Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp265116pxb; Wed, 14 Apr 2021 15:01:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz3xoRihdRkZEXwFwZvi56vY5eEcka7bM1P4XNrgjxT2uRAvyBq0E3DeJB4EfiyjvRC3IOE X-Received: by 2002:a63:5f88:: with SMTP id t130mr393657pgb.403.1618437701009; Wed, 14 Apr 2021 15:01:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618437701; cv=none; d=google.com; s=arc-20160816; b=ZtP9sXBQmoiXnSh9nikAiQyeMbFmfe7g0YwzTQA2Tc2Tv/uRbfiXIrRcoTsp3TXiSO ICHh3eOm3OCWc2IKdeHlFiFDt0gnqWeDrjeKePVHgECSjZ7AgG0lp6OBmDgp40OExFg/ 0tgALdKqq3yMyJDW9V9OXPPx5l9brUVgvMdXh9pAqbY39ffzNXpFW3Yqzox/I09Gzzjc he2yKJJt4uVn3AaQ34n8+RbackQXzAcImat2jnZIBgSaNanfwp/GBUlN26+emwUWDweb zqsQJW+tVs77jlXIBzI488eKMFK/YiZvBimpCC/OXAJb/SsRVZC/hQmyuKNdSMlre/2C xDiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=DaTspIKUcbQTrNpEPpolOcJtw8QgwlrcygJRR44wBXs=; b=oD8GiCVW/uKGz2hetl+9E8nMJzcPKCJNha6t/vbijA3kAWNV6k8wdaoat7B7xfliXU wQiRcQHL1XmQcc70a9663t6Q90NJaD1gFyWezXwvLHlLq/8MpkKOU5Q1gEAz1xbz0qrk wSvcRPHHeWnyT89vyZdivPHRc9lYw8uW31KgsmZQZoscZw4FfeKjrJyoYfQE/5KvWJd5 JDXfvvAVIdhGlKSOHJd25yuMUWiw3AMxUqttPmW5beejNtKIKBgZgMLXH6e9Kj2oq5vT +rkfijA4rXCg9Y+agcI+XL/DKnc4FFlly5YVlcEKUPWATymPrBnGXP9FqKpJWj0vAFyx CNcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d21si972405pfv.143.2021.04.14.15.01.28; Wed, 14 Apr 2021 15:01:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345512AbhDNImo (ORCPT + 99 others); Wed, 14 Apr 2021 04:42:44 -0400 Received: from out30-54.freemail.mail.aliyun.com ([115.124.30.54]:42516 "EHLO out30-54.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232348AbhDNImn (ORCPT ); Wed, 14 Apr 2021 04:42:43 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R191e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e01424;MF=baolin.wang@linux.alibaba.com;NM=1;PH=DS;RN=4;SR=0;TI=SMTPD_---0UVX0skD_1618389740; Received: from 30.21.164.69(mailfrom:baolin.wang@linux.alibaba.com fp:SMTPD_---0UVX0skD_1618389740) by smtp.aliyun-inc.com(127.0.0.1); Wed, 14 Apr 2021 16:42:20 +0800 Subject: Re: [PATCH v2 1/2] fuse: Fix possible deadlock when writing back dirty pages To: Miklos Szeredi Cc: Peng Tao , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org References: <807bb470f90bae5dcd80a29020d38f6b5dd6ef8e.1616826872.git.baolin.wang@linux.alibaba.com> From: Baolin Wang Message-ID: Date: Wed, 14 Apr 2021 16:42:34 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, 在 2021/4/13 16:57, Miklos Szeredi 写道: > On Mon, Apr 12, 2021 at 3:23 PM Baolin Wang > wrote: >> >> Hi Miklos, >> >> 在 2021/3/27 14:36, Baolin Wang 写道: >>> We can meet below deadlock scenario when writing back dirty pages, and >>> writing files at the same time. The deadlock scenario can be reproduced >>> by: >>> >>> - A writeback worker thread A is trying to write a bunch of dirty pages by >>> fuse_writepages(), and the fuse_writepages() will lock one page (named page 1), >>> add it into rb_tree with setting writeback flag, and unlock this page 1, >>> then try to lock next page (named page 2). >>> >>> - But at the same time a file writing can be triggered by another process B, >>> to write several pages by fuse_perform_write(), the fuse_perform_write() >>> will lock all required pages firstly, then wait for all writeback pages >>> are completed by fuse_wait_on_page_writeback(). >>> >>> - Now the process B can already lock page 1 and page 2, and wait for page 1 >>> waritehack is completed (page 1 is under writeback