From patchwork Thu Oct 26 23:51:04 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Dan Williams X-Patchwork-Id: 10028889 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 9560C60567 for ; Thu, 26 Oct 2017 23:51:15 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 837F428508 for ; Thu, 26 Oct 2017 23:51:15 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 77CEE28EE7; Thu, 26 Oct 2017 23:51:15 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 66EBA28E76 for ; Thu, 26 Oct 2017 23:51:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751639AbdJZXvL convert rfc822-to-8bit (ORCPT ); Thu, 26 Oct 2017 19:51:11 -0400 Received: from mga02.intel.com ([134.134.136.20]:15465 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932395AbdJZXvJ (ORCPT ); Thu, 26 Oct 2017 19:51:09 -0400 Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Oct 2017 16:51:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.44,302,1505804400"; d="scan'208";a="1235842510" Received: from orsmsx104.amr.corp.intel.com ([10.22.225.131]) by fmsmga002.fm.intel.com with ESMTP; 26 Oct 2017 16:51:05 -0700 Received: from orsmsx157.amr.corp.intel.com (10.22.240.23) by ORSMSX104.amr.corp.intel.com (10.22.225.131) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 26 Oct 2017 16:51:05 -0700 Received: from orsmsx107.amr.corp.intel.com ([169.254.1.3]) by ORSMSX157.amr.corp.intel.com ([169.254.9.28]) with mapi id 14.03.0319.002; Thu, 26 Oct 2017 16:51:04 -0700 From: "Williams, Dan J" To: "hch@lst.de" , "jack@suse.cz" CC: "schwidefsky@de.ibm.com" , "darrick.wong@oracle.com" , "dledford@redhat.com" , "linux-rdma@vger.kernel.org" , "linux-fsdevel@vger.kernel.org" , "bfields@fieldses.org" , "linux-mm@kvack.org" , "heiko.carstens@de.ibm.com" , "dave.hansen@linux.intel.com" , "linux-xfs@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "jmoyer@redhat.com" , "viro@zeniv.linux.org.uk" , "kirill.shutemov@linux.intel.com" , "akpm@linux-foundation.org" , "Hefty, Sean" , "linux-nvdimm@lists.01.org" , "jlayton@poochiereds.net" , "mawilcox@microsoft.com" , "mhocko@suse.com" , "ross.zwisler@linux.intel.com" , "gerald.schaefer@de.ibm.com" , "jgunthorpe@obsidianresearch.com" , "hal.rosenstock@gmail.com" , "benh@kernel.crashing.org" , "david@fromorbit.com" , "mpe@ellerman.id.au" , "paulus@samba.org" Subject: Re: [PATCH v3 00/13] dax: fix dma vs truncate and remove 'page-less' support Thread-Topic: [PATCH v3 00/13] dax: fix dma vs truncate and remove 'page-less' support Thread-Index: AQHTTklvtJ68FoVyEEa8Sz2CheQ0LqL3Qy+A Date: Thu, 26 Oct 2017 23:51:04 +0000 Message-ID: <1509061831.25213.2.camel@intel.com> References: <150846713528.24336.4459262264611579791.stgit@dwillia2-desk3.amr.corp.intel.com> <20171020074750.GA13568@lst.de> <20171020093148.GA20304@lst.de> <20171026105850.GA31161@quack2.suse.cz> In-Reply-To: <20171026105850.GA31161@quack2.suse.cz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.249.36.103] Content-ID: <6B1E8E88FC7C9E4D9754113A024144AD@intel.com> MIME-Version: 1.0 Sender: linux-rdma-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP On Thu, 2017-10-26 at 12:58 +0200, Jan Kara wrote: > On Fri 20-10-17 11:31:48, Christoph Hellwig wrote: > > On Fri, Oct 20, 2017 at 09:47:50AM +0200, Christoph Hellwig wrote: > > > I'd like to brainstorm how we can do something better. > > > > > > How about: > > > > > > If we hit a page with an elevated refcount in truncate / hole puch > > > etc for a DAX file system we do not free the blocks in the file system, > > > but add it to the extent busy list.  We mark the page as delayed > > > free (e.g. page flag?) so that when it finally hits refcount zero we > > > call back into the file system to remove it from the busy list. > > > > Brainstorming some more: > > > > Given that on a DAX file there shouldn't be any long-term page > > references after we unmap it from the page table and don't allow > > get_user_pages calls why not wait for the references for all > > DAX pages to go away first?  