From patchwork Tue May 3 15:19:48 2011 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jan Kara X-Patchwork-Id: 93827 Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 676EE1007F9 for ; Wed, 4 May 2011 01:19:54 +1000 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751299Ab1ECPTw (ORCPT ); Tue, 3 May 2011 11:19:52 -0400 Received: from cantor.suse.de ([195.135.220.2]:51983 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751176Ab1ECPTv (ORCPT ); Tue, 3 May 2011 11:19:51 -0400 Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.221.2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.suse.de (Postfix) with ESMTP id 9846E945D8; Tue, 3 May 2011 17:19:49 +0200 (CEST) Received: by quack.suse.cz (Postfix, from userid 1000) id 1F48D2050F; Tue, 3 May 2011 17:19:48 +0200 (CEST) Date: Tue, 3 May 2011 17:19:48 +0200 From: Jan Kara To: Surbhi Palande Cc: Toshiyuki Okajima , Jan Kara , Ted Ts'o , Masayoshi MIZUMA , Andreas Dilger , linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, sandeen@redhat.com Subject: Re: [RFC][PATCH] Re: [BUG] ext4: cannot unfreeze a filesystem due to a deadlock Message-ID: <20110503151948.GB6009@quack.suse.cz> References: <4D9AEE28.4000003@jp.fujitsu.com> <20110405225428.GD8531@quack.suse.cz> <4D9BF57A.6030705@jp.fujitsu.com> <20110406055708.GB23285@quack.suse.cz> <4D9C18DF.90803@jp.fujitsu.com> <20110406174617.GC28689@quack.suse.cz> <4DA84A7B.3040403@jp.fujitsu.com> <20110415171310.GB5432@quack.suse.cz> <4DABFEBD.7030102@jp.fujitsu.com> <4DBFE09E.5070805@canonical.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <4DBFE09E.5070805@canonical.com> User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue 03-05-11 14:01:50, Surbhi Palande wrote: > On 04/18/2011 12:05 PM, Toshiyuki Okajima wrote: > >(2011/04/16 2:13), Jan Kara wrote: > >>Hello, > >> > >>On Fri 15-04-11 22:39:07, Toshiyuki Okajima wrote: > >>>>For ext3 or ext4 without delayed allocation we block inside writepage() > >>>>function. But as I wrote to Dave Chinner, ->page_mkwrite() should > >>>>probably > >>>>get modified to block while minor-faulting the page on frozen fs > >>>>because > >>>>when blocks are already allocated we may skip starting a transaction > >>>>and so > >>>>we could possibly modify the filesystem. > >>>OK. I think ->page_mkwrite() should also block writing the > >>>minor-faulting pages. > >>> > >>>(minor-pagefault) > >>>-> do_wp_page() > >>>-> page_mkwrite(= ext4_mkwrite()) > >>>=> BLOCK! > >>> > >>>(major-pagefault) > >>>-> do_liner_fault() > >>>-> page_mkwrite(= ext4_mkwrite()) > >>>=> BLOCK! > >>> > >>>> > >>>>>>>Mizuma-san's reproducer also writes the data which maps to the > >>>>>>>file (mmap). > >>>>>>>The original problem happens after the fsfreeze operation is done. > >>>>>>>I understand the normal write operation (not mmap) can be blocked > >>>>>>>while > >>>>>>>fsfreezing. So, I guess we don't always block all the write > >>>>>>>operation > >>>>>>>while fsfreezing. > >>>>>>Technically speaking, we block all the transaction starts which > >>>>>>means we > >>>>>>end up blocking all the writes from going to disk. But that does > >>>>>>not mean > >>>>>>we block all the writes from going to in-memory cache - as you > >>>>>>properly > >>>>>>note the mmap case is one of such exceptions. > >>>>>Hm, I also think we can allow the writes to in-memory cache but we > >>>>>can't allow > >>>>>the writes to disk while fsfreezing. I am considering that mmap > >>>>>path can > >>>>>write to disk while fsfreezing because this deadlock problem > >>>>>happens after > >>>>>fsfreeze operation is done... > >>>>I'm sorry I don't understand now - are you speaking about the case > >>>>above > >>>>when writepage() does not wait for filesystem being frozen or something > >>>>else? > >>>Sorry, I didn't understand around the page fault path. > >>>So, I had read the kernel source code around it, then I maybe > >>>understand... > >>> > >>>I worry whether we can update the file data in mmap case while > >>>fsfreezing. > >>>Of course, I understand that we can write to in-memory cache, and it > >>>is not a > >>>problem. However, if we can write to disk while fsfreezing, it is a > >>>problem. > >>>So, I summarize the cases whether we can write to disk or not. > >>> > >>>-------------------------------------------------------------------------- > >>> > >>>Cases (Whether we can write the data mmapped to the file on the disk > >>>while fsfreezing) > >>> > >>>[1] One of the page which has been mmapped is not bound. And > >>>the page is not allocated yet. (major fault?) > >>> > >>>(1) user dirtys a page > >>>(2) a page fault occurs (do_page_fault) > >>>(3) __do_falut is called. > >>>(4) ext4_page_mkwrite is called > >>>(5) ext4_write_begin is called > >>>(6) ext4_journal_start_sb => We can STOP! > >>> > >>>[2] One of the page which has been mmapped is not bound. But > >>>the page is already allocated, and the buffer_heads of the page > >>>are not mapped (BH_Mapped). (minor fault?) > >>> > >>>(1) user dirtys a page > >>>(2) a page fault occurs (do_page_fault) > >>>(3) do_wp_page is called. > >>>(4) ext4_page_mkwrite is called > >>>(5) ext4_write_begin is called > >>>(6) ext4_journal_start_sb => We can STOP! > > What happens in the case as follows: > > Task 1: Mmapped writes > t1)ext4_page_mkwrite() > t2) ext4_write_begin() (FS is thawed so we proceed) > t3) ext4_write_end() (journal is stopped now) > -----Pre-empted----- > > > Task 2: Freeze Task > t4) freezes the super block... > ...