Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp516697ybx; Wed, 30 Oct 2019 19:24:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqwR0S9Efi0EjsDrmzJZom973bCbndRj4Q/7rEx3w6j81yp+rrmSGCFCeyxbHCSpdIz9OKFw X-Received: by 2002:aa7:c387:: with SMTP id k7mr3209409edq.273.1572488685552; Wed, 30 Oct 2019 19:24:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572488685; cv=none; d=google.com; s=arc-20160816; b=IQuiNN+t2JYcMJuPlwPNkmGqMZjpxqTe7BnSmL6+stDj24CPyRsfx9EUH5pxj+GJ8e bep9QC00xSKGGi0p8xm4HoK3bspSYQeH83u+EwFai8bDSvAFk6fBdscJ7WcsQvX8YidH EGSSMsLKbsUnQS/Fd0mhvZ9IO4KG0pFWnu+CiJUQ7OYSEPMTk6b5XURO3gQJUTRaIl3g eqFktaBt9dzFERCabcNwsza+6bJQNhVH3/jZFOKhVlQ7QHbNaNPj390GS5pCZffzuFFG lO5VudVYQ8APET34XLAYHytTck2ebtd7Sl2e/Z2YtKEt2DoTByI78D0ABn2Ft1QbE3iL wqRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject; bh=vSKYhu2uHli6FeH0PL1g2yI1phj/k2y6Ngo5LUIb8Tc=; b=T2K2PoVO0YyrbUtAkz7Fd6uIvLXNbhfrEySVqKwOTZbByz9YGA5uvrcndPaqln+zQS UiMGgD8ma8tZx/7xQfvSeMsatqYCVTwYuTUnLshw3klxrU41mEEOc5AIqBDDjTjNtkl4 cnq298GEhX7eYf5+p4RlpKpltabROSAd+L/EXRhP8QERQt74aUuVdN3rxI9P+HrbwPfK lxhMcdcVCmt02baD/2P8eQoq1l1l1oxbquAT0qgoOlv/D+fc+1KTz7QzCgEni5qPT6I6 B+b0gWBvhdQzdxdGyQdwm8fnNf9ydx49j1jVhlNrhgOjit7dcHGFzOtEOoxD6L7/7EYK f5wQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z25si2541807eju.56.2019.10.30.19.24.20; Wed, 30 Oct 2019 19:24:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726524AbfJaCVU (ORCPT + 99 others); Wed, 30 Oct 2019 22:21:20 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:5233 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726184AbfJaCVU (ORCPT ); Wed, 30 Oct 2019 22:21:20 -0400 Received: from DGGEMS405-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 990323473B9ACFDD1725; Thu, 31 Oct 2019 10:21:18 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.205) with Microsoft SMTP Server (TLS) id 14.3.439.0; Thu, 31 Oct 2019 10:21:13 +0800 Subject: Re: [PATCH 2/2] f2fs: support data compression To: Jaegeuk Kim , , References: <20191022171602.93637-1-jaegeuk@kernel.org> <20191022171602.93637-2-jaegeuk@kernel.org> <20191027225006.GA321938@sol.localdomain> <20191030025512.GA4791@sol.localdomain> <97c33fa1-15af-b319-29a1-22f254a26c0a@huawei.com> <20191030170246.GB693@sol.localdomain> From: Chao Yu Message-ID: <55f1c893-09c5-5a8e-d493-8cae51b9e2a6@huawei.com> Date: Thu, 31 Oct 2019 10:21:13 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20191030170246.GB693@sol.localdomain> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/10/31 1:02, Eric Biggers wrote: > On Wed, Oct 30, 2019 at 04:43:52PM +0800, Chao Yu wrote: >>>>>> static void bio_post_read_processing(struct bio_post_read_ctx *ctx) >>>>>> { >>>>>> - /* >>>>>> - * We use different work queues for decryption and for verity because >>>>>> - * verity may require reading metadata pages that need decryption, and >>>>>> - * we shouldn't recurse to the same workqueue. >>>>>> - */ >>>>> >>>>> Why is it okay (i.e., no deadlocks) to no longer use different work queues for >>>>> decryption and for verity? See the comment above which is being deleted. >>>> >>>> Could you explain more about how deadlock happen? or share me a link address if >>>> you have described that case somewhere? >>>> >>> >>> The verity work can read pages from the file which require decryption. I'm >>> concerned that it could deadlock if the work is scheduled on the same workqueue. >> >> I assume you've tried one workqueue, and suffered deadlock.. >> >>> Granted, I'm not an expert in Linux workqueues, so if you've investigated this >>> and determined that it's safe, can you explain why? >> >> I'm not familiar with workqueue... I guess it may not safe that if the work is >> scheduled to the same cpu in where verity was waiting for data? if the work is >> scheduled to other cpu, it may be safe. >> >> I can check that before splitting the workqueue for verity and decrypt/decompress. >> > > Yes this is a real problem, try 'kvm-xfstests -c f2fs/encrypt generic/579'. > The worker thread gets deadlocked in f2fs_read_merkle_tree_page() waiting for > the Merkle tree page to be decrypted. This is with the v2 compression patch; > it works fine on current mainline. Oh, alright... Let