Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp632524ybx; Wed, 30 Oct 2019 02:29:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqx2q0uuLe/oRavCmbI+Xp5NemK5qHjgMc66A7+QxBDn6HADNeKlOlhOBcOcPKArdJ/a3pnp X-Received: by 2002:a05:6402:1a55:: with SMTP id bf21mr30138791edb.61.1572427799542; Wed, 30 Oct 2019 02:29:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572427799; cv=none; d=google.com; s=arc-20160816; b=qZ0Bwr0kA+GHUP95GcJFjlCFvmoRbU6g3813jI/xMjo3uZmCTpFIeGQyb7a4ourkye hzmBwkI+BH7/TDOtj8EBjoR7wre9jG8AwNo5FlS4fRhxg0Wwxwo3KwBwix0eiLe7sEeo ZkcdsHJpOLuTI75az6lHPQTGvbyqM9FK/52JG4FotI36gxHTiklO1CMLmlYb2wZl963u fEzdn/DtJ1/zf4sRY6gCM+alLJbL5UT5TcaGpRyFnivpC+PwHJfotCb2haMW4SeEqEV4 jqTX/BQOVk9fdewwHS+vrR+YJKkw8PLJJnTuLlkMVU9EwEVCjTb9QFIS9ujN+eft5c0X F05Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=b+vutZohqDBEzYAoh9+PHfnIhbSKTtyiP7T2tHH+Mbw=; b=Z7Wt72bl9OWboimIB93vcWtMj8nhX32p9w5Va3wKhFjva6ONO/NncjLgvfOx/bbtcE So1Zcq1T5Mnj/kGEEdcDdFQblVAAomdiL/a2ppqziHJc8uVbqGEpj4kmxsDMCeBPLHr5 tEubU3O6DWuJhWLw96+k4ulVUNaZi+9JcbD6xCSVVsadxwg+aTu51kHUudqtGRnUKm8r XYQJMWoSXR1maeCZVfJJ9/YaWHs7nCNzWtw7oOPaJtTH3ZRHG1MIusGDESm0Y+80L3lV VTWfTY5/cX33Y+1KshxC8KRL0nXeEuloNDOrq8z8FKZrHefXrmBo6JfLK2MJDXI620hk DKWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gg9si796673ejb.438.2019.10.30.02.29.35; Wed, 30 Oct 2019 02:29:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726353AbfJ3J2N (ORCPT + 99 others); Wed, 30 Oct 2019 05:28:13 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:5652 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726028AbfJ3J2M (ORCPT ); Wed, 30 Oct 2019 05:28:12 -0400 Received: from DGGEMS408-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id EDCB5622CAB3BB28B0F6; Wed, 30 Oct 2019 17:28:03 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.208) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 30 Oct 2019 17:27:55 +0800 Subject: Re: [f2fs-dev] [PATCH] f2fs: bio_alloc should never fail To: Gao Xiang CC: Jaegeuk Kim , Chao Yu , , , , Jonathan Corbet References: <20191030035518.65477-1-gaoxiang25@huawei.com> <20aa40bd-280d-d223-9f73-d9ed7dbe4f29@huawei.com> <20191030091542.GA24976@architecture4> From: Chao Yu Message-ID: <19a417e6-8f0e-564e-bc36-59bfc883ec16@huawei.com> Date: Wed, 30 Oct 2019 17:27:54 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20191030091542.GA24976@architecture4> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Xiang, On 2019/10/30 17:15, Gao Xiang wrote: > Hi Chao, > > On Wed, Oct 30, 2019 at 04:56:17PM +0800, Chao Yu wrote: >> On 2019/10/30 11:55, Gao Xiang wrote: >>> remove such useless code and related fault injection. >> >> Hi Xiang, >> >> Although, there is so many 'nofail' allocation in f2fs, I think we'd better >> avoid such allocation as much as possible (now for read path, we may allow to >> fail to allocate bio), I suggest to keep the failure path and bio allocation >> injection. >> >> It looks bio_alloc() will use its own mempool, which may suffer deadlock >> potentially. So how about changing to use bio_alloc_bioset(, , NULL) instead of >> bio_alloc()? > > Yes, I noticed the original commit 740432f83560 ("f2fs: handle failed bio allocation"), > yet I don't find any real call trace clue what happened before. > > As my understanding, if we allocate bios without submit_bio (I mean write path) with > default bs and gfp_flags GFP_NOIO or GFP_KERNEL, I think it will be slept inside > mempool rather than return NULL to its caller... Please correct me if I'm wrong... I'm curious too... Jaegeuk may know the details. > > I could send another patch with bio_alloc_bioset(, , NULL), I am curious to know the > original issue and how it solved though... > > For read or flush path, since it will submit_bio and bio_alloc one by one, I think > mempool will get a page quicker (memory failure path could be longer). But I can > send a patch just by using bio_alloc_bioset(, , NULL) instead as you suggested later. You're right, in low memory scenario, allocation with bioset will be faster, as you mentioned offline, maybe we can add/use a priviate