From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19F61C49EA2 for ; Tue, 15 Jun 2021 09:18:20 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id ACA7361245 for ; Tue, 15 Jun 2021 09:18:19 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org ACA7361245 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=suse.cz Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id EA4EA6B0036; Tue, 15 Jun 2021 05:18:17 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D28226B006E; Tue, 15 Jun 2021 05:18:17 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A3BEC6B0073; Tue, 15 Jun 2021 05:18:17 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0046.hostedemail.com [216.40.44.46]) by kanga.kvack.org (Postfix) with ESMTP id 59B426B0070 for ; Tue, 15 Jun 2021 05:18:17 -0400 (EDT) Received: from smtpin33.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id E9F0DB7BF for ; Tue, 15 Jun 2021 09:18:16 +0000 (UTC) X-FDA: 78255406992.33.23B7315 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by imf03.hostedemail.com (Postfix) with ESMTP id DFE1CC005A20 for ; Tue, 15 Jun 2021 09:18:06 +0000 (UTC) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 0B0F4219C1; Tue, 15 Jun 2021 09:18:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1623748695; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Ve/8VdV5ATCd8gDlWB7j+8DY7mnfOpAFlUgroZwDEto=; b=pEvfs+MIdWGiL+79/LBEcUwyB/vGR9T8fYilFMpzFILeKheCjSOdm7S5Ui148U1KoQoQSy 3T/4yyzdeFSRyZPYoqzzSdelLmgiENiW8IdiyNqDxWQrPyvdeYH/zxgq65AnECabWZEs0m Af2AoV2NiFrKRGYikCTbpuHeUChdhCo= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1623748695; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Ve/8VdV5ATCd8gDlWB7j+8DY7mnfOpAFlUgroZwDEto=; b=ZMzjwv+y2ToAmcAxn3/BkX9H6OfYOU63RLwcSgZ661rESH7ekChXILZ5Zb+pJ62mhbgRpM PY0tCz+eWLSO9rAg== Received: from quack2.suse.cz (unknown [10.100.200.198]) by relay2.suse.de (Postfix) with ESMTP id 58572A3B8A; Tue, 15 Jun 2021 09:18:14 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 20C051F2C88; Tue, 15 Jun 2021 11:18:14 +0200 (CEST) From: Jan Kara To: Cc: Christoph Hellwig , Dave Chinner , ceph-devel@vger.kernel.org, Chao Yu , Damien Le Moal , "Darrick J. Wong" , Jaegeuk Kim , Jeff Layton , Johannes Thumshirn , linux-cifs@vger.kernel.org, , linux-f2fs-devel@lists.sourceforge.net, , , Miklos Szeredi , Steve French , Ted Tso , Matthew Wilcox , Jan Kara Subject: [PATCH 0/14 v8] fs: Hole punch vs page cache filling races Date: Tue, 15 Jun 2021 11:17:50 +0200 Message-Id: <20210615090844.6045-1-jack@suse.cz> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=4970; h=from:subject:message-id; bh=/sZ++c9xXAJeTuglXbv8ruz7LbfqLjU56wvnbCZ/6L0=; b=owEBbQGS/pANAwAIAZydqgc/ZEDZAcsmYgBgyHAdwkkXwSe7Dkt5sFq/HRSB1n3MRmc0+2hDWMSQ DQ6tVSOJATMEAAEIAB0WIQSrWdEr1p4yirVVKBycnaoHP2RA2QUCYMhwHQAKCRCcnaoHP2RA2cgjB/ 92jqyXQZM9KaCgyXyl8ApDRJrJsxEZuAA1O2qua0wRVhnMBEiAhpMUKJG7cboL5Nvr1cNenxVTalp3 /dq1p168pS/8bkPlnsaldwKfpCAZq5fC8QdNz+/u5oK9U+i32NVPHfSZd3cQDPDdzLEovoPq4jaU9r 0ilefBWCXh5B317cK5JYIrG1okBRWTncncXjrIqYCqoK+EMpnPQrP7FiQIvc8HbrRPY/eI9BqGh4DF JjIIOvf58NezRRf3o8yXPHcrOCwdA6GZB5D5aFM+z2LttELmYw5W4WCMbwcDzhnSqMJTkJHOezSm70 mE7r1Fq3rNj/RFLT+IXZh+mdYlIgsY X-Developer-Key: i=jack@suse.cz; a=openpgp; fpr=93C6099A142276A28BBE35D815BC833443038D8C Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=pEvfs+MI; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=ZMzjwv+y; dmarc=none; spf=pass (imf03.hostedemail.com: domain of jack@suse.cz designates 195.135.220.28 as permitted sender) smtp.mailfrom=jack@suse.cz X-Stat-Signature: nkt5a5ndei37ebhry4yy1jyw9ejjsscm X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: DFE1CC005A20 X-HE-Tag: 1623748686-751787 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hello, here is another version of my patches to address races between hole punch= ing and page cache filling functions for ext4 and other filesystems. The only significant change since last time is simplification in xfs_isilocked() suggested by Dave Chinner. So that needs final review and I'd also like t= o have another pair of eyes on the mm changes in patch 3/14. Otherwise I th= ink the series is ready - Darrick agreed to take it through his tree. Out of all filesystem supporting hole punching, only GFS2 and OCFS2 remai= n unresolved. GFS2 people are working on their own solution (cluster lockin= g is involved), OCFS2 has even bigger issues (maintainers informed, looking in= to it). Once this series lands, I'd like to actually make sure all calls to truncate_inode_pages() happen under mapping->invalidate_lock, add the ass= ert and then we can also get rid of i_size checks in some places (truncate ca= n use the same serialization scheme as hole punch). But that step is mostly a cleanup so I'd like to get these functional fixes in first. Note that the first patch of the series is already in mm tree but I'm submitting it here so that the series applies to Linus' tree cleanly. Changes since v7: * Rebased on top of 5.13-rc6 * Added some reviewed-by tags * Simplified xfs_isilocked() changes as Dave Chinner suggested * Minor documentation formulation improvements Changes since v6: * Added some reviewed-by tags * Added wrapper for taking invalidate_lock similar to inode_lock * Renamed wrappers for taking invalidate_lock for two inodes * Added xfs patch to make xfs_isilocked() work better even without lockde= p * Some minor documentation fixes Changes since v5: * Added some reviewed-by tags * Added functions for locking two mappings and using them from XFS where = needed * Some minor code style & comment fixes Changes since v4: * Rebased onto 5.13-rc1 * Removed shmfs conversion patches * Fixed up zonefs changelog * Fixed up XFS comments * Added patch fixing up definition of file_operations in Documentation/vf= s/ * Updated documentation and comments to explain invalidate_lock is used a= lso to prevent changes through memory mappings to existing pages for some V= FS operations. Changes since v3: * Renamed and moved lock to struct address_space * Added conversions of tmpfs, ceph, cifs, fuse, f2fs * Fixed error handling path in filemap_read() * Removed .page_mkwrite() cleanup from the series for now Changes since v2: * Added documentation and comments regarding lock ordering and how the lo= ck is supposed to be used * Added conversions of ext2, xfs, zonefs * Added patch removing i_mapping_sem protection from .page_mkwrite handle= rs Changes since v1: * Moved to using inode->i_mapping_sem instead of aops handler to acquire appropriate lock --- Motivation: Amir has reported [1] a that ext4 has a potential issues when reads can r= ace with hole punching possibly exposing stale data from freed blocks or even corrupting filesystem when stale mapping data gets used for writeout. The problem is that during hole punching, new page cache pages can get instan= tiated and block mapping from the looked up in a punched range after truncate_inode_pages() has run but before the filesystem removes blocks f= rom the file. In principle any filesystem implementing hole punching thus nee= ds to implement a mechanism to block instantiating page cache pages during hole punching to avoid this race. This is further complicated by the fact that= there are multiple places that can instantiate pages in page cache. We can hav= e regular read(2) or page fault doing this but fadvise(2) or madvise(2) can= also result in reading in page cache pages through force_page_cache_readahead(= ). There are couple of ways how to fix this. First way (currently implemente= d by XFS) is to protect read(2) and *advise(2) calls with i_rwsem so that they= are serialized with hole punching. This is easy to do but as a result all rea= ds would then be serialized with writes and thus mixed read-write workloads = suffer heavily on ext4. Thus this series introduces inode->i_mapping_sem and use= s it when creating new pages in the page cache and looking up their correspond= ing block mapping. We also replace EXT4_I(inode)->i_mmap_sem with this new rw= sem which provides necessary serialization with hole punching for ext4. Honza [1] https://lore.kernel.org/linux-fsdevel/CAOQ4uxjQNmxqmtA_VbYW0Su9rKRk2z= obJmahcyeaEVOFKVQ5dw@mail.gmail.com/ Previous versions: Link: https://lore.kernel.org/linux-fsdevel/20210208163918.7871-1-jack@su= se.cz/ Link: https://lore.kernel.org/r/20210413105205.3093-1-jack@suse.cz Link: https://lore.kernel.org/r/20210423171010.12-1-jack@suse.cz Link: https://lore.kernel.org/r/20210512101639.22278-1-jack@suse.cz Link: https://lore.kernel.org/r/20210525125652.20457-1-jack@suse.cz Link: https://lore.kernel.org/r/20210607144631.8717-1-jack@suse.cz