(continues).... > tn) the page cache is clean and the F.S is frozen. Freeze has > completed execution. > > Task 1: Mmapped writes > tn+1) ext4_page_mkwrite() returns 0. > tn+2) __do_fault() gets control, code gets executed. > tn+3) _do_fault() marks the page dirty if the intent is to write to > a file based page which faulted. > > So you end up dirtying the page cache when the F.S is frozen? No? You are right ext4_page_mkrite() as currently implemented has problems. You have to return the page locked (and check for frozen fs with page lock held) to avoid races. If you check for frozen fs with page lock held, you are guaranteed that freezing code must wait for the page to get unlocked before proceeding. And before the page is unlocked, it is marked dirty by the pagefault code which makes freezing code write the page and writeprotect it again. So everything will be safe. Doing this cleanly requires some cleanups to ext4_page_mkwrite() (but stable pages during writeback need that as well so it's a reasonable thing to do). So something like attached patches should do what's needed - it's lightly tested with fsx in delalloc, nodelalloc, and data=journal configs. Honza From ee1f2f8cdea23cf19b34e51b4f78e040ce898976 Mon Sep 17 00:00:00 2001 From: Jan Kara Date: Tue, 3 May 2011 17:00:35 +0200 Subject: [PATCH 3/3] ext4: Block mmapped writes while the fs is frozen We should not allow file modification via mmap while the filesystem is frozen. So block in ext4_page_mkwrite() while the filesystem is frozen. We have to check for frozen filesystem under page lock with which we then return from ext4_page_mkwrite(). Only that way we cannot race with writeback done by freezing code - either we lock the page after the writeback has started, see freezing in progress and block, or writeback will wait for our page lock which is released only when the fault is done and then writeback will writeout and writeprotect the page again. Signed-off-by: Jan Kara --- fs/ext4/inode.c | 41 ++++++++++++++++++++++++----------------- 1 files changed, 24 insertions(+), 17 deletions(-) diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c index 377fed0..6faadaf 100644 --- a/fs/ext4/inode.c +++ b/fs/ext4/inode.c @@ -5788,13 +5788,6 @@ static int ext4_bh_unmapped(handle_t *handle, struct buffer_head *bh) return !buffer_mapped(bh); } -static int ext4_journalled_fault_fn(handle_t *handle, struct buffer_head *bh) -{ - if (!buffer_dirty(bh)) - return 0; - return ext4_handle_dirty_metadata(handle, NULL, bh); -} - int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) { struct page *page = vmf->page; @@ -5804,10 +5797,16 @@ int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) struct file *file = vma->vm_file; struct inode *inode = file->f_path.dentry->d_inode; struct address_space *mapping = inode->i_mapping; - handle_t handle; - get_block_t get_block; + handle_t *handle; + get_block_t *get_block; int retries = 0; +restart: + /* + * This check is racy but catches the common case. The check at the + * end of this function is reliable. + */ + vfs_check_frozen(inode->i_sb, SB_FREEZE_WRITE); /* Delalloc case is easy... */ if (test_opt(inode->i_sb, DELALLOC) && !ext4_should_journal_data(inode) && @@ -5834,10 +5833,8 @@ int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) else len = PAGE_CACHE_SIZE; /* - * Return if we have all the buffers mapped. This avoid - * the need to call write_begin/write_end which does a - * journal_start/journal_stop which can block and take - * long time + * Return if we have all the buffers mapped. This avoids the need to do + * journal_start/journal_stop which can block and take a long time */ if (page_has_buffers(page)) { if (!walk_page_buffers(NULL, page_buffers(page), 0, len, NULL, @@ -5852,7 +5849,7 @@ int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) get_block = ext4_get_block_write; else get_block = ext4_get_block; -retry: +retry_alloc: handle = ext4_journal_start(inode, ext4_writepage_trans_blocks(inode)); if (IS_ERR(handle)) { ret = VM_FAULT_SIGBUS; @@ -5861,16 +5858,16 @@ retry: ret = __block_page_mkwrite(vma, vmf, get_block); if (ret == VM_FAULT_LOCKED && ext4_should_journal_data(inode)) { if (walk_page_buffers(handle, page_buffers(page), 0, - PAGE_CACHE_SIZE, NULL, ext4_journalled_fault_fn)) { + PAGE_CACHE_SIZE, NULL, do_journal_get_write_access)) { unlock_page(page); ret = VM_FAULT_SIGBUS; goto out; } ext4_set_inode_state(inode, EXT4_STATE_JDATA); } - ext4_journal_end(handle); + ext4_journal_stop(handle); if (ret == -ENOSPC && ext4_should_retry_alloc(inode->i_sb, &retries)) - goto retry; + goto retry_alloc; out_ret: if (ret < 0) { if (ret == -ENOMEM) @@ -5879,5 +5876,15 @@ out_ret: ret = VM_FAULT_SIGBUS; } out: + /* + * Freezing in progress? We check with page lock held so if the test + * here fails, we are sure freezing code will wait until the page + * fault is done - at that point page will be dirty and unlocked so + * freezing code will writeprotect it again. + */ + if (ret == VM_FAULT_LOCKED && inode->i_sb->s_frozen != SB_UNFROZEN) { + unlock_page(page); + goto restart; + } return ret; } -- 1.7.1