Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp5543829ybh; Wed, 7 Aug 2019 07:40:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxsgtWPZRRGdjDisusb4xTRjzkpKFbL+v81msb6GqFgLbv5iYzYCCV1b63BBRrTlBd77Od2 X-Received: by 2002:a65:5188:: with SMTP id h8mr7996519pgq.294.1565188854970; Wed, 07 Aug 2019 07:40:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565188854; cv=none; d=google.com; s=arc-20160816; b=VGA9WG4UvgfFo1vWBvYs1iZYvyai7g5KdUd4ZMb1ZXMA6XAXm8Atfp6GTZwZ8WFjEh Jt7VU4qomjVC+vBAD2EyfBgG7GYLB6Xd0DKAvV+FaTxCI6AWWyKknEdavhD9Kix/x8e1 ChVDk+1MqHKsyLeDeYXawD4bQsAG+rRToYoAmEgHpZwT+jVEaNOvZIEExzelBMoHsVAp 9VZmGrGmFXGPRMMWg6TJ+4+Ta2xDxWetIY7BmYrrrZKCQAnn7mmMsVPuMTjzwSYh9WD4 EOsrtDy1Z/4vnOaeA/xXq6Ss3rfEdqUrqXsZDR0SEAx0iErPuJcD6UtKeQdPWtmmpgVg GkoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=opZqQKKTvUL1jWDpr49kDNssR5gn1b5atzv0H5+q/YI=; b=R40rSunWuUPvL32ohrUDiQuCBaTgGd0VTFKyqEtCoKuj5fc2CnRA4CjyrsHSDUhwax 0ROoPe2ZPJ+o3LighvLoiD7YHqEtCa3LgMFMMh985OaWc2KyUVQoOEpmsKW0pYqfN0vK y1W0kN1/+OdJQWCkj2OW++M/xjq3Hyzx8LYxCBoiFGKoWstF1dh/4XIzwtGntD+X5/dg MPTgx0JY2B/h37whTlZbp+g2A8BB7yefOVZO+UA0T+ditoxFO5AvxtI4NiKUq9vsDA5h cR1slgTGrc80C33/QYSKPVvd6zd9qx6Lk1Y+QdfDaj81YSi6tA912VKlXFpYSbnVN0u3 FTKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=e8YXrdMM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1si93352pja.67.2019.08.07.07.40.38; Wed, 07 Aug 2019 07:40:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=e8YXrdMM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729867AbfHGOGc (ORCPT + 99 others); Wed, 7 Aug 2019 10:06:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:43360 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726873AbfHGOGb (ORCPT ); Wed, 7 Aug 2019 10:06:31 -0400 Received: from [192.168.0.101] (unknown [180.111.32.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4DFC22086D; Wed, 7 Aug 2019 14:06:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565186790; bh=w7C0l0lFsyuhZH6E3/g9IKVSeZ+Jcfin9tOPX7+Sm98=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=e8YXrdMMRS6XjYVj7XpJBuc+m7WZn9aZJJe10v7wKy903YW75EKHRoyqGipyVl8Zm ODQVy1+Yy/4Ne8SoWKglzUtXUCpqTLOFaRiAxPBzaaeoR9RAzutsTGTDEWbHqTYV6t Bqcq7BJAn7UQKGrcOQ1finM/JT4NL9yvaKzgYoh4= Subject: Re: [f2fs-dev] [PATCH v4] f2fs: Fix indefinite loop in f2fs_gc() To: Sahitya Tummala , Jaegeuk Kim , Chao Yu , linux-f2fs-devel@lists.sourceforge.net Cc: linux-kernel@vger.kernel.org References: <1565185232-11506-1-git-send-email-stummala@codeaurora.org> From: Chao Yu Message-ID: <2b8f7a88-5204-a4ea-9f80-1056abb30d98@kernel.org> Date: Wed, 7 Aug 2019 22:06:17 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <1565185232-11506-1-git-send-email-stummala@codeaurora.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019-8-7 21:40, Sahitya Tummala wrote: > Policy - Foreground GC, LFS and greedy GC mode. > > Under this policy, f2fs_gc() loops forever to GC as it doesn't have > enough free segements to proceed and thus it keeps calling gc_more > for the same victim segment. This can happen if the selected victim > segment could not be GC'd due to failed blkaddr validity check i.e. > is_alive() returns false for the blocks set in current validity map. > > Fix this by keeping track of such invalid segments and skip those > segments for selection in get_victim_by_default() to avoid endless > GC loop under such error scenarios. Currently, add this logic under > CONFIG_F2FS_CHECK_FS to be able to root cause the issue in debug > version. > > Signed-off-by: Sahitya Tummala > --- > v4: Cover all logic with CONFIG_F2FS_CHECK_FS > > fs/f2fs/gc.c | 31 +++++++++++++++++++++++++++++-- > fs/f2fs/segment.c | 14 +++++++++++++- > fs/f2fs/segment.h | 3 +++ > 3 files changed, 45 insertions(+), 3 deletions(-) > > diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c > index 8974672..cbcacbd 100644 > --- a/fs/f2fs/gc.c > +++ b/fs/f2fs/gc.c > @@ -382,6 +382,16 @@ static int get_victim_by_default(struct f2fs_sb_info *sbi, > nsearched++; > } > > +#ifdef CONFIG_F2FS_CHECK_FS > + /* > + * skip selecting the invalid segno (that is failed due to block > + * validity check failure during GC) to avoid endless GC loop in > + * such cases. > + */ > + if (test_bit(segno, sm->invalid_segmap)) > + goto next; > +#endif > + > secno = GET_SEC_FROM_SEG(sbi, segno); > > if (sec_usage_check(sbi, secno)) > @@ -602,8 +612,15 @@ static bool is_alive(struct f2fs_sb_info *sbi, struct f2fs_summary *sum, > { > struct page *node_page; > nid_t nid; > - unsigned int ofs_in_node; > + unsigned int ofs_in_node, segno; > block_t source_blkaddr; > + unsigned long offset; > +#ifdef CONFIG_F2FS_CHECK_FS > + struct sit_info *sit_i = SIT_I(sbi); > +#endif > + > + segno = GET_SEGNO(sbi, blkaddr); > + offset = GET_BLKOFF_FROM_SEG0(sbi, blkaddr); > > nid = le32_to_cpu(sum->nid); > ofs_in_node = le16_to_cpu(sum->ofs_in_node); > @@ -627,8 +644,18 @@ static bool is_alive(struct f2fs_sb_info *sbi, struct f2fs_summary *sum, > source_blkaddr = datablock_addr(NULL, node_page, ofs_in_node); > f2fs_put_page(node_page, 1); > > - if (source_blkaddr != blkaddr) > + if (source_blkaddr != blkaddr) { > +#ifdef CONFIG_F2FS_CHECK_FS unsigned int segno = GET_SEGNO(sbi, blkaddr); unsigned int offset = GET_BLKOFF_FROM_SEG0(sbi, blkaddr); Should be local, otherwise it looks good to me, I think Jaegeuk can help to fix this while merging. Reviewed-by: Chao Yu Thanks, > + if (unlikely(check_valid_map(sbi, segno, offset))) { > + if (!test_and_set_bit(segno, sit_i->invalid_segmap)) { > + f2fs_err(sbi, "mismatched blkaddr %u (source_blkaddr %u) in seg %u\n", > + blkaddr, source_blkaddr, segno); > + f2fs_bug_on(sbi, 1); > + } > + } > +#endif > return false; > + } > return true; > } > > diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > index a661ac3..ee795b1 100644 > --- a/fs/f2fs/segment.c > +++ b/fs/f2fs/segment.c > @@ -806,6 +806,9 @@ static void __remove_dirty_segment(struct f2fs_sb_info *sbi, unsigned int segno, > enum dirty_type dirty_type) > { > struct dirty_seglist_info *dirty_i = DIRTY_I(sbi); > +#ifdef CONFIG_F2FS_CHECK_FS > + struct sit_info *sit_i = SIT_I(sbi); > +#endif > > if (test_and_clear_bit(segno, dirty_i->dirty_segmap[dirty_type])) > dirty_i->nr_dirty[dirty_type]--; > @@ -817,9 +820,13 @@ static void __remove_dirty_segment(struct f2fs_sb_info *sbi, unsigned int segno, > if (test_and_clear_bit(segno, dirty_i->dirty_segmap[t])) > dirty_i->nr_dirty[t]--; > > - if (get_valid_blocks(sbi, segno, true) == 0) > + if (get_valid_blocks(sbi, segno, true) == 0) { > clear_bit(GET_SEC_FROM_SEG(sbi, segno), > dirty_i->victim_secmap); > +#ifdef CONFIG_F2FS_CHECK_FS > + clear_bit(segno, sit_i->invalid_segmap); > +#endif > + } > } > } > > @@ -4015,6 +4022,10 @@ static int build_sit_info(struct f2fs_sb_info *sbi) > sit_i->sit_bitmap_mir = kmemdup(src_bitmap, bitmap_size, GFP_KERNEL); > if (!sit_i->sit_bitmap_mir) > return -ENOMEM; > + > + sit_i->invalid_segmap = f2fs_kvzalloc(sbi, bitmap_size, GFP_KERNEL); > + if (!sit_i->invalid_segmap) > + return -ENOMEM; > #endif > > /* init SIT information */ > @@ -4517,6 +4528,7 @@ static void destroy_sit_info(struct f2fs_sb_info *sbi) > kvfree(sit_i->sit_bitmap); > #ifdef CONFIG_F2FS_CHECK_FS > kvfree(sit_i->sit_bitmap_mir); > + kvfree(sit_i->invalid_segmap); > #endif > kvfree(sit_i); > } > diff --git a/fs/f2fs/segment.h b/fs/f2fs/segment.h > index b746028..9370d53 100644 > --- a/fs/f2fs/segment.h > +++ b/fs/f2fs/segment.h > @@ -229,6 +229,9 @@ struct sit_info { > char *sit_bitmap; /* SIT bitmap pointer */ > #ifdef CONFIG_F2FS_CHECK_FS > char *sit_bitmap_mir; /* SIT bitmap mirror */ > + > + /* bitmap of segments to be ignored by GC in case of errors */ > + unsigned long *invalid_segmap; > #endif > unsigned int bitmap_size; /* SIT bitmap size */ > >