E.g. if we find a DAX page in > > truncate_inode_pages_range that has an elevated refcount we set > > a new flag to prevent new references from showing up, and then > > simply wait for it to go away.  Instead of a busy way we can > > do this through a few hashed waitqueued in dev_pagemap.  And in > > fact put_zone_device_page already gets called when putting the > > last page so we can handle the wakeup from there. > > > > In fact if we can't find a page flag for the stop new callers > > things we could probably come up with a way to do that through > > dev_pagemap somehow, but I'm not sure how efficient that would > > be. > > We were talking about this yesterday with Dan so some more brainstorming > from us. We can implement the solution with extent busy list in ext4 > relatively easily - we already have such list currently similarly to XFS. > There would be some modifications needed but nothing too complex. The > biggest downside of this solution I see is that it requires per-filesystem > solution for busy extents - ext4 and XFS are reasonably fine, however btrfs > may have problems and ext2 definitely will need some modifications. > Invisible used blocks may be surprising to users at times although given > page refs should be relatively short term, that should not be a big issue. > But are we guaranteed page refs are short term? E.g. if someone creates > v4l2 videobuf in MAP_SHARED mapping of a file on DAX filesystem, page refs > can be rather long-term similarly as in RDMA case. Also freeing of blocks > on page reference drop is another async entry point into the filesystem > which could unpleasantly surprise us but I guess workqueues would solve > that reasonably fine. > > WRT waiting for page refs to be dropped before proceeding with truncate (or > punch hole for that matter - that case is even nastier since we don't have > i_size to guard us). What I like about this solution is that it is very > visible there's something unusual going on with the file being truncated / > punched and so problems are easier to diagnose / fix from the admin side. > So far we have guarded hole punching from concurrent faults (and > get_user_pages() does fault once you do unmap_mapping_range()) with > I_MMAP_LOCK (or its equivalent in ext4). We cannot easily wait for page > refs to be dropped under I_MMAP_LOCK as that could deadlock - the most > obvious case Dan came up with is when GUP obtains ref to page A, then hole > punch comes grabbing I_MMAP_LOCK and waiting for page ref on A to be > dropped, and then GUP blocks on trying to fault in another page. > > I think we cannot easily prevent new page references to be grabbed as you > write above since nobody expects stuff like get_page() to fail. But I  > think that unmapping relevant pages and then preventing them to be faulted > in again is workable and stops GUP as well. The problem with that is though > what to do with page faults to such pages - you cannot just fail them for > hole punch, and you cannot easily allocate new blocks either. So we are > back at a situation where we need to detach blocks from the inode and then > wait for page refs to be dropped - so some form of busy extents. Am I > missing something? > No, that's a good summary of what we talked about. However, I did go back and give the new lock approach a try and was able to get my test to pass. The new locking is not pretty especially since you need to drop and reacquire the lock so that get_user_pages() can finish grabbing all the pages it needs. Here are the two primary patches in the series, do you think the extent-busy approach would be cleaner? --- commit 5023d20a0aa795ddafd43655be1bfb2cbc7f4445 