Message ID | 20230606124800.1151665-1-agruenba@redhat.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp3372892vqr; Tue, 6 Jun 2023 06:00:04 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7Gfpy/1Ndm+Z2naIcgthJYQhr7VL2k7XNgon4L4KWLhe602uYscghTIgDFZNdTC0VRhXtG X-Received: by 2002:a05:620a:8f17:b0:75b:23a1:368b with SMTP id rh23-20020a05620a8f1700b0075b23a1368bmr1477293qkn.76.1686056404303; Tue, 06 Jun 2023 06:00:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686056404; cv=none; d=google.com; s=arc-20160816; b=IBMEFgDiN8bXWDZpyrDiuerX5QDHxBbLtGMGbItCpiihn48h4NPqRnhXzJZ4yCZVGC r+n4y9D5Ye9q1kAJsB0SySz5ZDRtQV7kQhGvMsuz6w6i6Qw75GuW5iRKCRkdtl0O3ZeE e7YTx0THVkShymDW7z4lFCVNDUjmb7YfK+KZZHJBjzpFz9OznB+xookZDLDy1Hal1zip U4dZyrn6Clz2OXf4JdcNgIE7v+ZBuNdII8zWV2Srg0Yq70NfoINtJgPbtY+VxEHYfwiB yOYsDKbsH8dpYwtcIMF+FGQdD8AsoroyHQpmwGc4ZTn30kBz5j12+t6Ej6kT3EBehiUw RHNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=vBuXSuSPdimIWw9Er+nDNajoR4GFZLeXMeLl/oUym/M=; b=hsFEzc6PUBLmUndLbcThEpQqVMCn+d/EdHiEs3i29I23lejq2NYpOlekcauqnidB5H bC5u434VPVljkBmT2LjM3SKbooqHE6NkLYBeIVH/FO52siLKEB/TS9UhwaMcPFJbQ3E8 CRWnU3dGBFzWsXfRh4pT12oFzgHYBmXIyaM+xJI0G/uQfkcLW/YB6WEKuAmjvhU2Vbfp 1BJlrR5wWVxH16ua1E2fZ0g61ZIYpQ0Edv9LaPTsYx/F8qO760DnZoOdZaF+7v24aEp9 0Yk2fTcyzDElGYFSamQ9uyH1U5n7DAIJR21EiK0y42W6WfmgH/D2oWkrl9fxkzgOjrfi EfnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Q0vQU2zi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d8-20020a37c408000000b00757799b6e23si5676012qki.405.2023.06.06.05.59.49; Tue, 06 Jun 2023 06:00:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Q0vQU2zi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237722AbjFFMuF (ORCPT <rfc822;xxoosimple@gmail.com> + 99 others); Tue, 6 Jun 2023 08:50:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237824AbjFFMty (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 6 Jun 2023 08:49:54 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 01F561739 for <linux-kernel@vger.kernel.org>; Tue, 6 Jun 2023 05:48:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1686055683; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=vBuXSuSPdimIWw9Er+nDNajoR4GFZLeXMeLl/oUym/M=; b=Q0vQU2zitcgNR4omm2ijkG24n3xpzAiFDGrLYrz43d02G1r2NLlIbF308s8QOoStGTfCCs 6Xu6Rwocrp0LGxXunzegsQrObcCpNm7R9bhMSF9sIb0lz41F56I0HbAb9xrAu6LsSnOoCd rM3cYTN2VJPvedrUyp4ftLtkUm0oaz4= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-397-YkT4_XVkMEuDXihv90vsXw-1; Tue, 06 Jun 2023 08:48:02 -0400 X-MC-Unique: YkT4_XVkMEuDXihv90vsXw-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id B3A213C0F189; Tue, 6 Jun 2023 12:48:01 +0000 (UTC) Received: from pasta.redhat.com (unknown [10.45.225.216]) by smtp.corp.redhat.com (Postfix) with ESMTP id E2475492B00; Tue, 6 Jun 2023 12:48:00 +0000 (UTC) From: Andreas Gruenbacher <agruenba@redhat.com> To: Linus Torvalds <torvalds@linux-foundation.org> Cc: Andreas Gruenbacher <agruenba@redhat.com>, cluster-devel@redhat.com, linux-kernel@vger.kernel.org Subject: [GIT PULL] gfs2 fix Date: Tue, 6 Jun 2023 14:48:00 +0200 Message-Id: <20230606124800.1151665-1-agruenba@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1767958280375955847?= X-GMAIL-MSGID: =?utf-8?q?1767958280375955847?= |
Series |
[GIT,PULL] gfs2 fix
|
|
Pull-request
git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2.git tags/gfs2-v6.4-rc4-fixMessage
Andreas Gruenbacher
June 6, 2023, 12:48 p.m. UTC
Hi Linus, please consider pulling the following fix. Thanks, Andreas The following changes since commit 48b1320a674e1ff5de2fad8606bee38f724594dc: Merge tag 'for-6.4-rc4-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux (2023-05-30 17:23:50 -0400) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2.git tags/gfs2-v6.4-rc4-fix for you to fetch changes up to fa58cc888d67e640e354d8b3ceef877ea167b0cf: gfs2: Don't get stuck writing page onto itself under direct I/O (2023-06-01 14:55:43 +0200) ---------------------------------------------------------------- gfs2 fix - Don't get stuck writing page onto itself under direct I/O. ---------------------------------------------------------------- Andreas Gruenbacher (1): gfs2: Don't get stuck writing page onto itself under direct I/O fs/gfs2/file.c | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-)
Comments
On Tue, Jun 6, 2023 at 5:48 AM Andreas Gruenbacher <agruenba@redhat.com> wrote: > > - Don't get stuck writing page onto itself under direct I/O. Btw, is there a test for this DIO case? We've had the deadlock issue on t page lock (or for inode locks or whatever) for normal IO when faulting in the same page that is written to, and we have as pattern for solving that and I think there are filesystem tests that trigger this. But the DIO pattern is a bit different, with the whole "invalidate page cache: issue, and the fact that you send this patch now (rather than years ago) makes me wonder about test coverage for this all? Linus
The pull request you sent on Tue, 6 Jun 2023 14:48:00 +0200:
> git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2.git tags/gfs2-v6.4-rc4-fix
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0bdd0f0bf17c5aac16f348ee4b1ebf23d1ec1649
Thank you!
On Tue, Jun 6, 2023 at 2:55 PM Linus Torvalds <torvalds@linux-foundation.org> wrote: > On Tue, Jun 6, 2023 at 5:48 AM Andreas Gruenbacher <agruenba@redhat.com> wrote: > > > > - Don't get stuck writing page onto itself under direct I/O. > > Btw, is there a test for this DIO case? The previous test case I wrote for these kinds of page faults is: "generic: Test page faults during read and write" https://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git/commit/?id=d3cbdabff I've added a check for this specific case, but this change hasn't been posted/merged yet: "generic/728: Add mmap + DIO write test" https://gitlab.com/agruenba/xfstests/-/commit/8c37de03 > We've had the deadlock issue on t page lock (or for inode locks or > whatever) for normal IO when faulting in the same page that is written > to, and we have as pattern for solving that and I think there are > filesystem tests that trigger this. > > But the DIO pattern is a bit different, with the whole "invalidate > page cache: issue, and the fact that you send this patch now (rather > than years ago) makes me wonder about test coverage for this all? Yes, this case wasn't covered so far. The other page fault issues are covered since 2021, and were fixed in gfs2 back then. Thanks, Andreas