From: Goldwyn Rodrigues <rgoldwyn@suse.de>
To: ocfs2-devel@oss.oracle.com
Subject: [Ocfs2-devel] [PATCH 5/5] Fix files when an inode is written in file_fix
Date: Thu, 2 Jun 2016 06:47:24 -0500 [thread overview]
Message-ID: <57501CCC.5080001@suse.de> (raw)
In-Reply-To: <57502602020000F900039C45@prv-mh.provo.novell.com>
On 06/01/2016 11:26 PM, Gang He wrote:
>
>
>
>>>>
>
>>
>> On 06/01/2016 10:06 PM, Gang He wrote:
>>>
>>>
>>>
>>>>>>
>>>
>>>>
>>>> On 05/31/2016 09:05 PM, Gang He wrote:
>>>>> Hello Goldwyn,
>>>>>
>>>>>
>>>>>>>>
>>>>>
>>>>>>
>>>>>> On 05/30/2016 04:45 AM, Gang He wrote:
>>>>>>> Hello Goldwyn,
>>>>>>>
>>>>>>> Please see my comments inline.
>>>>>>>
>>>>>>>
>>>>>>> Thanks
>>>>>>> Gang
>>>>>>>
>>>>>>>
>>>>>>>>>>
>>>>>>>> From: Goldwyn Rodrigues <rgoldwyn@suse.com>
>>>>>>>>
>>>>>>>> Check that the entriy exists and has been filed for check.
>>>>>>>> Also perform some code cleanup
>>>>>>>>
>>>>>>>> Signed-off-by: Goldwyn Rodrigues <rgoldwyn@suse.com>
>>>>>>>> ---
>>>>>>>> fs/ocfs2/filecheck.c | 41 +++++++++++++++++++++++++----------------
>>>>>>>> fs/ocfs2/filecheck.h | 1 +
>>>>>>>> fs/ocfs2/sysfs.c | 2 +-
>>>>>>>> 3 files changed, 27 insertions(+), 17 deletions(-)
>>>>>>>>
>>>>>>>> diff --git a/fs/ocfs2/filecheck.c b/fs/ocfs2/filecheck.c
>>>>>>>> index 006d521..fc6e183 100644
>>>>>>>> --- a/fs/ocfs2/filecheck.c
>>>>>>>> +++ b/fs/ocfs2/filecheck.c
>>>>>>>> @@ -198,22 +198,6 @@ ocfs2_filecheck_handle(struct ocfs2_super *osb,
>>>>>>>> return ret;
>>>>>>>> }
>>>>>>>>
>>>>>>>> -static void
>>>>>>>> -ocfs2_filecheck_handle_entry(struct ocfs2_super *osb,
>>>>>>>> - struct ocfs2_filecheck_entry *entry)
>>>>>>>> -{
>>>>>>>> - if (entry->fe_type == OCFS2_FILECHECK_TYPE_CHK)
>>>>>>>> - entry->fe_status = ocfs2_filecheck_handle(osb,
>>>>>>>> - entry->fe_ino, OCFS2_FI_FLAG_FILECHECK_CHK);
>>>>>>>> - else if (entry->fe_type == OCFS2_FILECHECK_TYPE_FIX)
>>>>>>>> - entry->fe_status = ocfs2_filecheck_handle(osb,
>>>>>>>> - entry->fe_ino, OCFS2_FI_FLAG_FILECHECK_FIX);
>>>>>>>> - else
>>>>>>>> - entry->fe_status = OCFS2_FILECHECK_ERR_UNSUPPORTED;
>>>>>>>> -
>>>>>>>> - ocfs2_filecheck_done_entry(osb, entry);
>>>>>>>> -}
>>>>>>>> -
>>>>>>>> int ocfs2_filecheck_add_inode(struct ocfs2_super *osb,
>>>>>>>> unsigned long ino)
>>>>>>>> {
>>>>>>>> @@ -268,3 +252,28 @@ unlock:
>>>>>>>> ocfs2_filecheck_done_entry(osb, entry);
>>>>>>>> return 0;
>>>>>>>> }
>>>>>>>> +
>>>>>>>> +int ocfs2_filefix_add_inode(struct ocfs2_super *osb,
>>>>>>>> + unsigned long ino)
>>>>>>>> +{
>>>>>>>> + struct ocfs2_filecheck_entry *entry;
>>>>>>>> + int ret = -ENOENT;
>>>>>>>> +
>>>>>>>> + spin_lock(&osb->fc_lock);
>>>>>>>> + list_for_each_entry(entry, &osb->file_check_entries, fe_list)
>>>>>>>> + if (entry->fe_ino == ino) {
>>>>>>>> + entry->fe_type = OCFS2_FILECHECK_TYPE_FIX;
>>>>>>> Gang: It looks that we can not do it directly, why? because the entry
>>>>>> pointer can be freed by the function ocfs2_filecheck_erase_entries().
