Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5909659ybi; Wed, 31 Jul 2019 05:18:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxK/Ydko1Y5B9V0r4afj9EOOAuIGIYmX0K7GvXdVjsPG8ezUP7FOpxGLlDUf3c5OOdl4Jk/ X-Received: by 2002:a17:90a:338b:: with SMTP id n11mr2684621pjb.21.1564575513317; Wed, 31 Jul 2019 05:18:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564575513; cv=none; d=google.com; s=arc-20160816; b=UzK7WROpqManj4hOQrlyDTa85VZ4r9p1inqWibuQv0n75PFloKW9o7YeRNVN2mwMA9 6/4Q+g55B43aDUGu8WcdhtuEbXxGml1QGIt92/7H1ENCohL+Tcpfz6vlDpCu81jDbw25 t7JeUy0omARo3JYMW6Kfq+KIVnJb7/zJP8W2GGiuFb4xNnY0pUzjrBpoMkc3BywUcaHn UwzYj0t4+643ii51Ix43stQ3GP//XejXND2s5l/hg6cmJDAAhW6gCQJOVeQw5DGjjGpH 9j58FBTbx5rpv5wAs471YHEImdQaaVrsC1kylBi2L633MZi1nCEcRGs/f+gJXsKprVGq I3Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=m62lC0bs6yEsLquVEAtHyAkWERHBFGBLWyioivzoCO4=; b=Fd3KRojLX1ppnCxiM1o5sc+V77yV0YJstfgFTyEhnryUJ+5LLijmQjfn9w/3kiKRce bjHi+Wguy0v+b/U3XPtKGLxEEoXRjW+rF2j/ftn002Bufxo+ouFxEJ9+LuncNAf06qZ6 oz75fPot1UtVGgjQd/o6hOI9iz/a0HyDLYfl89MABs4WNLN058F2N6QlUvYqxe2CHaRw 6NyV6mQh74DJPY7MdjxpliBCRnJrdH14NrEeXx6MhJRmEFU9mqjT73sMXYbPPcKHLw+H fibL47KTUcOutvLwHpxhBAzl17wJaHPtZqWTkNBDyNnJG1eG3YZDulw8CAbNZvvedEpE yfUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y8si34086233pgk.594.2019.07.31.05.18.18; Wed, 31 Jul 2019 05:18:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387765AbfGaKeS (ORCPT + 99 others); Wed, 31 Jul 2019 06:34:18 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:41742 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726666AbfGaKeS (ORCPT ); Wed, 31 Jul 2019 06:34:18 -0400 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id D53D883A38C8AFE22C2B; Wed, 31 Jul 2019 18:34:15 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.203) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 31 Jul 2019 18:34:12 +0800 Subject: Re: [f2fs-dev] [PATCH] f2fs: Fix indefinite loop in f2fs_gc() To: Sahitya Tummala CC: Chao Yu , Jaegeuk Kim , , References: <1564377626-12898-1-git-send-email-stummala@codeaurora.org> <20190730043630.GG8289@codeaurora.org> <609a502b-1e7f-c9b2-e864-421ffeda298b@huawei.com> <20190731034159.GH8289@codeaurora.org> From: Chao Yu Message-ID: <7288dcd4-b168-7656-d1af-7e2cafa4f720@huawei.com> Date: Wed, 31 Jul 2019 18:34:12 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20190731034159.GH8289@codeaurora.org> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Sahitya, On 2019/7/31 11:41, Sahitya Tummala wrote: > Hi Chao, > > On Tue, Jul 30, 2019 at 08:35:46PM +0800, Chao Yu wrote: >> Hi Sahitya, >> >> On 2019/7/30 12:36, Sahitya Tummala wrote: >>> Hi Chao, >>> >>> On Tue, Jul 30, 2019 at 12:00:45AM +0800, Chao Yu wrote: >>>> Hi Sahitya, >>>> >>>> On 2019-7-29 13:20, Sahitya Tummala wrote: >>>>> Policy - foreground GC, LFS mode and greedy GC mode. >>>>> >>>>> Under this policy, f2fs_gc() loops forever to GC as it doesn't have >>>>> enough free segements to proceed and thus it keeps calling gc_more >>>>> for the same victim segment. This can happen if the selected victim >>>>> segment could not be GC'd due to failed blkaddr validity check i.e. >>>>> is_alive() returns false for the blocks set in current validity map. >>>>> >>>>> Fix this by not resetting the sbi->cur_victim_sec to NULL_SEGNO, when >>>>> the segment selected could not be GC'd. This helps to select another >>>>> segment for GC and thus helps to proceed forward with GC. >>>>> >>>>> Signed-off-by: Sahitya Tummala >>>>> --- >>>>> fs/f2fs/gc.c | 2 +- >>>>> 1 file changed, 1 insertion(+), 1 deletion(-) >>>>> >>>>> diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c >>>>> index 8974672..7bbcc4a 100644 >>>>> --- a/fs/f2fs/gc.c >>>>> +++ b/fs/f2fs/gc.c >>>>> @@ -1303,7 +1303,7 @@ int f2fs_gc(struct f2fs_sb_info *sbi, bool sync, >>>>> round++; >>>>> } >>>>> >>>>> - if (gc_type == FG_GC) >>>>> + if (gc_type == FG_GC && seg_freed) >>>>> sbi->cur_victim_sec = NULL_SEGNO; >>>> >>>> In some cases, we may remain last victim in sbi->cur_victim_sec, and jump out of >>>> GC cycle, then SSR can skip the last victim due to sec_usage_check()... >>>> >>> >>> I see. I have a few questions on how to fix this issue. Please share your >>> comments. >>> >>> 1. Do you think the scenario described is valid? It happens rarely, not very >> >> IIRC, we suffered endless gc loop due to there is valid block belong to an >> opened atomic write file. (because we will skip directly once we hit atomic file) >> >> For your case, I'm not sure that would happen, did you look into is_alive(), why >> will it fail? block address not match? If so, it looks like summary info and >> dnode block and nat entry are inconsistent. > > Yes, from the ramdumps, I could see that block address is not matching and > hence, is_alive() could fail in the issue scenario. Have you observed any such > cases before? What could be the reason for this mismatch? Alright, I didn't suffer such case before... I don't know, too few clues to find the root cause. I guess maybe: - random data caused by emmc/ufs firmware bugs - bit-flip or memory overflow - f2fs bugs So, for the solution, I suggest to detect such inconsistency, and tag in somewhere to just get rid of selecting the corrupted section. BTW, do you try fsck on that image? what's the result? Thanks, > > Thanks, > >> >>> easy to reproduce. From the dumps, I see that only block is set as valid in >>> the sentry->cur_valid_map for which I see that summary block check is_alive() >>> could return false. As only one block is set as valid, chances are there it >>> can be always selected as the victim by get_victim_by_default() under FG_GC. >>> >>> 2. What are the possible scenarios where summary block check is_alive() could >>> fail for a segment? >> >> I guess, maybe after check_valid_map(), the block is been truncated before >> is_alive(). If so the victim should be prefree directly instead of being >> selected again... >> >>> >>> 3. How does GC handle such segments? >> >> I think that's not a normal case, or I'm missing something. >> >> Thanks, >> >>> >>> Thanks, >>> >>>> Thanks, >>>> >>>>> >>>>> if (sync) >>>>> >>> >