me split them, thanks very much for all the comments and test anyway. Thanks, > > INFO: task kworker/u5:0:61 blocked for more than 30 seconds. > Not tainted 5.4.0-rc1-00119-g464e31ba60d0 #13 > "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. > kworker/u5:0 D 0 61 2 0x80004000 > Workqueue: f2fs_post_read_wq f2fs_post_read_work > Call Trace: > context_switch kernel/sched/core.c:3384 [inline] > __schedule+0x299/0x6c0 kernel/sched/core.c:4069 > schedule+0x44/0xd0 kernel/sched/core.c:4136 > io_schedule+0x11/0x40 kernel/sched/core.c:5780 > wait_on_page_bit_common mm/filemap.c:1174 [inline] > wait_on_page_bit mm/filemap.c:1223 [inline] > wait_on_page_locked include/linux/pagemap.h:527 [inline] > wait_on_page_locked include/linux/pagemap.h:524 [inline] > wait_on_page_read mm/filemap.c:2767 [inline] > do_read_cache_page+0x407/0x660 mm/filemap.c:2810 > read_cache_page+0xd/0x10 mm/filemap.c:2894 > f2fs_read_merkle_tree_page+0x2e/0x30 include/linux/pagemap.h:396 > verify_page+0x110/0x560 fs/verity/verify.c:120 > fsverity_verify_bio+0xe6/0x1a0 fs/verity/verify.c:239 > verity_work fs/f2fs/data.c:142 [inline] > f2fs_post_read_work+0x36/0x50 fs/f2fs/data.c:160 > process_one_work+0x225/0x550 kernel/workqueue.c:2269 > worker_thread+0x4b/0x3c0 kernel/workqueue.c:2415 > kthread+0x125/0x140 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > INFO: task kworker/u5:1:1140 blocked for more than 30 seconds. > Not tainted 5.4.0-rc1-00119-g464e31ba60d0 #13 > "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. > kworker/u5:1 D 0 1140 2 0x80004000 > Workqueue: f2fs_post_read_wq f2fs_post_read_work > Call Trace: > context_switch kernel/sched/core.c:3384 [inline] > __schedule+0x299/0x6c0 kernel/sched/core.c:4069 > schedule+0x44/0xd0 kernel/sched/core.c:4136 > io_schedule+0x11/0x40 kernel/sched/core.c:5780 > wait_on_page_bit_common mm/filemap.c:1174 [inline] > wait_on_page_bit mm/filemap.c:1223 [inline] > wait_on_page_locked include/linux/pagemap.h:527 [inline] > wait_on_page_locked include/linux/pagemap.h:524 [inline] > wait_on_page_read mm/filemap.c:2767 [inline] > do_read_cache_page+0x407/0x660 mm/filemap.c:2810 > read_cache_page+0xd/0x10 mm/filemap.c:2894 > f2fs_read_merkle_tree_page+0x2e/0x30 include/linux/pagemap.h:396 > verify_page+0x110/0x560 fs/verity/verify.c:120 > fsverity_verify_bio+0xe6/0x1a0 fs/verity/verify.c:239 > verity_work fs/f2fs/data.c:142 [inline] > f2fs_post_read_work+0x36/0x50 fs/f2fs/data.c:160 > process_one_work+0x225/0x550 kernel/workqueue.c:2269 > worker_thread+0x4b/0x3c0 kernel/workqueue.c:2415 > kthread+0x125/0x140 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > > Showing all locks held in the system: > 1 lock held by khungtaskd/21: > #0: ffffffff82250520 (rcu_read_lock){....}, at: rcu_lock_acquire.constprop.0+0x0/0x30 include/trace/events/lock.h:13 > 2 locks held by kworker/u5:0/61: > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: set_work_data kernel/workqueue.c:619 [inline] > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:647 [inline] > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: process_one_work+0x1ad/0x550 kernel/workqueue.c:2240 > #1: ffffc90000253e50 ((work_completion)(&ctx->work)){+.+.}, at: set_work_data kernel/workqueue.c:619 [inline] > #1: ffffc90000253e50 ((work_completion)(&ctx->work)){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:647 [inline] > #1: ffffc90000253e50 ((work_completion)(&ctx->work)){+.+.}, at: process_one_work+0x1ad/0x550 kernel/workqueue.c:2240 > 2 locks held by kworker/u5:1/1140: > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: set_work_data kernel/workqueue.c:619 [inline] > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:647 [inline] > #0: ffff88807b78eb28 ((wq_completion)f2fs_post_read_wq){+.+.}, at: process_one_work+0x1ad/0x550 kernel/workqueue.c:2240 > #1: ffffc9000174be50 ((work_completion)(&ctx->work)){+.+.}, at: set_work_data kernel/workqueue.c:619 [inline] > #1: ffffc9000174be50 ((work_completion)(&ctx->work)){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:647 [inline] > #1: ffffc9000174be50 ((work_completion)(&ctx->work)){+.+.}, at: process_one_work+0x1ad/0x550 kernel/workqueue.c:2240 > . >