Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp284709pxa; Wed, 5 Aug 2020 00:41:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/s2rfjjlq/hxTD5xLV1CN7k7hm1oaKD61KgNwO5Ti/GZm0uvAWuugUmojL3yHo97r6usr X-Received: by 2002:a17:906:413:: with SMTP id d19mr2018311eja.523.1596613293606; Wed, 05 Aug 2020 00:41:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596613293; cv=none; d=google.com; s=arc-20160816; b=zOy1NvPySjsgel6KqJwEY2PNojgAGncRPxYJlUWx1LCLDo/GeKq1CjB+Otd0LjHwJO rBddy4YpHUCRcrIBPebYSmZ6Xti6EovgmWHLDPWFzOcBhnLVm8wXFXPfzVHNKvXSfPTV psWXVDiUH4IKlreN62+IydbnVf7n3EB86gLYcmztRlfWvZa+81+d6n4It2Yi99whCIAC rSE23BOEvlR0K49If357XNbE/VqSUIoUh0o2R2YTlNCWPaTe0b4FTTSOaOKALL6LuI1/ LvtE2HLhgjQOt/MYdfMObUkrDxMs8scwyMoVc5PTGpr3G3kRuzht5Pbtqat2m673zNdj sEaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=DOCU5HntHDoMHJxp9HqyRoF18SUiP/lo+VubNRBp8Xc=; b=XVdPXsMaUeJQMHTPC8GpO5qW9Vpqxpcx8ywTlgEBVnA63LD6v0a+SWsPhcQwxEjMlF b72vTpsQqCgwtixZEXosubaWpDbHmbj8FpBLTIDmEtNYqC5j2l5ttmIQSwXhDKE6nlMe sVztcs7H9PoRRiKxNUJcWNVRdPqo590YJBQc4r4WFuWWNK07mYp13n4R55/WgZw7h0QM c2/j+Xtf+9UlS+jyQ+WKjzxaLEwY/5b+ZhpS2vervZv/Vx9G6kHjpm/1EtA/I+gaqmd0 Rns5g+/+wCa84EbqJccBuhizf0Adj0tqYBwiOpUMWEACPtjVlcJDfQ9560uT/D5xR/Eg OfdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@126.com header.s=s110527 header.b=elrI9Uxb; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=126.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c13si737464edt.310.2020.08.05.00.41.10; Wed, 05 Aug 2020 00:41:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@126.com header.s=s110527 header.b=elrI9Uxb; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=126.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726104AbgHEHlH (ORCPT + 99 others); Wed, 5 Aug 2020 03:41:07 -0400 Received: from mail-m963.mail.126.com ([123.126.96.3]:53114 "EHLO mail-m963.mail.126.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726066AbgHEHlH (ORCPT ); Wed, 5 Aug 2020 03:41:07 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=126.com; s=s110527; h=From:Subject:Date:Message-Id; bh=DOCU5HntHDoMHJxp9H qyRoF18SUiP/lo+VubNRBp8Xc=; b=elrI9UxbmjQNB0rK6F6YWTE2lDa8tE8zbR sqWJYIS/zvwuPzHfShuAD2FQA4nDraE31PXz17ER2dAE0PU7hUwxxOxqilroJczV ZtkloXhThdUE0BKDmC3kl7x99Ztd5nMyANryddNpyJVNF0lzKN1+WMDpx2j10Rq1 8up9jsWhw= Received: from xr-hulk-k8s-node1933.gh.sankuai.com (unknown [101.236.11.3]) by smtp8 (Coremail) with SMTP id NORpCgAXPFdyYipfzVkEBw--.113S2; Wed, 05 Aug 2020 15:40:40 +0800 (CST) From: Jiang Ying To: tytso@mit.edu, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: wanglong19@meituan.com, heguanjun@meituan.com, jack@suse.cz Subject: [PATCH v4] ext4: fix direct I/O read error Date: Wed, 5 Aug 2020 15:40:34 +0800 Message-Id: <1596613234-174664-1-git-send-email-jiangying8582@126.com> X-Mailer: git-send-email 1.8.3.1 X-CM-TRANSID: NORpCgAXPFdyYipfzVkEBw--.113S2 X-Coremail-Antispam: 1Uf129KBjvJXoWxAw47WFW8tw4rCr1UZr4xZwb_yoWrXr4rpF sxCa15WrWkZr4rCanFk3W7Za4Fy3yDGFWUXF98uw1UZr43Kr9YyrW8KF1UGayUGrWF9w4F qFZ8tryfXw1UZFJanT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x07jOTmhUUUUU= X-Originating-IP: [101.236.11.3] X-CM-SenderInfo: xmld0wp1lqwmqvysqiyswou0bp/1tbimhh3AFpEAtE9tQAAsw Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org This patch is used to fix ext4 direct I/O read error when the read size is not aligned with block size. Then, I will use a test to explain the error. (1) Make a file that