linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dave Chinner <david@fromorbit.com>
To: Brian Foster <bfoster@redhat.com>
Cc: linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org
Subject: Re: [PATCH 1/2] iomap: use page dirty state to seek data over unwritten extents
Date: Thu, 15 Oct 2020 09:37:43 +1100	[thread overview]
Message-ID: <20201014223743.GD7391@dread.disaster.area> (raw)
In-Reply-To: <20201014125955.GA1109375@bfoster>

On Wed, Oct 14, 2020 at 08:59:55AM -0400, Brian Foster wrote:
> On Wed, Oct 14, 2020 at 09:53:44AM +1100, Dave Chinner wrote:
> > On Mon, Oct 12, 2020 at 10:03:49AM -0400, Brian Foster wrote:
> > > iomap seek hole/data currently uses page Uptodate state to track
> > > data over unwritten extents. This is odd and unpredictable in that
> > > the existence of clean pages changes behavior. For example:
> > > 
> > >   $ xfs_io -fc "falloc 0 32k" -c "seek -d 0" \
> > > 	    -c "pread 16k 4k" -c "seek -d 0" /mnt/file
> > >   Whence  Result
> > >   DATA    EOF
> > >   ...
> > >   Whence  Result
> > >   DATA    16384
> > 
> > I don't think there is any way around this, because the page cache
> > lookup done by the seek hole/data code is an
> > unlocked operation and can race with other IO and operations. That
> > is, seek does not take IO serialisation locks at all so
> > read/write/page faults/fallocate/etc all run concurrently with it...
> > 
> > i.e. we get an iomap that is current at the time the iomap_begin()
> > call is made, but we don't hold any locks to stabilise that extent
> > range while we do a page cache traversal looking for cached data.
> > That means any region of the unwritten iomap can change state while
> > we are running the page cache seek.
> > 
> 
> Hm, Ok.. that makes sense..
> 
> > We cannot determine what the data contents without major overhead,
> > and if we are seeking over a large unwritten extent covered by clean
> > pages that then gets partially written synchronously by another
> > concurrent write IO then we might trip across clean uptodate pages
> > with real data in them by the time the page cache scan gets to it.
> > 
> > Hence the only thing we are looking at here is whether there is data
> > present in the cache or not. As such, I think assuming that only
> > dirty/writeback pages contain actual user data in a seek data/hole
> > operation is a fundametnally incorrect premise.
> > 
> 
> ... but afaict this kind of thing is already possible because nothing
> stops a subsequently cleaned page (i.e., dirtied and written back) from
> also being dropped from cache before the scan finds it.  IOW, I don't
> really see how this justifies using one page state check over another as
> opposed to pointing out the whole page scanning thing itself seems to be
> racy. Perhaps the reasoning wrt to seek is simply that we should either
> see one state (hole) or the next (data) and we don't terribly care much
> about seek being racy..?

lseek() is inherently racy, and there's nothing we can do to prevent
that. i.e. even if we lock lseek up tight and guarantee the lookup
we do is absolutely correct, something can come in between dropping
the locks and returning that information to userspace that makes it
incorrect.

My point is that if we see a page that has uptodate data in it, then
userspace needs to be told that so it can determine if it is
actual data or just zeroed pages by reading it. If there's no page
in the cache, then seek hole/data simply doesn't know there was ever
data there, and there's nothing a page cache scan can do about that
sort of race. And there's nothing userspace can do about that sort
of race, either, because lseek() is inherently racy.

> My concern is more the issue described by patch 2. Note that patch 2
> doesn't necessarily depend on this one. The tradeoff without patch 1 is
> just that we'd explicitly zero and dirty any uptodate new EOF page as
> opposed to a page that was already dirty (or writeback).

I haven't looked at patch 2 - changes to seek hole/data need to be
correct from a stand alone perspective...

> Truncate does hold iolock/mmaplock, but ISTM that is still not
> sufficient because of the same page reclaim issue mentioned above. E.g.,
> a truncate down lands on a dirty page over an unwritten block,
> iomap_truncate_page() receives the unwritten mapping, page is flushed
> and reclaimed (changing block state), iomap_truncate_page() (still using
> the unwritten mapping) has nothing to do without a page and thus stale
> data is exposed.

So the problem here is only the new partial EOF block after the
truncate down completes? i.e. iomap_zero_range_actor() if failing to
zero the partial page that covers the new EOF if the block is
unwritten?

So, truncate_setsize() zeros the new partial EOF page, but it does
so without dirtying the page at all. Hence if the page is dirty in
memory over an unwritten extent when we run iomap_truncate_page(),
it's ready to be written out with the tail already zeroed in the
page cache. The only problem is that iomap_truncate_page() didn't
return "did_zeroing = true", and hence the followup "did_zeroing"
flush doesn't trigger.

And, FWIW, I suspect that follow flush is invalid for a truncate
down, too, because ip->i_d.di_size > new_isize  because both
write_cache_pages and __filemap_fdatawait_range() do nothing if
start > end as per the call in xfs_setattr_size().

> ISTM that either the filesystem needs to be more involved with the
> stabilization of unwritten mappings in general or truncate page needs to
> do something along the lines of block_truncate_page() (which we used
> pre-iomap) and just explicitly zero/dirty the new page if the block is
> otherwise mapped. Thoughts? Other ideas?

I suspect that iomap_truncate_page() needs to attempt to invalidate
the range being truncated first. i.e. call
invalidate_inode_pages2_range() and if it gets EBUSY returned we
know that there is a dirty cached page over the offset we are
truncating, and we now know that we must zero the page range
regardless of whether it sits over an unwritten extent or not.  Then
we just have to make sure the xfs_setattr_size does the right thing
with did_zeroing on truncate down....

Cheers,

Dave.
-- 
Dave Chinner
david@fromorbit.com

  reply	other threads:[~2020-10-14 22:37 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-12 14:03 [PATCH 0/2] iomap: zero dirty pages over unwritten extents Brian Foster
2020-10-12 14:03 ` [PATCH 1/2] iomap: use page dirty state to seek data " Brian Foster
2020-10-13 12:30   ` Brian Foster
2020-10-13 22:53   ` Dave Chinner
2020-10-14 12:59     ` Brian Foster
2020-10-14 22:37       ` Dave Chinner [this message]
2020-10-15  9:47   ` Christoph Hellwig
2020-10-19 16:55     ` Brian Foster
2020-10-27 18:07       ` Christoph Hellwig
2020-10-28 11:31         ` Brian Foster
2020-10-12 14:03 ` [PATCH 2/2] iomap: zero cached pages over unwritten extents on zero range Brian Foster
2020-10-15  9:49   ` Christoph Hellwig
2020-10-19 16:55     ` Brian Foster
2020-10-19 18:01       ` Brian Foster
2020-10-20 16:21         ` Brian Foster
2020-10-27 18:15           ` Christoph Hellwig
2020-10-28 11:31             ` Brian Foster
2020-10-23  1:02   ` [iomap] 11b5156248: xfstests.xfs.310.fail kernel test robot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20201014223743.GD7391@dread.disaster.area \
    --to=david@fromorbit.com \
    --cc=bfoster@redhat.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-xfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).