Received: by 2002:a05:6358:f14:b0:e5:3b68:ec04 with SMTP id b20csp1724402rwj; Sun, 18 Dec 2022 14:20:00 -0800 (PST) X-Google-Smtp-Source: AMrXdXvvRiSKKJ9+G0lWZuFXu0UAYx0jN3KmSxgwzxfC9Sjl9Dy9HmhgFxVJtlLEKBH9DePJpTPl X-Received: by 2002:a17:907:8d11:b0:7e7:4dd7:bb88 with SMTP id tc17-20020a1709078d1100b007e74dd7bb88mr8159004ejc.57.1671402000053; Sun, 18 Dec 2022 14:20:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671402000; cv=none; d=google.com; s=arc-20160816; b=p5StoT0SQ7MXUFXVSjJJDKxIrOz2wQVfAOcBbP3948YLg5juJbrY1idu3cRZcTnNS8 xI1DL94jCmkDBfyNkyev2xsJcPFsy187fJBEMn7vIk88ioGjnahHfdoEOQUiTXRRmQLF pl0Xl8Q5b+Q/hXYrmj3Zb6808WYLQ87f2jf6/SqWpnH4Zn5YVseCNcHuHQNEVSSV4wV/ C8YFrNHfr8rF7A3L6VkxIb7nGZzf5h5X4Z8zFrRU8rABU+suAtd0iBOJHbpKnspEScqH MiWD69OrsOc6VocuqmGbwrBe3ldQ7Cil6SZ6OdDF6djlbpWHxp00lw/AFA8SgTMZqe6U knWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=irD2GLwmm9jLOEic9Txw0La3I6P2VC9FcUcMSRUsrP0=; b=cmTorH+sGJ7VtgkyhAt/Ir5UDyDY5Excj2dc0sxd9bYbLMCtJKFbHZ7oDXz8QtyoAk KNas+XQH2la9i1zPnAJtn2ewnihOWJqsz6X1hBl+0qEqP3xn5ulA5N0aKWn3352Kyujr xPB6ZWO58MvbGKj+VEqaUc912FqSRQ0J2NeEMX+oK6KErwuy4EkE6I2zfuBQWjTNAYj9 nSa/eW+UZUe4o0Fnu0DbcMf/B27+7eReWfKdhjjFpibu5YV/9OxQJyhYArBV/CLi3uSb zYX2W4uS1WOz5nGQc4QcFDcv02dzfQX0J1G4EJPn9u8Jh63Y+VJfkwT2Ka0ICwkX4v1v yJ+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=P3sBho3G; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n15-20020aa7c44f000000b00461c50013b8si7032151edr.192.2022.12.18.14.19.36; Sun, 18 Dec 2022 14:20:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=P3sBho3G; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231234AbiLRWN1 (ORCPT + 99 others); Sun, 18 Dec 2022 17:13:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41498 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231185AbiLRWN0 (ORCPT ); Sun, 18 Dec 2022 17:13:26 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B42EF1178 for ; Sun, 18 Dec 2022 14:11:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1671401474; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=irD2GLwmm9jLOEic9Txw0La3I6P2VC9FcUcMSRUsrP0=; b=P3sBho3GYIGX0B4/OMteoDPMcohWbSmu0drkONATHRavHQzPgvQchzh2sFMQLNZaaYup6H u6NuGmywwcIxorh7sHKoww1PXLgPdHUkyIDSSBRa07IndQWQaPDyz3C7wU+BQm+Z13+sLb llq40vUbn4urhXCPnmwFoTXiFaOYHG4= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-622-Yyar6fanPTi1Ep0SF6l7vA-1; Sun, 18 Dec 2022 17:11:11 -0500 X-MC-Unique: Yyar6fanPTi1Ep0SF6l7vA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 504C33C0D857; Sun, 18 Dec 2022 22:11:11 +0000 (UTC) Received: from pasta.redhat.com (ovpn-192-22.brq.redhat.com [10.40.192.22]) by smtp.corp.redhat.com (Postfix) with ESMTP id 1E3DC2166B26; Sun, 18 Dec 2022 22:11:08 +0000 (UTC) From: Andreas Gruenbacher To: Christoph Hellwig , "Darrick J . Wong" , Alexander Viro , Matthew Wilcox Cc: Andreas Gruenbacher , linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, cluster-devel@redhat.com Subject: [RFC v4 6/7] iomap/xfs: Eliminate the iomap_valid handler Date: Sun, 18 Dec 2022 23:10:53 +0100 Message-Id: <20221218221054.3946886-7-agruenba@redhat.com> In-Reply-To: <20221216150626.670312-1-agruenba@redhat.com> References: <20221216150626.670312-1-agruenba@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.6 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Eliminate the ->iomap_valid() handler by switching to a ->page_prepare() handler and validating the mapping there. Signed-off-by: Andreas Gruenbacher --- fs/iomap/buffered-io.c | 25 +++++-------------------- fs/xfs/xfs_iomap.c | 38 +++++++++++++++++++++++++++----------- include/linux/iomap.h | 17 ----------------- 3 files changed, 32 insertions(+), 48 deletions(-) diff --git a/fs/iomap/buffered-io.c b/fs/iomap/buffered-io.c index 819562633998..32a2a287d32c 100644 --- a/fs/iomap/buffered-io.c +++ b/fs/iomap/buffered-io.c @@ -628,7 +628,7 @@ static int iomap_write_begin(struct iomap_iter *iter, loff_t pos, const struct iomap_page_ops *page_ops = iter->iomap.page_ops; const struct iomap *srcmap = iomap_iter_srcmap(iter); struct