>>>>>>> We can not use the same entry pointer within two user processes.
>>>>>>> The simple solution is to return -EBUSY error in case there is the same ino
>>>>>> number entry in the list, then the user can try again after the previous
>>>> user
>>>>>> process is returned.
>>>>>>
>>>>>> How? is it not protected under spinlock?
>>>>> Gang: please aware that this spinlock fc_lock is used to protect entry list
>>>> (adding entry/deleting entry), not protect entry itself.
>>>>> The first user process will mark the entry's status to done after the file
>>>> check operation is finished, then the function
>>>> ocfs2_filecheck_erase_entries() will possibly delete this entry from the
>>>> list, to free the entry memory during the second user process is referencing
>>>> on this entry.
>>>>> You know, the spinlock can not protect the file check operation (too long
>>>> time IO operation).
>>>>
>>>> Yes, a possible reason for separating the lists too. The entries will be
>>>> deleted after a check, and the user will not be able to perform a fix on it.
>>> Gang: we can not delete the file check entry after it's operation is done,
>> since we need to keep
>>> them to provide the result history records.
>>>
>>>>
>>>> In any case, if we check on status, we can do away with it. We may
>>>> require filecheck_entry spinlocks later on, but for now it is not required.
>>> Gang: Why we need a spinlock for each filecheck entry? the entry is only
>> occupied by one user process.
>>> we only need to get the lock when adding/deleting the entry from the list,
>> this operation is very short.
>>>
>>>>
>>>>
>>>>>
>>>>>> Anyways, I plan to make a separate list for this so we can do away with
>>>>>> more macros.
>>>>> Gang: you can use two lists, but I think that one list is also OK, keep the
>>>> thing simple.
>>>>> Just return a -EBUSY error when the same inode is on the progress, then the
>>>> user can try again after that file check process returns.
>>>>
>>>> Thanks for the suggestions, I have incorporated that, with the two
>>>> lists, of course.
>>>>
>>>>>
>>>>>>
>>>>>> Besides, any I/O and check operation should be done in a separate
>>>>>> thread/work queue.
>>>>> Gang: current design is no a separated thread is used to run file check
>>>> operation, each user trigger process is used to execute its file check
>>>> operation.
>>>>> Why? first, keep the thing simple, avoid to involve more logic/thread.
>>>> second, if we involved a thread/work queue to run the file check operations,
>>>>> that means the user trigger process will return directly and need not to
>>>> wait for the actual file check operation, there will be a risk that the user
>>>> can
>>>>> not see the result from the result history record (via cat check/fix), since
>>>> the new submits result will make the oldest result records to be released,
>>>>> we have a fixed length list to keep these status records. If we use the user
>>>> trigger process to do the file check operation, the user can surely see the
>>>> result after this user process returns (since this file check operation is
>>>> done in the kernel space).
>>>>>
>>>>
>>>> In the future, how do you plan to extend this? How would you check for
>>>> extent_blocks? Or worse, system files? Would you keep the system waiting
>>>> until all I/O has completed?