Author: Dan Williams Date: Wed Oct 25 05:14:54 2017 -0700 mm, dax: handle truncate of dma-busy pages get_user_pages() pins file backed memory pages for access by dma devices. However, it only pins the memory pages not the page-to-file offset association. If a file is truncated the pages are mapped out of the file and dma may continue indefinitely into a page that is owned by a device driver. This breaks coherency of the file vs dma, but the assumption is that if userspace wants the file-space truncated it does not matter what data is inbound from the device, it is not relevant anymore. The assumptions of the truncate-page-cache model are broken by DAX where the target DMA page *is* the filesystem block. Leaving the page pinned for DMA, but truncating the file block out of the file, means that the filesytem is free to reallocate a block under active DMA to another file! Here are some possible options for fixing this situation ('truncate' and 'fallocate(punch hole)' are synonymous below): 1/ Fail truncate while any file blocks might be under dma 2/ Block (sleep-wait) truncate while any file blocks might be under dma 3/ Remap file blocks to a "lost+found"-like file-inode where dma can continue and we might see what inbound data from DMA was mapped out of the original file. Blocks in this file could be freed back to the filesystem when dma eventually ends. 4/ List the blocks under DMA in the extent busy list and either hold off commit of the truncate transaction until commit, or otherwise keep the blocks marked busy so the allocator does not reuse them until DMA completes. 5/ Disable dax until option 3 or another long term solution has been implemented. However, filesystem-dax is still marked experimental for concerns like this. Option 1 will throw failures where userspace has never expected them before, option 2 might hang the truncating process indefinitely, and option 3 requires per filesystem enabling to remap blocks from one inode to another. Option 2 is implemented in this patch for the DAX path with the expectation that non-transient users of get_user_pages() (RDMA) are disallowed from setting up dax mappings and that the potential delay introduced to the truncate path is acceptable compared to the response time of the page cache case. This can only be seen as a stop-gap until we can solve the problem of safely sequestering unallocated filesystem blocks under active dma. The solution introduces a new inode semaphore that that is held exclusively for get_user_pages() and held for read at truncate while sleep-waiting on a hashed waitqueue. Credit for option 3 goes to Dave Hansen, who proposed something similar as an alternative way to solve the problem that MAP_DIRECT was trying to solve. Credit for option 4 goes to Christoph Hellwig. Cc: Jan Kara Cc: Jeff Moyer Cc: Dave Chinner Cc: Matthew Wilcox Cc: Alexander Viro Cc: "Darrick J. Wong" Cc: Ross Zwisler Cc: Dave Hansen Cc: Andrew Morton Reported-by: Christoph Hellwig Signed-off-by: Dan Williams -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/drivers/dax/super.c b/drivers/dax/super.c index 4ac359e14777..a5a4b95ffdaf 100644 --- a/drivers/dax/super.c +++ b/drivers/dax/super.c @@ -167,6 +167,7 @@ struct dax_device { #if IS_ENABLED(CONFIG_FS_DAX) static void generic_dax_pagefree(struct page *page, void *data) { + wake_up_devmap_idle(&page->_refcount); } struct dax_device *fs_dax_claim_bdev(struct block_device *bdev, void *owner) diff --git a/fs/dax.c b/fs/dax.c index fd5d385988d1..f2c98f9cb833 100644 --- a/fs/dax.c +++ b/fs/dax.c @@ -346,6 +346,19 @@ static void dax_disassociate_entry(void *entry, struct inode *inode, bool trunc) } } +static struct page *dma_busy_page(void *entry) +{ + unsigned long pfn, end_pfn; + + for_each_entry_pfn(entry, pfn, end_pfn) { + struct page *page = pfn_to_page(pfn); + + if (page_ref_count(page) > 1) + return page; + } + return NULL; +} + /* * Find radix tree entry at given index. If it points to an exceptional entry, * return it with the radix tree entry locked. If the radix tree doesn't @@ -487,6 +500,97 @@ static void *grab_mapping_entry(struct address_space *mapping, pgoff_t index, return entry; } +static int wait_page(atomic_t *_refcount) +{ + struct page *page = container_of(_refcount, struct page, _refcount); + struct inode *inode = page->inode; + + if (page_ref_count(page) == 1) + return 0; + + i_daxdma_unlock_shared(inode); + schedule(); + i_daxdma_lock_shared(inode); + + /* + * if we bounced the daxdma_lock then we need to rescan the + * truncate area. + */ + return 1; +} + +void dax_wait_dma(struct address_space *mapping, loff_t lstart, loff_t len) +{ + struct inode *inode = mapping->host; + pgoff_t indices[PAGEVEC_SIZE]; + pgoff_t start, end, index; + struct pagevec pvec; + unsigned i; + + lockdep_assert_held(&inode->i_dax_dmasem); + + if (lstart < 0 || len < -1) + return; + + /* in the limited case get_user_pages for dax is disabled */ + if (IS_ENABLED(CONFIG_FS_DAX_LIMITED)) + return; + + if (!dax_mapping(mapping)) + return; + + if (mapping->nrexceptional == 0) + return; + + if (len == -1) + end = -1; + else + end = (lstart + len) >> PAGE_SHIFT; + start = lstart >> PAGE_SHIFT; + +retry: + pagevec_init(&pvec, 0); + index = start; + while (index < end && pagevec_lookup_entries(&pvec, mapping, index, + min(end - index, (pgoff_t)PAGEVEC_SIZE), + indices)) { + for (i = 0; i < pagevec_count(&pvec); i++) { + struct page *pvec_ent = pvec.pages[i]; + struct page *page = NULL; + void *entry; + + index = indices[i]; + if (index >= end) + break; + + if (!radix_tree_exceptional_entry(pvec_ent)) + continue; + + spin_lock_irq(&mapping->tree_lock); + entry = get_unlocked_mapping_entry(mapping, index, NULL); + if (entry) + page = dma_busy_page(entry); + put_unlocked_mapping_entry(mapping, index, entry); + spin_unlock_irq(&mapping->tree_lock); + + if (page && wait_on_devmap_idle(&page->_refcount, + wait_page, + TASK_UNINTERRUPTIBLE) != 0) { + /* + * We dropped the dma lock, so we need + * to revalidate that previously seen + * idle pages are still idle. + */ + goto retry; + } + } + pagevec_remove_exceptionals(&pvec); + pagevec_release(&pvec); + index++; + } +} +EXPORT_SYMBOL_GPL(dax_wait_dma); + static int __dax_invalidate_mapping_entry(struct address_space *mapping, pgoff_t index, bool trunc) { @@ -509,8 +613,10 @@ static int __dax_invalidate_mapping_entry(struct address_space *mapping, out: put_unlocked_mapping_entry(mapping, index, entry); spin_unlock_irq(&mapping->tree_lock); + return ret; } + /* * Delete exceptional DAX entry at @index from @mapping. Wait for radix tree * entry to get unlocked before deleting it. diff --git a/fs/inode.c b/fs/inode.c index d1e35b53bb23..95408e87a96c 100644 --- a/fs/inode.c +++ b/fs/inode.c @@ -192,6 +192,7 @@ int inode_init_always(struct super_block *sb, struct inode *inode) inode->i_fsnotify_mask = 0; #endif inode->i_flctx = NULL; + i_daxdma_init(inode); this_cpu_inc(nr_inodes); return 0; diff --git a/include/linux/dax.h b/include/linux/dax.h index ea21ebfd1889..6ce1c50519e7 100644 --- a/include/linux/dax.h +++ b/include/linux/dax.h @@ -100,10 +100,15 @@ int dax_invalidate_mapping_entry_sync(struct address_space *mapping, pgoff_t index); #ifdef CONFIG_FS_DAX +void dax_wait_dma(struct address_space *mapping, loff_t lstart, loff_t len); int __dax_zero_page_range(struct block_device *bdev, struct dax_device *dax_dev, sector_t sector, unsigned int offset, unsigned int length); #else +static inline void dax_wait_dma(struct address_space *mapping, loff_t lstart, + loff_t len) +{ +} static inline int __dax_zero_page_range(struct block_device *bdev, struct