folio *folio; - int status = 0; + int status; BUG_ON(pos + len > iter->iomap.offset + iter->iomap.length); if (srcmap != &iter->iomap) @@ -644,27 +644,12 @@ static int iomap_write_begin(struct iomap_iter *iter, loff_t pos, folio = page_ops->page_prepare(iter, pos, len); else folio = iomap_folio_prepare(iter, pos); - if (IS_ERR(folio)) - return PTR_ERR(folio); - - /* - * Now we have a locked folio, before we do anything with it we need to - * check that the iomap we have cached is not stale. The inode extent - * mapping can change due to concurrent IO in flight (e.g. - * IOMAP_UNWRITTEN state can change and memory reclaim could have - * reclaimed a previously partially written page at this index after IO - * completion before this write reaches this file offset) and hence we - * could do the wrong thing here (zero a page range incorrectly or fail - * to zero) and corrupt data. - */ - if (page_ops && page_ops->iomap_valid) { - bool iomap_valid = page_ops->iomap_valid(iter->inode, - &iter->iomap); - if (!iomap_valid) { + if (IS_ERR(folio)) { + if (folio == ERR_PTR(-ESTALE)) { iter->iomap.flags |= IOMAP_F_STALE; - status = 0; - goto out_unlock; + return 0; } + return PTR_ERR(folio); } if (pos + len > folio_pos(folio) + folio_size(folio)) diff --git a/fs/xfs/xfs_iomap.c b/fs/xfs/xfs_iomap.c index 669c1bc5c3a7..ae83cb89279d 100644 --- a/fs/xfs/xfs_iomap.c +++ b/fs/xfs/xfs_iomap.c @@ -62,29 +62,45 @@ xfs_iomap_inode_sequence( return cookie | READ_ONCE(ip->i_df.if_seq); } -/* - * Check that the iomap passed to us is still valid for the given offset and - * length. - */ -static bool -xfs_iomap_valid( - struct inode *inode, - const struct iomap *iomap) +static struct folio * +xfs_page_prepare( + struct iomap_iter *iter, + loff_t pos, + unsigned len) { + struct inode *inode = iter->inode; + struct iomap *iomap = &iter->iomap; struct xfs_inode *ip = XFS_I(inode); + struct folio *folio; + folio = iomap_folio_prepare(iter, pos); + if (IS_ERR(folio)) + return folio; + + /* + * Now we have a locked folio, before we do anything with it we need to + * check that the iomap we have cached is not stale. The inode extent + * mapping can change due to concurrent IO in flight (e.g. + * IOMAP_UNWRITTEN state can change and memory reclaim could have + * reclaimed a previously partially written page at this index after IO + * completion before this write reaches this file offset) and hence we + * could do the wrong thing here (zero a page range incorrectly or fail + * to zero) and corrupt data. + */ if (iomap->validity_cookie != xfs_iomap_inode_sequence(ip, iomap->flags)) { trace_xfs_iomap_invalid(ip, iomap); - return false; + folio_unlock(folio); + folio_put(folio); + return ERR_PTR(-ESTALE); } XFS_ERRORTAG_DELAY(ip->i_mount, XFS_ERRTAG_WRITE_DELAY_MS); - return true; + return folio; } const struct iomap_page_ops xfs_iomap_page_ops = { - .iomap_valid = xfs_iomap_valid, + .page_prepare = xfs_page_prepare, }; int diff --git a/include/linux/iomap.h b/include/linux/iomap.h index c74ab8c53b47..1c8b9a04b0bb 100644 --- a/include/linux/iomap.h +++ b/include/linux/iomap.h @@ -140,23 +140,6 @@ struct iomap_page_ops { unsigned len); void (*page_done)(struct inode *inode, loff_t pos, unsigned copied, struct folio *folio); - - /* - * Check that the cached iomap still maps correctly to the filesystem's - * internal extent map. FS internal extent maps can change while iomap - * is iterating a cached iomap, so this hook allows iomap to detect that - * the iomap needs to be refreshed during a long running write - * operation. - * - * The filesystem can store internal state (e.g. a sequence number) in - * iomap->validity_cookie when the iomap is first mapped to be able to - * detect changes between mapping time and whenever .iomap_valid() is - * called. - * - * This is called with the folio over the specified file position held - * locked by the iomap code. - */ - bool (*iomap_valid)(struct inode *inode, const struct iomap *iomap); }; /* -- 2.38.1