From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8162C433F5 for ; Fri, 28 Jan 2022 01:34:37 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 420BB6B009F; Thu, 27 Jan 2022 20:34:37 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 3A8F66B00A1; Thu, 27 Jan 2022 20:34:37 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 24A0A6B00A2; Thu, 27 Jan 2022 20:34:37 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0212.hostedemail.com [216.40.44.212]) by kanga.kvack.org (Postfix) with ESMTP id 131F66B009F for ; Thu, 27 Jan 2022 20:34:37 -0500 (EST) Received: from smtpin17.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id C1C1295284 for ; Fri, 28 Jan 2022 01:34:36 +0000 (UTC) X-FDA: 79077976152.17.3C6F29C Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf07.hostedemail.com (Postfix) with ESMTP id E6CF940003 for ; Fri, 28 Jan 2022 01:34:35 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9335961D9F; Fri, 28 Jan 2022 01:34:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 54A24C340E4; Fri, 28 Jan 2022 01:34:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643333674; bh=syJ8YNq0jFqssCN+Fpn6CejIFER0XxHyJW+5cZh7qQA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=r4MmK2L91UnUY3Ju+lob6pGYrfuC4tFQze7/UdZcwtg0my1bI0HYZ/EGzcR2/0eYh 5qWQkXkz6GQ99yyiTKsnnZ4hM95RpS6f7bdJAM5P56admAP3hc/ZCtXKNCnRVkrgES v2zuReXf7omP1BD/F2BPe0mg+8tbNoZzsZhdyhFKiYcIFiKTzLCcaIL+zbZB+jgKI2 HaKelY2L0Vg6ndyDgX/aggsEHmYplzWVSHFk3KYEO4hj0B99GHfDlJ8bPCc2gICQtz XRdKz8lPe2Sew/3rSqRIVIUhmZZ9ob0Va5c0yw/atKn6Dw4IaoROTNoyJVls08WLFV 3jQ5xdJOfRU/w== Date: Thu, 27 Jan 2022 17:34:31 -0800 From: Jaegeuk Kim To: NeilBrown Cc: Andrew Morton , Chao Yu , Jeff Layton , Ilya Dryomov , Miklos Szeredi , Trond Myklebust , Anna Schumaker , Ryusuke Konishi , "Darrick J. Wong" , Philipp Reisner , Lars Ellenberg , Paolo Valente , Jens Axboe , linux-mm@kvack.org, linux-nilfs@vger.kernel.org, linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-ext4@vger.kernel.org, ceph-devel@vger.kernel.org, drbd-dev@lists.linbit.com, linux-kernel@vger.kernel.org, linux-block@vger.kernel.org Subject: Re: [PATCH 3/9] f2fs: change retry waiting for f2fs_write_single_data_page() Message-ID: References: <164325106958.29787.4865219843242892726.stgit@noble.brown> <164325158956.29787.7016948342209980097.stgit@noble.brown> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <164325158956.29787.7016948342209980097.stgit@noble.brown> X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: E6CF940003 X-Rspam-User: nil Authentication-Results: imf07.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=r4MmK2L9; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf07.hostedemail.com: domain of jaegeuk@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=jaegeuk@kernel.org X-Stat-Signature: 7cqgkqa1gowkzot3z96337e79pt5jcni X-HE-Tag: 1643333675-587138 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 01/27, NeilBrown wrote: > f2fs_write_single_data_page() can return -EAGAIN if it cannot get > the cp_rwsem lock - it holds a page lock and so cannot wait for it. > > Some code which calls f2fs_write_single_data_page() use > congestion_wait() and then tries again. congestion_wait() doesn't do > anything useful as congestion is no longer tracked. So this is just a > simple sleep. > > A better approach is it wait until the cp_rwsem lock can be taken - then > try again. There is certainly no point trying again *before* the lock > can be taken. > > Signed-off-by: NeilBrown > --- > fs/f2fs/compress.c | 6 +++--- > fs/f2fs/data.c | 9 ++++++--- > 2 files changed, 9 insertions(+), 6 deletions(-) > > diff --git a/fs/f2fs/compress.c b/fs/f2fs/compress.c > index d0c3aeba5945..58ff7f4b296c 100644 > --- a/fs/f2fs/compress.c > +++ b/fs/f2fs/compress.c > @@ -1505,9 +1505,9 @@ static int f2fs_write_raw_pages(struct compress_ctx *cc, > if (IS_NOQUOTA(cc->inode)) > return 0; > ret = 0; > - cond_resched(); > - congestion_wait(BLK_RW_ASYNC, > - DEFAULT_IO_TIMEOUT); > + /* Wait until we can get the lock, then try again. */ > + f2fs_lock_op(F2FS_I_SB(cc->inode)); > + f2fs_unlock_op(F2FS_I_SB(cc->inode)); Since checkpoint uses down_write(cp_rwsem), I'm not sure the write path is safe and needs to wait for checkpoint. Can we just do io_schedule_timeout()? > goto retry_write; > } > return ret; > diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c > index 8c417864c66a..1d2341163e2c 100644 > --- a/fs/f2fs/data.c > +++ b/fs/f2fs/data.c > @@ -3047,9 +3047,12 @@ static int f2fs_write_cache_pages(struct address_space *mapping, > } else if (ret == -EAGAIN) { > ret = 0; > if (wbc->sync_mode == WB_SYNC_ALL) { > - cond_resched(); > - congestion_wait(BLK_RW_ASYNC, > - DEFAULT_IO_TIMEOUT); > + /* Wait until we can get the > + * lock, then try again. > + */ > + f2fs_lock_op(F2FS_I_SB(mapping->host)); > + f2fs_unlock_op(F2FS_I_SB(mapping->host)); > + > goto retry_write; > } > goto next; >