dax_device *dax_dev, sector_t sector, unsigned int offset, unsigned int length) diff --git a/include/linux/fs.h b/include/linux/fs.h index 13dab191a23e..cd5b4a092d1c 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -645,6 +645,9 @@ struct inode { #ifdef CONFIG_IMA atomic_t i_readcount; /* struct files open RO */ #endif +#ifdef CONFIG_FS_DAX + struct rw_semaphore i_dax_dmasem; +#endif const struct file_operations *i_fop; /* former ->i_op->default_file_ops */ struct file_lock_context *i_flctx; struct address_space i_data; @@ -747,6 +750,59 @@ static inline void inode_lock_nested(struct inode *inode, unsigned subclass) down_write_nested(&inode->i_rwsem, subclass); } +#ifdef CONFIG_FS_DAX +static inline void i_daxdma_init(struct inode *inode) +{ + init_rwsem(&inode->i_dax_dmasem); +} + +static inline void i_daxdma_lock(struct inode *inode) +{ + down_write(&inode->i_dax_dmasem); +} + +static inline void i_daxdma_unlock(struct inode *inode) +{ + up_write(&inode->i_dax_dmasem); +} + +static inline void i_daxdma_lock_shared(struct inode *inode) +{ + /* + * The write lock is taken under mmap_sem in the + * get_user_pages() path the read lock nests in the truncate + * path. + */ +#define DAXDMA_TRUNCATE_CLASS 1 + down_read_nested(&inode->i_dax_dmasem, DAXDMA_TRUNCATE_CLASS); +} + +static inline void i_daxdma_unlock_shared(struct inode *inode) +{ + up_read(&inode->i_dax_dmasem); +} +#else /* CONFIG_FS_DAX */ +static inline void i_daxdma_init(struct inode *inode) +{ +} + +static inline void i_daxdma_lock(struct inode *inode) +{ +} + +static inline void i_daxdma_unlock(struct inode *inode) +{ +} + +static inline void i_daxdma_lock_shared(struct inode *inode) +{ +} + +static inline void i_daxdma_unlock_shared(struct inode *inode) +{ +} +#endif /* CONFIG_FS_DAX */ + void lock_two_nondirectories(struct inode *, struct inode*); void unlock_two_nondirectories(struct inode *, struct inode*); diff --git a/include/linux/wait_bit.h b/include/linux/wait_bit.h index 12b26660d7e9..6186ecdb9df7 100644 --- a/include/linux/wait_bit.h +++ b/include/linux/wait_bit.h @@ -30,10 +30,12 @@ int __wait_on_bit(struct wait_queue_head *wq_head, struct wait_bit_queue_entry * int __wait_on_bit_lock(struct wait_queue_head *wq_head, struct wait_bit_queue_entry *wbq_entry, wait_bit_action_f *action, unsigned int mode); void wake_up_bit(void *word, int bit); void wake_up_atomic_t(atomic_t *p); +void wake_up_devmap_idle(atomic_t *p); int out_of_line_wait_on_bit(void *word, int, wait_bit_action_f *action, unsigned int mode); int out_of_line_wait_on_bit_timeout(void *word, int, wait_bit_action_f *action, unsigned int mode, unsigned long timeout); int out_of_line_wait_on_bit_lock(void *word, int, wait_bit_action_f *action, unsigned int mode); int out_of_line_wait_on_atomic_t(atomic_t *p, int (*)(atomic_t *), unsigned int mode); +int out_of_line_wait_on_devmap_idle(atomic_t *p, int (*)(atomic_t *), unsigned int mode); struct wait_queue_head *bit_waitqueue(void *word, int bit); extern void __init wait_bit_init(void); @@ -258,4 +260,12 @@ int wait_on_atomic_t(atomic_t *val, int (*action)(atomic_t *), unsigned mode) return out_of_line_wait_on_atomic_t(val, action, mode); } +static inline +int wait_on_devmap_idle(atomic_t *val, int (*action)(atomic_t *), unsigned mode) +{ + might_sleep(); + if (atomic_read(val) == 1) + return 0; + return out_of_line_wait_on_devmap_idle(val, action, mode); +} #endif /* _LINUX_WAIT_BIT_H */ diff --git a/kernel/sched/wait_bit.c b/kernel/sched/wait_bit.c index f8159698aa4d..6ea93149614a 100644 --- a/kernel/sched/wait_bit.c +++ b/kernel/sched/wait_bit.c @@ -162,11 +162,17 @@ static inline wait_queue_head_t *atomic_t_waitqueue(atomic_t *p) return bit_waitqueue(p, 0); } -static int wake_atomic_t_function(struct wait_queue_entry *wq_entry, unsigned mode, int sync, - void *arg) +static inline struct wait_bit_queue_entry *to_wait_bit_q( + struct wait_queue_entry *wq_entry) +{ + return container_of(wq_entry, struct wait_bit_queue_entry, wq_entry); +} + +static int wake_atomic_t_function(struct wait_queue_entry *wq_entry, + unsigned mode, int sync, void *arg) { struct wait_bit_key *key = arg; - struct wait_bit_queue_entry *wait_bit = container_of(wq_entry, struct wait_bit_queue_entry, wq_entry); + struct wait_bit_queue_entry *wait_bit = to_wait_bit_q(wq_entry); atomic_t *val = key->flags; if (wait_bit->key.flags != key->flags || @@ -176,14 +182,29 @@ static int wake_atomic_t_function(struct wait_queue_entry *wq_entry, unsigned mo return autoremove_wake_function(wq_entry, mode, sync, key); } +static int wake_devmap_idle_function(struct wait_queue_entry *wq_entry, + unsigned mode, int sync, void *arg) +{ + struct wait_bit_key *key = arg; + struct wait_bit_queue_entry *wait_bit = to_wait_bit_q(wq_entry); + atomic_t *val = key->flags; + + if (wait_bit->key.flags != key->flags || + wait_bit->key.bit_nr != key->bit_nr || + atomic_read(val) != 1) + return 0; + return autoremove_wake_function(wq_entry, mode, sync, key); +} + /* * To allow interruptible waiting and asynchronous (i.e. nonblocking) waiting, * the actions of __wait_on_atomic_t() are permitted return codes. Nonzero * return codes halt waiting and return. */ static __sched -int __wait_on_atomic_t(struct wait_queue_head *wq_head, struct wait_bit_queue_entry *wbq_entry, - int (*action)(atomic_t *), unsigned mode) +int __wait_on_atomic_t(struct wait_queue_head *wq_head, + struct wait_bit_queue_entry *wbq_entry, + int (*action)(atomic_t *), unsigned mode, int target) { atomic_t *val; int ret = 0; @@ -191,10 +212,10 @@ int __wait_on_atomic_t(struct wait_queue_head *wq_head, struct wait_bit_queue_en do { prepare_to_wait(wq_head, &wbq_entry->wq_entry, mode); val = wbq_entry->key.flags; - if (atomic_read(val) == 0) + if (atomic_read(val) == target) break; ret = (*action)(val); - } while (!ret && atomic_read(val) != 0); + } while (!ret && atomic_read(val) != target); finish_wait(wq_head, &wbq_entry->wq_entry); return ret; } @@ -210,16 +231,37 @@ int __wait_on_atomic_t(struct wait_queue_head *wq_head, struct wait_bit_queue_en }, \ } +#define DEFINE_WAIT_DEVMAP_IDLE(name, p) \ + struct wait_bit_queue_entry name = { \ + .key = __WAIT_ATOMIC_T_KEY_INITIALIZER(p), \ + .wq_entry = { \ + .private = current, \ + .func = wake_devmap_idle_function, \ + .entry = \ + LIST_HEAD_INIT((name).wq_entry.entry), \ + }, \ + } + __sched int out_of_line_wait_on_atomic_t(atomic_t *p, int (*action)(atomic_t *), unsigned mode) { struct wait_queue_head *wq_head = atomic_t_waitqueue(p); DEFINE_WAIT_ATOMIC_T(wq_entry, p); - return __wait_on_atomic_t(wq_head, &wq_entry, action, mode); + return __wait_on_atomic_t(wq_head, &wq_entry, action, mode, 0); } EXPORT_SYMBOL(out_of_line_wait_on_atomic_t); +__sched int out_of_line_wait_on_devmap_idle(atomic_t *p, int (*action)(atomic_t *), + unsigned mode) +{ + struct wait_queue_head *wq_head = atomic_t_waitqueue(p); + DEFINE_WAIT_DEVMAP_IDLE(wq_entry, p); + + return __wait_on_atomic_t(wq_head, &wq_entry, action, mode, 1); +} +EXPORT_SYMBOL(out_of_line_wait_on_devmap_idle); + /** * wake_up_atomic_t - Wake up a waiter on a atomic_t * @p: The atomic_t being waited on, a kernel virtual address @@ -235,6 +277,12 @@ void wake_up_atomic_t(atomic_t *p) } EXPORT_SYMBOL(wake_up_atomic_t); +void wake_up_devmap_idle(atomic_t *p) +{ + __wake_up_bit(atomic_t_waitqueue(p), p, WAIT_ATOMIC_T_BIT_NR); +} +EXPORT_SYMBOL(wake_up_devmap_idle); + __sched int bit_wait(struct wait_bit_key *word, int mode) { schedule(); diff --git a/mm/gup.c b/mm/gup.c index 308be897d22a..fd7b2a2e2d19 100644 --- a/mm/gup.c +++ b/mm/gup.c @@ -579,6 +579,41 @@ static int check_vma_flags(struct vm_area_struct *vma, unsigned long gup_flags) return 0; } +static struct inode *do_dax_lock(struct vm_area_struct *vma, + unsigned int foll_flags) +{ + struct file *file; + struct inode *inode; + + if (!