Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp4076199ybh; Tue, 6 Aug 2019 06:01:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqz5B6hbSOd1louTQUU5xUPP2/bmNdzrX1zNXKSstLTRvdF9A0gtBbiCiBPZYzVBjkU3FaAU X-Received: by 2002:a63:4e05:: with SMTP id c5mr389450pgb.82.1565096490427; Tue, 06 Aug 2019 06:01:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565096490; cv=none; d=google.com; s=arc-20160816; b=epn9Y3v9wxrbrzWSg2OPj4k1PDiUMZ8lDM3gDfcKwNGrce1vjCc6BGk8/ohtsYjER5 E5F7rzOLcVSjvnIUewPWF2FjHG9sdCCHhCrODvpgcePeq4/JF8qorhZI94uXXYuf1fs9 3gx8KIhbDaCYF5EUtXUyiwPjuXLTEMz+gZEUfejwy8I8iPpN5MHC6f/GJolH1fA3RF6a dhTc4duSIpBbxpQMlrfa5FTxGZg1TazO2KXNpiBSu2hGvXbH8Bp8R/2N6U8G9HafMNmZ 3rPerUjSYgOTKpwmnB6cPN4nyVSgYlmPqWqrGsVC6iWfodIf+4MFidhrubUeQ3o947bG dBcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:openpgp:from:references:cc:to:subject; bh=eOLSPBkEfAET1qFt2864Npu4SGLEIXrDPji9f4egmU4=; b=HxNu/tzLQYfrccvY+Mp0G3JiMSjJon75rwTiLm353z8mNhONUZYtFUNuHiBbBfYE+b MFazfb0dPpG7Zb3yk//LCN+GsQIIOl4liEFmRhnYZ429t/zvJ2qkGFnQq7Mfn5/exQfU LMxy+4t4ZzGUWAABghHtbipad31i7QE0abTbCt5VXXbQlW5ByO5sBbcdR/v/+TaajexE wgE8O32grYlYb7TNbCBjtuqwCJVx+y+1iVcmANjsbtqFIUl6EThkcrWUDIoYLfbuNYRl TjcuvRYMNY615QTOzEY8VFGzxD4fnG0AvGBUQ+5KhZBv7Ds8OPxdbzQGRYZGvjlpqDA+ tV/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t4si45533219plq.93.2019.08.06.06.01.12; Tue, 06 Aug 2019 06:01:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731450AbfHFM7X (ORCPT + 99 others); Tue, 6 Aug 2019 08:59:23 -0400 Received: from mx2.suse.de ([195.135.220.15]:54038 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729898AbfHFM7X (ORCPT ); Tue, 6 Aug 2019 08:59:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 0C6EFAC8C; Tue, 6 Aug 2019 12:59:21 +0000 (UTC) Subject: Re: [PATCH v2] bcache: fix deadlock in bcache_allocator To: Andrea Righi Cc: Kent Overstreet , linux-bcache@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190806091801.GC11184@xps-13> From: Coly Li Openpgp: preference=signencrypt Organization: SUSE Labs Message-ID: <29c73faa-4829-f791-b714-b37159f5b956@suse.de> Date: Tue, 6 Aug 2019 20:59:16 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190806091801.GC11184@xps-13> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/8/6 5:18 下午, Andrea Righi wrote: > bcache_allocator() can call the following: > > bch_allocator_thread() > -> bch_prio_write() > -> bch_bucket_alloc() > -> wait on &ca->set->bucket_wait > > But the wake up event on bucket_wait is supposed to come from > bch_allocator_thread() itself => deadlock: > > [ 1158.490744] INFO: task bcache_allocato:15861 blocked for more than 10 seconds. > [ 1158.495929] Not tainted 5.3.0-050300rc3-generic #201908042232 > [ 1158.500653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. > [ 1158.504413] bcache_allocato D 0 15861 2 0x80004000 > [ 1158.504419] Call Trace: > [ 1158.504429] __schedule+0x2a8/0x670 > [ 1158.504432] schedule+0x2d/0x90 > [ 1158.504448] bch_bucket_alloc+0xe5/0x370 [bcache] > [ 1158.504453] ? wait_woken+0x80/0x80 > [ 1158.504466] bch_prio_write+0x1dc/0x390 [bcache] > [ 1158.504476] bch_allocator_thread+0x233/0x490 [bcache] > [ 1158.504491] kthread+0x121/0x140 > [ 1158.504503] ? invalidate_buckets+0x890/0x890 [bcache] > [ 1158.504506] ? kthread_park+0xb0/0xb0 > [ 1158.504510] ret_from_fork+0x35/0x40 > > Fix by making the call to bch_prio_write() non-blocking, so that > bch_allocator_thread() never waits on itself. > > Moreover, make sure to wake up the garbage collector thread when > bch_prio_write() is failing to allocate buckets. > > BugLink: https://bugs.launchpad.net/bugs/1784665 > BugLink: https://bugs.launchpad.net/bugs/1796292 > Signed-off-by: Andrea Righi At this moment I am not able to find a better solution, so I take this patch in my for-test. Thank you. And I hope you may continue to maintain this change if people report problem (I mean if) in future. Coly Li > --- > Changes in v2: > - prevent retry_invalidate busy loop in bch_allocator_thread() > > drivers/md/bcache/alloc.c | 5 ++++- > drivers/md/bcache/bcache.h | 2 +- > drivers/md/bcache/super.c | 13 +++++++++---- > 3 files changed, 14 insertions(+), 6 deletions(-) > > diff --git a/drivers/md/bcache/alloc.c b/drivers/md/bcache/alloc.c > index 6f776823b9ba..a1df0d95151c 100644 > --- a/drivers/md/bcache/alloc.c > +++ b/drivers/md/bcache/alloc.c > @@ -377,7 +377,10 @@ static int bch_allocator_thread(void *arg) > if (!fifo_full(&ca->free_inc)) > goto retry_invalidate; > > - bch_prio_write(ca); > + if (bch_prio_write(ca, false) < 0) { > + ca->invalidate_needs_gc = 1; > + wake_up_gc(ca->set); > + } > } > } > out: > diff --git a/drivers/md/bcache/bcache.h b/drivers/md/bcache/bcache.h > index 013e35a9e317..deb924e1d790 100644 > --- a/drivers/md/bcache/bcache.h > +++ b/drivers/md/bcache/bcache.h > @@ -977,7 +977,7 @@ bool bch_cached_dev_error(struct cached_dev *dc); > __printf(2, 3) > bool bch_cache_set_error(struct cache_set *c, const char *fmt, ...); > > -void bch_prio_write(struct cache *ca); > +int bch_prio_write(struct cache *ca, bool wait); > void bch_write_bdev_super(struct cached_dev *dc, struct closure *parent); > > extern struct workqueue_struct *bcache_wq; > diff --git a/drivers/md/bcache/super.c b/drivers/md/bcache/super.c > index 20ed838e9413..716ea272fb55 100644 > --- a/drivers/md/bcache/super.c > +++ b/drivers/md/bcache/super.c > @@ -529,7 +529,7 @@ static void prio_io(struct cache *ca, uint64_t bucket, int op, > closure_sync(cl); > } > > -void bch_prio_write(struct cache *ca) > +int bch_prio_write(struct cache *ca, bool wait) > { > int i; > struct bucket *b; > @@ -564,8 +564,12 @@ void bch_prio_write(struct cache *ca) > p->magic = pset_magic(&ca->sb); > p->csum = bch_crc64(&p->magic, bucket_bytes(ca) - 8); > > - bucket = bch_bucket_alloc(ca, RESERVE_PRIO, true); > - BUG_ON(bucket == -1); > + bucket = bch_bucket_alloc(ca, RESERVE_PRIO, wait); > + if (bucket == -1) { > + if (!wait) > + return -ENOMEM; > + BUG_ON(1); > + } > > mutex_unlock(&ca->set->bucket_lock); > prio_io(ca, bucket, REQ_OP_WRITE, 0); > @@ -593,6 +597,7 @@ void bch_prio_write(struct cache *ca) > > ca->prio_last_buckets[i] = ca->prio_buckets[i]; > } > + return 0; > } > > static void prio_read(struct cache *ca, uint64_t bucket) > @@ -1954,7 +1959,7 @@ static int run_cache_set(struct cache_set *c) > > mutex_lock(&c->bucket_lock); > for_each_cache(ca, c, i) > - bch_prio_write(ca); > + bch_prio_write(ca, true); > mutex_unlock(&c->bucket_lock); > > err = "cannot allocate new UUID bucket"; > -- Coly Li