKNYKnRy5IqY53mVatCTlzWiHbqfZNTGglQilE w2TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=XFSropVKY1xVP/f98GtlbDhRpKn2fAtUkeatt87uDM0=; b=CBZyBBAvZ+gd0k5pWSF3Ojl7TC9xmC4i7fDzkcb+7j+DPHbyAqpMghurxy3zaNkVql xabi7H80oKKW5lZCHT8OCVuH3IgExU87N3SGewygtgLoanugBnt0yMmhpjNzv0hvb3/d P3HdDs5hkiI4lh5GLbaVzVtlz5o/trw6QX2kBm/ZLYG+53pOska5IPUOtYo/m/OQMfbc V6J/gZnc9suwVtt9SHyp2AyB4+lyh0SfxQ92+HiMaBu1MgatGBNgsIWwzcA2A4Vpud+d oGekgtaBPWVhr00uMLVxeMhXt+3ZP3uD+VZ8nTno4eHnk4TgjZPtsOpLVY0WtTyvtiNX 5hdQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id qw23si14366975ejb.1.2019.11.29.09.24.15; Fri, 29 Nov 2019 09:24:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726943AbfK2RYA (ORCPT + 99 others); Fri, 29 Nov 2019 12:24:00 -0500 Received: from mx2.suse.de ([195.135.220.15]:57970 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726909AbfK2RYA (ORCPT ); Fri, 29 Nov 2019 12:24:00 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C52F3AE79; Fri, 29 Nov 2019 17:23:57 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 781521E0B7B; Fri, 29 Nov 2019 18:23:57 +0100 (CET) Date: Fri, 29 Nov 2019 18:23:57 +0100 From: Jan Kara To: Ritesh Harjani Cc: Jan Kara , tytso@mit.edu, linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, mbobrowski@mbobrowski.org Subject: Re: [RFCv3 4/4] ext4: Move to shared iolock even without dioread_nolock mount opt Message-ID: <20191129172357.GC27588@quack2.suse.cz> References: <20191120050024.11161-1-riteshh@linux.ibm.com> <20191120050024.11161-5-riteshh@linux.ibm.com> <20191120143257.GE9509@quack2.suse.cz> <20191126105122.75EC6A4060@b06wcsmtp001.portsmouth.uk.ibm.com> <20191126124526.DC55CA405F@b06wcsmtp001.portsmouth.uk.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191126124526.DC55CA405F@b06wcsmtp001.portsmouth.uk.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue 26-11-19 18:15:25, Ritesh Harjani wrote: > On 11/26/19 4:21 PM, Ritesh Harjani wrote: > > On 11/20/19 8:02 PM, Jan Kara wrote: > > > On Wed 20-11-19 10:30:24, Ritesh Harjani wrote: > > > > We were using shared locking only in case of dioread_nolock > > > > mount option in case of DIO overwrites. This mount condition > > > > is not needed anymore with current code, since:- > > > > > > > > 1. No race between buffered writes & DIO overwrites. > > > > Since buffIO writes takes exclusive locks & DIO overwrites > > > > will take share locking. Also DIO path will make sure > > > > to flush and wait for any dirty page cache data. > > > > > > > > 2. No race between buffered reads & DIO overwrites, since there > > > > is no block allocation that is possible with DIO overwrites. > > > > So no stale data exposure should happen. Same is the case > > > > between DIO reads & DIO overwrites. > > > > > > > > 3. Also other paths like truncate is protected, > > > > since we wait there for any DIO in flight to be over. > > > > > > > > 4. In case of buffIO writes followed by DIO reads: > > > > Since here also we take exclusive locks in ext4_write_begin/end(). > > > > There is no risk of exposing any stale data in this case. > > > > Since after ext4_write_end, iomap_dio_rw() will wait to flush & > > > > wait for any dirty page cache data. > > > > > > > > Signed-off-by: Ritesh Harjani > > > > > > There's one more case to consider here as I mentioned in [1]. There > > > can be > > > > Yes, I should have mentioned about this in cover letter and about my > > thoughts on that. > > I was of the opinion that since the race is already existing > > and it may not be caused due to this patch, so we should handle that in > > incremental fashion and as a separate patch series after this one. > > Let me know your thoughts on above. > > > > Also, I wanted to have some more discussions on this race before > > making the changes. > > But nevertheless, it's the right time to discuss those changes here. > > > > > mmap write instantiating dirty page and then someone starting writeback > > > against that page while DIO read is running still theoretically > > > leading to > > > stale data exposure. Now this patch does not have influence on that race > > > but: > > > > Yes, agreed. > > > > > > > > 1) We need to close the race mentioned above. Maybe we could do that by > > > proactively allocating unwritten blocks for a page being faulted > > > when there > > > is direct IO running against the file - the one who fills holes through > > > mmap write while direct IO is running on the file deserves to suffer the > > > performance penalty... > > > > I was giving this a thought. So even if we try to penalize mmap > > write as you mentioned above, what I am not sure about it, is that, how > > can we reliably detect that the DIO is in progress? > > > > Say even if we try to check for atomic_read(&inode->i_dio_count) in mmap > > ext4_page_mkwrite path, it cannot be reliable unless there is some sort > > of a lock protection, no? > > Because after the check the DIO can still snoop in, right? > > IIRC, we had some discussion around this at [1] last time. > IIUC, you were mentioning to always using unwritten extents > as ->get_block in ext4_page_mkwrite. > And in ext4_writepages(), we replace 'ext4_should_dioread_nolock()' check > with 'is there any DIO in flight'. Yes. > It was discussed to do that check reliably we should have all pages > locked for writeback. But how does that ensure that DIO is not currently in > flight? One such case could be:- > It may still happen that the check to filemap_write_and_wait_range() > from DIO (iomap_dio_rw) got completed and before calling inode_dio_begin() a > context switch happens. > And in parallel we got the page fault which somehow also resulted into > writeback of pages calling ext4_writepages(). Here when we checked for > 'is DIO in progress' after making sure all the writeback pages are locked, > we still say may miss the reliable check if the context switch back to the > DIO process happens right. Am I missing anything? > > 1. Is there any lock guarantee which I am overlooking here? > > 2. Do you think we should use some other lock to provide the guarantee > between page_mkwrite & DIO read? See my previous reply. > 3. What if we always go via unwritten blocks in ext4_writepages too? > hmm, but I am not sure if should really do this today as there are some > known xfstests failures for blocksize < pagesize with dioread_nolock path > right. > Although those problems I have mostly observed with 1K blocksize & 4K > pagesize on x86 platform. Well, the problems with dioread_nolock writeback need to be fixed. That's for sure but orthogonal to this discussion. The reason why we don't want to always use unwritten extents for writeback in ext4_writepages() is because it is slower (we have to convert unwritten extents to written ones after IO completion and that does add up, although it may be worthwhile to get fresh performance numbers). Honza -- Jan Kara SUSE Labs, CR