is not aligned with block size: $dd if=/dev/zero of=./test.jar bs=1000 count=3 (2) I wrote a source file named "direct_io_read_file.c" as following: #include #include #include #include #include #include #include #define BUF_SIZE 1024 int main() { int fd; int ret; unsigned char *buf; ret = posix_memalign((void **)&buf, 512, BUF_SIZE); if (ret) { perror("posix_memalign failed"); exit(1); } fd = open("./test.jar", O_RDONLY | O_DIRECT, 0755); if (fd < 0){ perror("open ./test.jar failed"); exit(1); } do { ret = read(fd, buf, BUF_SIZE); printf("ret=%d\n",ret); if (ret < 0) { perror("write test.jar failed"); } } while (ret > 0); free(buf); close(fd); } (3) Compile the source file: $gcc direct_io_read_file.c -D_GNU_SOURCE (4) Run the test program: $./a.out The result is as following: ret=1024 ret=1024 ret=952 ret=-1 write test.jar failed: Invalid argument. I have tested this program on XFS filesystem, XFS does not have this problem, because XFS use iomap_dio_rw() to do direct I/O read. And the comparing between read offset and file size is done in iomap_dio_rw(), the code is as following: if (pos < size) { retval = filemap_write_and_wait_range(mapping, pos, pos + iov_length(iov, nr_segs) - 1); if (!retval) { retval = mapping->a_ops->direct_IO(READ, iocb, iov, pos, nr_segs); } ... } ...only when "pos < size", direct I/O can be done, or 0 will be return. I have tested the fix patch on Ext4, it is up to the mustard of EINVAL in man2(read) as following: #include ssize_t read(int fd, void *buf, size_t count); EINVAL fd is attached to an object which is unsuitable for reading; or the file was opened with the O_DIRECT flag, and either the address specified in buf, the value specified in count, or the current file offset is not suitably aligned. So I think this patch can be applied to fix ext4 direct I/O error. However Ext4 introduces direct I/O read using iomap infrastructure on kernel 5.5, the patch is commit ("ext4: introduce direct I/O read using iomap infrastructure"), then Ext4 will be the same as XFS, they all use iomap_dio_rw() to do direct I/O read. So this problem does not exist on kernel 5.5 for Ext4. From above description, we can see this problem exists on all the kernel versions between kernel 3.14 and kernel 5.4. It will cause the Applications to fail to read. For example, when the search service downloads a new full index file, the search engine is loading the previous index file and is processing the search request, it can not use buffer io that may squeeze the previous index file in use from pagecache, so the serch service must use direct I/O read. Please apply this patch on these kernel versions, or please use the method on kernel 5.5 to fix this problem. Fixes: 9fe55eea7e4b ("Fix race when checking i_size on direct i/o read") Reviewed-by: Jan Kara Co-developed-by: Wang Long Signed-off-by: Wang Long Signed-off-by: Jiang Ying --- fs/ext4/inode.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c index 516faa2..a66b0ac 100644 --- a/fs/ext4/inode.c +++ b/fs/ext4/inode.c @@ -3821,6 +3821,11 @@ static ssize_t ext4_direct_IO_read(struct kiocb *iocb, struct iov_iter *iter) struct inode *inode = mapping->host; size_t count = iov_iter_count(iter); ssize_t ret; + loff_t offset = iocb->ki_pos; + loff_t size = i_size_read(inode); + + if (offset >= size) + return 0; /* * Shared inode_lock is enough for us - it protects against concurrent -- 1.8.3.1