set by process A). But >>> process A can not complete the writeback of page 1, since it is still >>> waiting for locking page 2, which was locked by process B already. >>> >>> A deadlock is occurred. >>> >>> To fix this issue, we should make sure each page writeback is completed >>> after lock the page in fuse_fill_write_pages() separately, and then write >>> them together when all pages are stable. >>> >>> [1450578.772896] INFO: task kworker/u259:6:119885 blocked for more than 120 seconds. >>> [1450578.796179] kworker/u259:6 D 0 119885 2 0x00000028 >>> [1450578.796185] Workqueue: writeback wb_workfn (flush-0:78) >>> [1450578.796188] Call trace: >>> [1450578.798804] __switch_to+0xd8/0x148 >>> [1450578.802458] __schedule+0x280/0x6a0 >>> [1450578.806112] schedule+0x34/0xe8 >>> [1450578.809413] io_schedule+0x20/0x40 >>> [1450578.812977] __lock_page+0x164/0x278 >>> [1450578.816718] write_cache_pages+0x2b0/0x4a8 >>> [1450578.820986] fuse_writepages+0x84/0x100 [fuse] >>> [1450578.825592] do_writepages+0x58/0x108 >>> [1450578.829412] __writeback_single_inode+0x48/0x448 >>> [1450578.834217] writeback_sb_inodes+0x220/0x520 >>> [1450578.838647] __writeback_inodes_wb+0x50/0xe8 >>> [1450578.843080] wb_writeback+0x294/0x3b8 >>> [1450578.846906] wb_do_writeback+0x2ec/0x388 >>> [1450578.850992] wb_workfn+0x80/0x1e0 >>> [1450578.854472] process_one_work+0x1bc/0x3f0 >>> [1450578.858645] worker_thread+0x164/0x468 >>> [1450578.862559] kthread+0x108/0x138 >>> [1450578.865960] INFO: task doio:207752 blocked for more than 120 seconds. >>> [1450578.888321] doio D 0 207752 207740 0x00000000 >>> [1450578.888329] Call trace: >>> [1450578.890945] __switch_to+0xd8/0x148 >>> [1450578.894599] __schedule+0x280/0x6a0 >>> [1450578.898255] schedule+0x34/0xe8 >>> [1450578.901568] fuse_wait_on_page_writeback+0x8c/0xc8 [fuse] >>> [1450578.907128] fuse_perform_write+0x240/0x4e0 [fuse] >>> [1450578.912082] fuse_file_write_iter+0x1dc/0x290 [fuse] >>> [1450578.917207] do_iter_readv_writev+0x110/0x188 >>> [1450578.921724] do_iter_write+0x90/0x1c8 >>> [1450578.925598] vfs_writev+0x84/0xf8 >>> [1450578.929071] do_writev+0x70/0x110 >>> [1450578.932552] __arm64_sys_writev+0x24/0x30 >>> [1450578.936727] el0_svc_common.constprop.0+0x80/0x1f8 >>> [1450578.941694] el0_svc_handler+0x30/0x80 >>> [1450578.945606] el0_svc+0x10/0x14 >>> >>> Suggested-by: Peng Tao >>> Signed-off-by: Baolin Wang >> >> Do you have any comments for this patch set? Thanks. > > Hi, > > I guess this is related: > > https://lore.kernel.org/linux-fsdevel/20210209100115.GB1208880@miu.piliscsaba.redhat.com/ > > Can you verify that the patch at the above link fixes your issue? Sorry I missed this patch before, and I've tested this patch, it seems can solve the deadlock issue I met before. But look at this patch in detail, I think this patch only reduced the deadlock window, but did not remove the possible deadlock scenario completely like I explained in the commit log. Since the fuse_fill_write_pages() can still lock the partitail page in your patch, and will be wait for the partitail page waritehack is completed if writeback is set in fuse_send_write_pages(). But at the same time, a writeback worker thread may be waiting for trying to lock the partitail page to write a bunch of dirty pages by fuse_writepages(). Then the deadlock issue can still be occurred. And I think the deadlock issue I met is not same with the deadlock issue solved by your patch.