>>> Gang: Yes, the trigger user process can wait for this I/O operation, just
>> like a system call.
>>> If we want to check multiple files (inode), we can use a batch to call this
>> interface one by one
>>> (of course, you can use multiple threads/processes), this is why I did not
>> use a work queue/thread
>>> in the kernel module to do this asynchronously, because in the user space,
>> we can do the same thing.
>>> let's keep the kernel module logic simple.
>>
>>
>> If you were planning to keep the process synchronous, why keep multiple
>> entries. Just one would have been enough. This way the check/fix cycle
>> would have a better probability of finding stuff in the cache as well.
> The list be used for file check entry history status, and for supporting to multiple user threads/processes to trigger a check/fix request parallelly.
>
Why do you need history in a synchronous process. The error is received
as soon as the process ends. Besides, in multiple threads each thread
will have his context so you don't need to store in a global location.
Why did you need to use sysfs for this? Why couldn't you use something
else for synchronous processing, say an ioctl()?
--
Goldwyn
next prev parent reply other threads:[~2016-06-02 11:47 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-05-26 3:10 [Ocfs2-devel] [PATCH v2 0/5] ocfs2: sysfs and cleanup Goldwyn Rodrigues
2016-05-26 3:10 ` [Ocfs2-devel] [PATCH 1/5] ocfs2: Provisions for sysfs entries Goldwyn Rodrigues
2016-05-30 7:53 ` Gang He
[not found] ` <574C61E7020000F9000391D6@suse.com>
2016-05-31 12:40 ` Goldwyn Rodrigues
2016-06-01 2:34 ` Gang He
2016-05-26 3:10 ` [Ocfs2-devel] [PATCH 2/5] Use the sysfs interface for creating filecheck files Goldwyn Rodrigues
2016-05-30 9:23 ` Gang He
[not found] ` <574C7704020000F900039256@suse.com>
2016-05-31 12:40 ` Goldwyn Rodrigues
2016-06-01 3:16 ` Gang He
2016-06-02 2:26 ` Goldwyn Rodrigues
2016-06-02 3:28 ` Gang He
2016-05-26 3:10 ` [Ocfs2-devel] [PATCH 3/5] Generate uevents for errors Goldwyn Rodrigues
2016-05-30 9:25 ` Gang He
2016-05-26 3:10 ` [Ocfs2-devel] [PATCH 4/5] ocfs2: Disallow duplicate entries in the list Goldwyn Rodrigues
2016-05-30 9:28 ` Gang He
2016-05-26 3:10 ` [Ocfs2-devel] [PATCH 5/5] Fix files when an inode is written in file_fix Goldwyn Rodrigues
2016-05-30 9:45 ` Gang He
[not found] ` <574C7C2A020000F900039287@suse.com>
2016-05-31 12:40 ` Goldwyn Rodrigues
2016-06-01 2:05 ` Gang He
2016-06-02 2:26 ` Goldwyn Rodrigues
2016-06-02 3:06 ` Gang He
2016-06-02 3:48 ` Goldwyn Rodrigues
2016-06-02 4:26 ` Gang He
2016-06-02 11:47 ` Goldwyn Rodrigues [this message]
2016-06-03 4:45 ` Gang He
[not found] ` <57517BDE020000F90003A02C@suse.com>
2016-06-03 15:33 ` Goldwyn Rodrigues
2016-06-06 1:17 ` Gang He
-- strict thread matches above, loose matches on Subject: below --
2016-05-10 17:52 [Ocfs2-devel] [PATCH 0/5] ocfs2: sysfs and cleanup Goldwyn Rodrigues
2016-05-10 17:52 ` [Ocfs2-devel] [PATCH 5/5] Fix files when an inode is written in file_fix Goldwyn Rodrigues
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=57501CCC.5080001@suse.de \
--to=rgoldwyn@suse.de \
--cc=ocfs2-devel@oss.oracle.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).