bioset like btrfs did rather than using global one, however, we'd better check how deadlock happen with a bioset mempool first ... Thanks, > > Thanks, > Gao Xiang > >> >> Thanks, >> >>> >>> Signed-off-by: Gao Xiang >>> --- >>> Documentation/filesystems/f2fs.txt | 1 - >>> fs/f2fs/data.c | 6 ++---- >>> fs/f2fs/f2fs.h | 21 --------------------- >>> fs/f2fs/segment.c | 5 +---- >>> fs/f2fs/super.c | 1 - >>> 5 files changed, 3 insertions(+), 31 deletions(-) >>> >>> diff --git a/Documentation/filesystems/f2fs.txt b/Documentation/filesystems/f2fs.txt >>> index 7e1991328473..3477c3e4c08b 100644 >>> --- a/Documentation/filesystems/f2fs.txt >>> +++ b/Documentation/filesystems/f2fs.txt >>> @@ -172,7 +172,6 @@ fault_type=%d Support configuring fault injection type, should be >>> FAULT_KVMALLOC 0x000000002 >>> FAULT_PAGE_ALLOC 0x000000004 >>> FAULT_PAGE_GET 0x000000008 >>> - FAULT_ALLOC_BIO 0x000000010 >>> FAULT_ALLOC_NID 0x000000020 >>> FAULT_ORPHAN 0x000000040 >>> FAULT_BLOCK 0x000000080 >>> diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c >>> index 5755e897a5f0..3b88dcb15de6 100644 >>> --- a/fs/f2fs/data.c >>> +++ b/fs/f2fs/data.c >>> @@ -288,7 +288,7 @@ static struct bio *__bio_alloc(struct f2fs_io_info *fio, int npages) >>> struct f2fs_sb_info *sbi = fio->sbi; >>> struct bio *bio; >>> >>> - bio = f2fs_bio_alloc(sbi, npages, true); >>> + bio = bio_alloc(GFP_NOIO, npages); >>> >>> f2fs_target_device(sbi, fio->new_blkaddr, bio); >>> if (is_read_io(fio->op)) { >>> @@ -682,9 +682,7 @@ static struct bio *f2fs_grab_read_bio(struct inode *inode, block_t blkaddr, >>> struct bio_post_read_ctx *ctx; >>> unsigned int post_read_steps = 0; >>> >>> - bio = f2fs_bio_alloc(sbi, min_t(int, nr_pages, BIO_MAX_PAGES), false); >>> - if (!bio) >>> - return ERR_PTR(-ENOMEM); >>> + bio = bio_alloc(GFP_KERNEL, min_t(int, nr_pages, BIO_MAX_PAGES)); >>> f2fs_target_device(sbi, blkaddr, bio); >>> bio->bi_end_io = f2fs_read_end_io; >>> bio_set_op_attrs(bio, REQ_OP_READ, op_flag); >>> diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h >>> index 4024790028aa..40012f874be0 100644 >>> --- a/fs/f2fs/f2fs.h >>> +++ b/fs/f2fs/f2fs.h >>> @@ -44,7 +44,6 @@ enum { >>> FAULT_KVMALLOC, >>> FAULT_PAGE_ALLOC, >>> FAULT_PAGE_GET, >>> - FAULT_ALLOC_BIO, >>> FAULT_ALLOC_NID, >>> FAULT_ORPHAN, >>> FAULT_BLOCK, >>> @@ -2210,26 +2209,6 @@ static inline void *f2fs_kmem_cache_alloc(struct kmem_cache *cachep, >>> return entry; >>> } >>> >>> -static inline struct bio *f2fs_bio_alloc(struct f2fs_sb_info *sbi, >>> - int npages, bool no_fail) >>> -{ >>> - struct bio *bio; >>> - >>> - if (no_fail) { >>> - /* No failure on bio allocation */ >>> - bio = bio_alloc(GFP_NOIO, npages); >>> - if (!bio) >>> - bio = bio_alloc(GFP_NOIO | __GFP_NOFAIL, npages); >>> - return bio; >>> - } >>> - if (time_to_inject(sbi, FAULT_ALLOC_BIO)) { >>> - f2fs_show_injection_info(FAULT_ALLOC_BIO); >>> - return NULL; >>> - } >>> - >>> - return bio_alloc(GFP_KERNEL, npages); >>> -} >>> - >>> static inline bool is_idle(struct f2fs_sb_info *sbi, int type) >>> { >>> if (sbi->gc_mode == GC_URGENT) >>> diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c >>> index 808709581481..28457c878d0d 100644 >>> --- a/fs/f2fs/segment.c >>> +++ b/fs/f2fs/segment.c >>> @@ -552,10 +552,7 @@ static int __submit_flush_wait(struct f2fs_sb_info *sbi, >>> struct bio *bio; >>> int ret; >>> >>> - bio = f2fs_bio_alloc(sbi, 0, false); >>> - if (!bio) >>> - return -ENOMEM; >>> - >>> + bio = bio_alloc(GFP_KERNEL, 0); >>> bio->bi_opf = REQ_OP_WRITE | REQ_SYNC | REQ_PREFLUSH; >>> bio_set_dev(bio, bdev); >>> ret = submit_bio_wait(bio); >>> diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c >>> index 1443cee15863..51945dd27f00 100644 >>> --- a/fs/f2fs/super.c >>> +++ b/fs/f2fs/super.c >>> @@ -44,7 +44,6 @@ const char *f2fs_fault_name[FAULT_MAX] = { >>> [FAULT_KVMALLOC] = "kvmalloc", >>> [FAULT_PAGE_ALLOC] = "page alloc", >>> [FAULT_PAGE_GET] = "page get", >>> - [FAULT_ALLOC_BIO] = "alloc bio", >>> [FAULT_ALLOC_NID] = "alloc nid", >>> [FAULT_ORPHAN] = "orphan", >>> [FAULT_BLOCK] = "no more block", >>> > . >