Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp619821ybx; Wed, 30 Oct 2019 02:14:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqyQrCvRozwZJhnVhXAdKOAONktkmeTrAxRpsgCeiG/B32DP7mmtOeZePpkYZlh7UZWFuNUd X-Received: by 2002:a50:f058:: with SMTP id u24mr31085118edl.288.1572426893067; Wed, 30 Oct 2019 02:14:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572426893; cv=none; d=google.com; s=arc-20160816; b=WTR6utMftQ5Jt6PBnl2IK0FWD3lrUe6XOQzygN9HGP58oFR+NxN6TyMMl3Hwctts5P RAzz+stI9iGTbZuir9gcgtZenEaVyY53dDMj9G/awSZK8vD7OOeX9kCOTC1zauzOBlu+ njbzoKD5AFf6IYKm4WHayrxjvVXAXbncXjrW2biZ+Nwzb6ufczsCaGOFGSq/REvdxgb+ kt/efXFN6geocXE+HqrSLjYM5Obj4GX2pSom7BQWTpNxFQ+W2RQE8/nWQ/zz6sMJQ6uE qSuzkN/I9s3BegpyeCEi0jq92y8mzXG/tXAbj2ASxhbER1Y2Ufbu6NNpD3dLKokLqt5W T2cQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=KzZOnULFM8zMiB/rRQsQcNYWAEmNeMI2BTlq2B/5Qd8=; b=MkB3Uz4TyqtSqt51JtBGdrwJFWBPVNwIKjup8jF2iQxiFpFDmiXA7SsIY41YcFYfdi lStEbSjdoBYY5ZbfbyUV8OXuH4ilUicCV3aIY8Q9Ltj6xvHr3t1MpshPDaGR5ZvdXMZU nCn59GZdUYreMzANlUNc3mtwH+ZVw0zpJVwgOT+EUS11nePd43EnfO9YsPkwEQQ2/Vq7 fJc9wR6bibfoWL8B16pZ2Y6pMgtImzJOpsvYW8X5Y5m1MvhrR+ZNOGEu07CiIZqyDe7Q IEi+KzNZkfB1VhXvrID/I823nvPxHhZuEjryFqdHyHKol+6x9dpgodUxeRdLKj4w7xEB 10Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z25si862464eju.56.2019.10.30.02.14.28; Wed, 30 Oct 2019 02:14:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726476AbfJ3JNF (ORCPT + 99 others); Wed, 30 Oct 2019 05:13:05 -0400 Received: from szxga08-in.huawei.com ([45.249.212.255]:41982 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726028AbfJ3JNE (ORCPT ); Wed, 30 Oct 2019 05:13:04 -0400 Received: from DGGEMM403-HUB.china.huawei.com (unknown [172.30.72.54]) by Forcepoint Email with ESMTP id 975FED29C948E39BD46E; Wed, 30 Oct 2019 17:12:57 +0800 (CST) Received: from dggeme762-chm.china.huawei.com (10.3.19.108) by DGGEMM403-HUB.china.huawei.com (10.3.20.211) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 30 Oct 2019 17:12:57 +0800 Received: from architecture4 (10.140.130.215) by dggeme762-chm.china.huawei.com (10.3.19.108) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Wed, 30 Oct 2019 17:12:57 +0800 Date: Wed, 30 Oct 2019 17:15:42 +0800 From: Gao Xiang To: Chao Yu CC: Jaegeuk Kim , Chao Yu , , , , Jonathan Corbet Subject: Re: [f2fs-dev] [PATCH] f2fs: bio_alloc should never fail Message-ID: <20191030091542.GA24976@architecture4> References: <20191030035518.65477-1-gaoxiang25@huawei.com> <20aa40bd-280d-d223-9f73-d9ed7dbe4f29@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20aa40bd-280d-d223-9f73-d9ed7dbe4f29@huawei.com> User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.140.130.215] X-ClientProxiedBy: dggeme715-chm.china.huawei.com (10.1.199.111) To dggeme762-chm.china.huawei.com (10.3.19.108) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Chao, On Wed, Oct 30, 2019 at 04:56:17PM +0800, Chao Yu wrote: > On 2019/10/30 11:55, Gao Xiang wrote: > > remove such useless code and related fault injection. > > Hi Xiang, > > Although, there is so many 'nofail' allocation in f2fs, I think we'd better > avoid such allocation as much as possible (now for read path, we may allow to > fail to allocate bio), I suggest to keep the failure path and bio allocation > injection. > > It looks bio_alloc() will use its own mempool, which may suffer deadlock > potentially. So how about changing to use bio_alloc_bioset(, , NULL) instead of > bio_alloc()? Yes, I noticed the original commit 740432f83560 ("f2fs: handle failed bio allocation"), yet I don't find any real call trace clue what happened before. As my understanding, if we allocate bios without submit_bio (I mean write path) with default bs and gfp_flags GFP_NOIO or GFP_KERNEL, I think it will be slept inside mempool rather than return NULL to its caller... Please correct me if I'm wrong... I could send another patch with bio_alloc_bioset(, , NULL), I am curious to know the original issue and how it solved though... For read or flush path, since it will submit_bio and bio_alloc one by one, I think mempool will get a page