(foll_flags & FOLL_GET)) + return NULL; + if (!vma_is_dax(vma)) + return NULL; + file = vma->vm_file; + inode = file_inode(file); + if (inode->i_mode == S_IFCHR) + return NULL; + return inode; +} + +static struct inode *dax_truncate_lock(struct vm_area_struct *vma, + unsigned int foll_flags) +{ + struct inode *inode = do_dax_lock(vma, foll_flags); + + if (!inode) + return NULL; + i_daxdma_lock(inode); + return inode; +} + +static void dax_truncate_unlock(struct inode *inode) +{ + if (!inode) + return; + i_daxdma_unlock(inode); +} + /** * __get_user_pages() - pin user pages in memory * @tsk: task_struct of target task @@ -659,6 +694,7 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, do { struct page *page; + struct inode *inode; unsigned int foll_flags = gup_flags; unsigned int page_increm; @@ -693,7 +729,9 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, if (unlikely(fatal_signal_pending(current))) return i ? i : -ERESTARTSYS; cond_resched(); + inode = dax_truncate_lock(vma, foll_flags); page = follow_page_mask(vma, start, foll_flags, &page_mask); + dax_truncate_unlock(inode); if (!page) { int ret; ret = faultin_page(tsk, vma, start, &foll_flags, commit 67d952314e9989b3b1945c50488f4a0f760264c3 Author: Dan Williams Date: Tue Oct 24 13:41:22 2017 -0700 xfs: wire up dax dma waiting The dax-dma vs truncate collision avoidance involves acquiring the new i_dax_dmasem and validating the no ranges that are to be mapped out of the file are active for dma. If any are found we wait for page idle and retry the scan. The locations where we implement this wait line up with where we currently wait for pnfs layout leases to expire. Since we need both dma to be idle and leases to be broken, and since xfs_break_layouts drops locks, we need to retry the dma busy scan until we can complete one that finds no busy pages. Cc: Jan Kara Cc: Dave Chinner Cc: "Darrick J. Wong" Cc: Ross Zwisler Cc: Christoph Hellwig Signed-off-by: Dan Williams diff --git a/fs/xfs/xfs_file.c b/fs/xfs/xfs_file.c index c6780743f8ec..e3ec46c28c60 100644 --- a/fs/xfs/xfs_file.c +++ b/fs/xfs/xfs_file.c @@ -347,7 +347,7 @@ xfs_file_aio_write_checks( return error; error = xfs_break_layouts(inode, iolock); - if (error) + if (error < 0) return error; /* @@ -762,7 +762,7 @@ xfs_file_fallocate( struct xfs_inode *ip = XFS_I(inode); long error; enum xfs_prealloc_flags flags = 0; - uint iolock = XFS_IOLOCK_EXCL; + uint iolock = XFS_DAXDMA_LOCK_SHARED; loff_t new_size = 0; bool do_file_insert = 0; @@ -771,10 +771,20 @@ xfs_file_fallocate( if (mode & ~XFS_FALLOC_FL_SUPPORTED) return -EOPNOTSUPP; +retry: xfs_ilock(ip, iolock); + dax_wait_dma(inode->i_mapping, offset, len); + + xfs_ilock(ip, XFS_IOLOCK_EXCL); + iolock |= XFS_IOLOCK_EXCL; error = xfs_break_layouts(inode, &iolock); - if (error) + if (error < 0) goto out_unlock; + else if (error > 0 && IS_ENABLED(CONFIG_FS_DAX)) { + xfs_iunlock(ip, iolock); + iolock = XFS_DAXDMA_LOCK_SHARED; + goto retry; + } xfs_ilock(ip, XFS_MMAPLOCK_EXCL); iolock |= XFS_MMAPLOCK_EXCL; diff --git a/fs/xfs/xfs_inode.c b/fs/xfs/xfs_inode.c index 4ec5b7f45401..783f15894b7b 100644 --- a/fs/xfs/xfs_inode.c +++ b/fs/xfs/xfs_inode.c @@ -171,7 +171,14 @@ xfs_ilock_attr_map_shared( * taken in places where we need to invalidate the page cache in a race * free manner (e.g. truncate, hole punch and other extent manipulation * functions). - */ + * + * The XFS_DAXDMA_LOCK_SHARED lock is a CONFIG_FS_DAX special case lock + * for synchronizing truncate vs ongoing DMA. The get_user_pages() path + * will hold this lock exclusively when incrementing page reference + * counts for DMA. Before an extent