Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2326060pxb; Tue, 23 Feb 2021 04:30:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJyc4u+U9JtBNRD0TXtzfBBt/Dwe0twKtBHqPltfK1LzyqvobKioGnmRh3NZrv63bcIlj+Eu X-Received: by 2002:a05:6402:3582:: with SMTP id y2mr27776129edc.345.1614083410024; Tue, 23 Feb 2021 04:30:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614083410; cv=none; d=google.com; s=arc-20160816; b=kwEgAnVBju64dUpZ133HwcRLbOrz6HYjNDiPYqBSqR/icCf909UlMJEJzwQ6ezDJFd 86h5KUFcQEheK2+Q7I/XVdgQL2lcR36h63xzY1wB+OSwouEk4vhBBaWe0MnhR0TPzEmP 4Rs5HelBQDxKQuX74uoM6j9wYwdx1/3MTPJICjnw7oeIH4Podw0q6Z9Jpr3L5EPVPdTd LdBrN/L+iCUf+SRAtwX3/okYkt3zf1+wg3mES2WND1H2Iw7xFTeDij3fmujy/eyVbdvt Hf0s+c3eyt92Ov6oJmQD38B14jDkukxWkIZSBoadGDV9edeScu/aKr64MHl1AGuvPn3r pwxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=4vz5kEs7mi57NGzzuYCZVSjOyi3kMvCHM3Jk//Hg0nA=; b=cIbAqQuwVV96zn542VTbY3eFC/3MwPLJCcV0YuOlxFvCfuWb2KCa7dEpqGmrt211Ed h4fNuY51WZFA2zuGWNUA02lnJCzIg2WAxpCDqijXjom6HrhiVaURRMA+gFiSXXgjpjV3 iuMqhiu7WPy0Dt/O0PubuXZk8T6th6v4blHBsxVSucqDdAC62n8pLlAqeCNp0aBJEu6+ o/49NEBdbN06SoNmK+s2bCdFceJ+DyWYkwolqyoPPw3m6OTwdNjbGJo8ENoXQsszGrf/ IG5ZC53ZT+YcmP1QS6D2mXmBNKwFqtoVD+0Ma5ffnTlJaD+Pa1tu12bz6NQEoRlNGVXv a+1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e21si6377900ejy.566.2021.02.23.04.29.46; Tue, 23 Feb 2021 04:30:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232500AbhBWM1k (ORCPT + 99 others); Tue, 23 Feb 2021 07:27:40 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:12943 "EHLO szxga06-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232490AbhBWM1i (ORCPT ); Tue, 23 Feb 2021 07:27:38 -0500 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.60]) by szxga06-in.huawei.com (SkyGuard) with ESMTP id 4DlJDK2TzHzjPvJ; Tue, 23 Feb 2021 20:25:37 +0800 (CST) Received: from [10.136.110.154] (10.136.110.154) by smtp.huawei.com (10.3.19.204) with Microsoft SMTP Server (TLS) id 14.3.498.0; Tue, 23 Feb 2021 20:26:49 +0800 Subject: Re: [PATCH RFC] f2fs: fix to avoid selecting full segment w/ {AT,}SSR allocator To: CC: Chao Yu , , References: <20210220094052.64905-1-yuchao0@huawei.com> From: Chao Yu Message-ID: <2b96b5e5-abc0-615f-0220-5d46b8e2c329@huawei.com> Date: Tue, 23 Feb 2021 20:26:49 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.136.110.154] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Jaegeuk, Could you please help to review this patch? since I doubt that this issue can happen in real world... :( Thanks, On 2021/2/22 21:43, Chao Yu wrote: > Ping, > > On 2021/2/20 17:40, Chao Yu wrote: >> In cp disabling mode, there could be a condition >> - target segment has 128 ckpt valid blocks >> - GC migrates 128 valid blocks to other segment (segment is still in >> dirty list) >> - GC migrates 384 blocks to target segment (segment has 128 cp_vblocks >> and 384 vblocks) >> - If GC selects target segment via {AT,}SSR allocator, however there is >> no free space in targe segment. >> >> Fixes: 4354994f097d ("f2fs: checkpoint disabling") >> Fixes: 093749e296e2 ("f2fs: support age threshold based garbage collection") >> Signed-off-by: Chao Yu >> --- >> fs/f2fs/f2fs.h | 1 + >> fs/f2fs/gc.c | 17 +++++++++++++---- >> fs/f2fs/segment.c | 20 ++++++++++++++++++++ >> 3 files changed, 34 insertions(+), 4 deletions(-) >> >> diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h >> index ed7807103c8e..9c753eff0814 100644 >> --- a/fs/f2fs/f2fs.h >> +++ b/fs/f2fs/f2fs.h >> @@ -3376,6 +3376,7 @@ block_t f2fs_get_unusable_blocks(struct f2fs_sb_info *sbi); >> int f2fs_disable_cp_again(struct f2fs_sb_info *sbi, block_t unusable); >> void f2fs_release_discard_addrs(struct f2fs_sb_info *sbi); >> int f2fs_npages_for_summary_flush(struct f2fs_sb_info *sbi, bool for_ra); >> +bool segment_has_free_slot(struct f2fs_sb_info *sbi, int segno); >> void f2fs_init_inmem_curseg(struct f2fs_sb_info *sbi); >> void f2fs_save_inmem_curseg(struct f2fs_sb_info *sbi); >> void f2fs_restore_inmem_curseg(struct f2fs_sb_info *sbi); >> diff --git a/fs/f2fs/gc.c b/fs/f2fs/gc.c >> index 86ba8ed0b8a7..a1d8062cdace 100644 >> --- a/fs/f2fs/gc.c >> +++ b/fs/f2fs/gc.c >> @@ -392,10 +392,6 @@ static void add_victim_entry(struct f2fs_sb_info *sbi, >> if (p->gc_mode == GC_AT && >> get_valid_blocks(sbi, segno, true) == 0) >> return; >> - >> - if (p->alloc_mode == AT_SSR && >> - get_seg_entry(sbi, segno)->ckpt_valid_blocks == 0) >> - return; >> } >> >> for (i = 0; i < sbi->segs_per_sec; i++) >> @@ -736,6 +732,19 @@ static int get_victim_by_default(struct f2fs_sb_info *sbi, >> if (gc_type == BG_GC && test_bit(secno, dirty_i->victim_secmap)) >> goto next; >> >> + if (unlikely(is_sbi_flag_set(sbi, SBI_CP_DISABLED))) { >> + /* >> + * to avoid selecting candidate which has below valid >> + * block distribution: >> + * partial blocks are valid and all left ones are valid >> + * in previous checkpoint. >> + */ >> + if (p.alloc_mode == SSR || p.alloc_mode == AT_SSR) { >> + if (!segment_has_free_slot(sbi, segno)) >> + goto next; >> + } >> + } >> + >> if (is_atgc) { >> add_victim_entry(sbi, &p, segno); >> goto next; >> diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c >> index 2d5a82c4ca15..deaf57e13125 100644 >> --- a/fs/f2fs/segment.c >> +++ b/fs/f2fs/segment.c >> @@ -2650,6 +2650,26 @@ static void __refresh_next_blkoff(struct f2fs_sb_info *sbi, >> seg->next_blkoff++; >> } >> >> +bool segment_has_free_slot(struct f2fs_sb_info *sbi, int segno) >> +{ >> + struct sit_info *sit = SIT_I(sbi); >> + struct seg_entry *se = get_seg_entry(sbi, segno); >> + int entries = SIT_VBLOCK_MAP_SIZE / sizeof(unsigned long); >> + unsigned long *target_map = SIT_I(sbi)->tmp_map; >> + unsigned long *ckpt_map = (unsigned long *)se->ckpt_valid_map; >> + unsigned long *cur_map = (unsigned long *)se->cur_valid_map; >> + int i, pos; >> + >> + down_write(&sit->sentry_lock); >> + for (i = 0; i < entries; i++) >> + target_map[i] = ckpt_map[i] | cur_map[i]; >> + >> + pos = __find_rev_next_zero_bit(target_map, sbi->blocks_per_seg, 0); >> + up_write(&sit->sentry_lock); >> + >> + return pos < sbi->blocks_per_seg; >> +} >> + >> /* >> * This function always allocates a used segment(from dirty seglist) by SSR >> * manner, so it should recover the existing segment information of valid blocks >> > . >