quicker (memory failure path could be longer). But I can send a patch just by using bio_alloc_bioset(, , NULL) instead as you suggested later. Thanks, Gao Xiang > > Thanks, > > > > > Signed-off-by: Gao Xiang > > --- > > Documentation/filesystems/f2fs.txt | 1 - > > fs/f2fs/data.c | 6 ++---- > > fs/f2fs/f2fs.h | 21 --------------------- > > fs/f2fs/segment.c | 5 +---- > > fs/f2fs/super.c | 1 - > > 5 files changed, 3 insertions(+), 31 deletions(-) > > > > diff --git a/Documentation/filesystems/f2fs.txt b/Documentation/filesystems/f2fs.txt > > index 7e1991328473..3477c3e4c08b 100644 > > --- a/Documentation/filesystems/f2fs.txt > > +++ b/Documentation/filesystems/f2fs.txt > > @@ -172,7 +172,6 @@ fault_type=%d Support configuring fault injection type, should be > > FAULT_KVMALLOC 0x000000002 > > FAULT_PAGE_ALLOC 0x000000004 > > FAULT_PAGE_GET 0x000000008 > > - FAULT_ALLOC_BIO 0x000000010 > > FAULT_ALLOC_NID 0x000000020 > > FAULT_ORPHAN 0x000000040 > > FAULT_BLOCK 0x000000080 > > diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c > > index 5755e897a5f0..3b88dcb15de6 100644 > > --- a/fs/f2fs/data.c > > +++ b/fs/f2fs/data.c > > @@ -288,7 +288,7 @@ static struct bio *__bio_alloc(struct f2fs_io_info *fio, int npages) > > struct f2fs_sb_info *sbi = fio->sbi; > > struct bio *bio; > > > > - bio = f2fs_bio_alloc(sbi, npages, true); > > + bio = bio_alloc(GFP_NOIO, npages); > > > > f2fs_target_device(sbi, fio->new_blkaddr, bio); > > if (is_read_io(fio->op)) { > > @@ -682,9 +682,7 @@ static struct bio *f2fs_grab_read_bio(struct inode *inode, block_t blkaddr, > > struct bio_post_read_ctx *ctx; > > unsigned int post_read_steps = 0; > > > > - bio = f2fs_bio_alloc(sbi, min_t(int, nr_pages, BIO_MAX_PAGES), false); > > - if (!bio) > > - return ERR_PTR(-ENOMEM); > > + bio = bio_alloc(GFP_KERNEL, min_t(int, nr_pages, BIO_MAX_PAGES)); > > f2fs_target_device(sbi, blkaddr, bio); > > bio->bi_end_io = f2fs_read_end_io; > > bio_set_op_attrs(bio, REQ_OP_READ, op_flag); > > diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > > index 4024790028aa..40012f874be0 100644 > > --- a/fs/f2fs/f2fs.h > > +++ b/fs/f2fs/f2fs.h > > @@ -44,7 +44,6 @@ enum { > > FAULT_KVMALLOC, > > FAULT_PAGE_ALLOC, > > FAULT_PAGE_GET, > > - FAULT_ALLOC_BIO, > > FAULT_ALLOC_NID, > > FAULT_ORPHAN, > > FAULT_BLOCK, > > @@ -2210,26 +2209,6 @@ static inline void *f2fs_kmem_cache_alloc(struct kmem_cache *cachep, > > return entry; > > } > > > > -static inline struct bio *f2fs_bio_alloc(struct f2fs_sb_info *sbi, > > - int npages, bool no_fail) > > -{ > > - struct bio *bio; > > - > > - if (no_fail) { > > - /* No failure on bio allocation */ > > - bio = bio_alloc(GFP_NOIO, npages); > > - if (!bio) > > - bio = bio_alloc(GFP_NOIO | __GFP_NOFAIL, npages); > > - return bio; > > - } > > - if (time_to_inject(sbi, FAULT_ALLOC_BIO)) { > > - f2fs_show_injection_info(FAULT_ALLOC_BIO); > > - return NULL; > > - } > > - > > - return bio_alloc(GFP_KERNEL, npages); > > -} > > - > > static inline bool is_idle(struct f2fs_sb_info *sbi, int type) > > { > > if (sbi->gc_mode == GC_URGENT) > > diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > > index 808709581481..28457c878d0d 100644 > > --- a/fs/f2fs/segment.c > > +++ b/fs/f2fs/segment.c > > @@ -552,10 +552,7 @@ static int __submit_flush_wait(struct f2fs_sb_info *sbi, > > struct bio *bio; > > int ret; > > > > - bio = f2fs_bio_alloc(sbi, 0, false); > > - if (!bio) > > - return -ENOMEM; > > - > > + bio = bio_alloc(GFP_KERNEL, 0); > > bio->bi_opf = REQ_OP_WRITE | REQ_SYNC | REQ_PREFLUSH; > > bio_set_dev(bio, bdev); > > ret = submit_bio_wait(bio); > > diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c > > index 1443cee15863..51945dd27f00 100644 > > --- a/fs/f2fs/super.c > > +++ b/fs/f2fs/super.c > > @@ -44,7 +44,6 @@ const char *f2fs_fault_name[FAULT_MAX] = { > > [FAULT_KVMALLOC] = "kvmalloc", > > [FAULT_PAGE_ALLOC] = "page alloc", > > [FAULT_PAGE_GET] = "page get", > > - [FAULT_ALLOC_BIO] = "alloc bio", > > [FAULT_ALLOC_NID] = "alloc nid", > > [FAULT_ORPHAN] = "orphan", > > [FAULT_BLOCK] = "no more block", > >