can be truncated we need to complete + * a validate-idle sweep of all pages in the range while holding this + * lock in shared mode. +*/ void xfs_ilock( xfs_inode_t *ip, @@ -192,6 +199,9 @@ xfs_ilock( (XFS_ILOCK_SHARED | XFS_ILOCK_EXCL)); ASSERT((lock_flags & ~(XFS_LOCK_MASK | XFS_LOCK_SUBCLASS_MASK)) == 0); + if (lock_flags & XFS_DAXDMA_LOCK_SHARED) + i_daxdma_lock_shared(VFS_I(ip)); + if (lock_flags & XFS_IOLOCK_EXCL) { down_write_nested(&VFS_I(ip)->i_rwsem, XFS_IOLOCK_DEP(lock_flags)); @@ -328,6 +338,9 @@ xfs_iunlock( else if (lock_flags & XFS_ILOCK_SHARED) mrunlock_shared(&ip->i_lock); + if (lock_flags & XFS_DAXDMA_LOCK_SHARED) + i_daxdma_unlock_shared(VFS_I(ip)); + trace_xfs_iunlock(ip, lock_flags, _RET_IP_); } diff --git a/fs/xfs/xfs_inode.h b/fs/xfs/xfs_inode.h index 0ee453de239a..0662edf00529 100644 --- a/fs/xfs/xfs_inode.h +++ b/fs/xfs/xfs_inode.h @@ -283,10 +283,12 @@ static inline void xfs_ifunlock(struct xfs_inode *ip) #define XFS_ILOCK_SHARED (1<<3) #define XFS_MMAPLOCK_EXCL (1<<4) #define XFS_MMAPLOCK_SHARED (1<<5) +#define XFS_DAXDMA_LOCK_SHARED (1<<6) #define XFS_LOCK_MASK (XFS_IOLOCK_EXCL | XFS_IOLOCK_SHARED \ | XFS_ILOCK_EXCL | XFS_ILOCK_SHARED \ - | XFS_MMAPLOCK_EXCL | XFS_MMAPLOCK_SHARED) + | XFS_MMAPLOCK_EXCL | XFS_MMAPLOCK_SHARED \ + | XFS_DAXDMA_LOCK_SHARED) #define XFS_LOCK_FLAGS \ { XFS_IOLOCK_EXCL, "IOLOCK_EXCL" }, \ @@ -294,7 +296,8 @@ static inline void xfs_ifunlock(struct xfs_inode *ip) { XFS_ILOCK_EXCL, "ILOCK_EXCL" }, \ { XFS_ILOCK_SHARED, "ILOCK_SHARED" }, \ { XFS_MMAPLOCK_EXCL, "MMAPLOCK_EXCL" }, \ - { XFS_MMAPLOCK_SHARED, "MMAPLOCK_SHARED" } + { XFS_MMAPLOCK_SHARED, "MMAPLOCK_SHARED" }, \ + { XFS_DAXDMA_LOCK_SHARED, "XFS_DAXDMA_LOCK_SHARED" } /* diff --git a/fs/xfs/xfs_ioctl.c b/fs/xfs/xfs_ioctl.c index aa75389be8cf..fd384ea00ede 100644 --- a/fs/xfs/xfs_ioctl.c +++ b/fs/xfs/xfs_ioctl.c @@ -612,7 +612,7 @@ xfs_ioc_space( struct xfs_inode *ip = XFS_I(inode); struct iattr iattr; enum xfs_prealloc_flags flags = 0; - uint iolock = XFS_IOLOCK_EXCL; + uint iolock = XFS_DAXDMA_LOCK_SHARED; int error; /* @@ -637,18 +637,6 @@ xfs_ioc_space( if (filp->f_mode & FMODE_NOCMTIME) flags |= XFS_PREALLOC_INVISIBLE; - error = mnt_want_write_file(filp); - if (error) - return error; - - xfs_ilock(ip, iolock); - error = xfs_break_layouts(inode, &iolock); - if (error) - goto out_unlock; - - xfs_ilock(ip, XFS_MMAPLOCK_EXCL); - iolock |= XFS_MMAPLOCK_EXCL; - switch (bf->l_whence) { case 0: /*SEEK_SET*/ break; @@ -659,10 +647,31 @@ xfs_ioc_space( bf->l_start += XFS_ISIZE(ip); break; default: - error = -EINVAL; + return -EINVAL; + } + + error = mnt_want_write_file(filp); + if (error) + return error; + +retry: + xfs_ilock(ip, iolock); + dax_wait_dma(inode->i_mapping, bf->l_start, bf->l_len); + + xfs_ilock(ip, XFS_IOLOCK_EXCL); + iolock |= XFS_IOLOCK_EXCL; + error = xfs_break_layouts(inode, &iolock); + if (error < 0) goto out_unlock; + else if (error > 0 && IS_ENABLED(CONFIG_FS_DAX)) { + xfs_iunlock(ip, iolock); + iolock = XFS_DAXDMA_LOCK_SHARED; + goto retry; } + xfs_ilock(ip, XFS_MMAPLOCK_EXCL); + iolock |= XFS_MMAPLOCK_EXCL; + /* * length of <= 0 for resv/unresv/zero is invalid. length for * alloc/free is ignored completely and we have no idea what userspace diff --git a/fs/xfs/xfs_pnfs.c b/fs/xfs/xfs_pnfs.c index 4246876df7b7..5f4d46b3cd7f 100644 --- a/fs/xfs/xfs_pnfs.c +++ b/fs/xfs/xfs_pnfs.c @@ -35,18 +35,19 @@ xfs_break_layouts( uint *iolock) { struct xfs_inode *ip = XFS_I(inode); - int error; + int error, did_unlock = 0; ASSERT(xfs_isilocked(ip, XFS_IOLOCK_SHARED|XFS_IOLOCK_EXCL)); while ((error = break_layout(inode, false) == -EWOULDBLOCK)) { xfs_iunlock(ip, *iolock); + did_unlock = 1; error = break_layout(inode, true); *iolock = XFS_IOLOCK_EXCL; xfs_ilock(ip, *iolock); } - return error; + return error < 0 ? error : did_unlock; } /*