Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2162104pxb; Fri, 22 Oct 2021 15:33:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxjecKUmRPljx1ATMukYq2ey2bnuorFrh4RX1n6v9A/YuRgKiZwJvmmHPd7WSeAKP+vDdif X-Received: by 2002:a63:f05:: with SMTP id e5mr1870222pgl.226.1634942000507; Fri, 22 Oct 2021 15:33:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634942000; cv=none; d=google.com; s=arc-20160816; b=N3KWXw3dtom47Tp964ZSNQEgULts/m4SVJmrU1pReCFy6Kz2H8/npv14Yx06FTNFiy opb1O9unJzeidj65Qe4WBKQpgSQn6tK/cPAQ0wqAtPA53gLcTKAViWKwKKwu5TwbhHwS beowG+uJjkGHxQJcGs+paMcmY/zdxd48VoApE6zqvRV8ZEpcP+EJu1DAOBbC4pg3nsSe CKCls7mTxnN/jNvaEbTO00Hio+1XZAe1PSn/ef/s/1AO9OuygQJT61pmv/tC6H06XSXG N3myEXnNg+U7EwIfqc6LYa3Q0X6mm/cpajLq/UzLRSFnAcUFci9EkygdnP3+GSAXraJl yOgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hZeH/6FHgerT+YH6jl5wZNUAXEzrpwBKg9kN8iwOAaY=; b=r2E7VZFDfG6H8K2y+zaY7jyIu7EN8xs3lrH+6iI5aQuaJCtSeMrwwgy1OZh5us34ll Hb6EOYpbYlH6wX8pNXZsjrDjgXDaNUdl4oDy2d/kYIPtQAtlpIkXkSHfYxLycduTOzgU m2/jjKefeD7IHiBAZHhtvzg7EEOBL/iIdau1eiOhwtmOc/9eJ9yozJWZm1dsggNWTTkM vb+81LP9pGmSqk50t3PWkwCPOxkJ+tHDgSfLg2u3JFAA1t30tr0SFjrAQ4U/MrOxKaSF NLZhIs8vYTqhmFqlEQ72BRpmIA9pgVq6z1ALHGiUVDhMeKX2S2veM9sfQYSBnwkqUPqO w9hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@shutemov-name.20210112.gappssmtp.com header.s=20210112 header.b=yxrVbSMA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y13si17753733pjm.146.2021.10.22.15.33.07; Fri, 22 Oct 2021 15:33:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@shutemov-name.20210112.gappssmtp.com header.s=20210112 header.b=yxrVbSMA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232208AbhJVWeX (ORCPT + 99 others); Fri, 22 Oct 2021 18:34:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50258 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234336AbhJVWeW (ORCPT ); Fri, 22 Oct 2021 18:34:22 -0400 Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 599C3C061764 for ; Fri, 22 Oct 2021 15:32:04 -0700 (PDT) Received: by mail-lf1-x132.google.com with SMTP id g36so1505653lfv.3 for ; Fri, 22 Oct 2021 15:32:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov-name.20210112.gappssmtp.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=hZeH/6FHgerT+YH6jl5wZNUAXEzrpwBKg9kN8iwOAaY=; b=yxrVbSMAz/RZ/VDn9pVr3nNNhqz1tYPOSqgH7Wq/2V3kCcr84pdYz4/S1g7ICC/LrA 3qVxNxy3gLG4Pt903bQUtQh9X9tKzRAicdo2psctU9sP4ygrueC+ZX8yXEPnQDJvahXe 9LkqIi6O6hXopC4bINvgCDObrZ1YA5xzZnsxocyy0tSRe+65bCCmA9w3GVRiyw8nNJp+ 6qeKRiB92it9IQiWK2Lr/pGCtmEygTxp5bEhaUYNQ3qwlDmIg1lFlXoCTCoBKfZHfdYi oinkZCEILXJCje4mOT1djUNdEQa+JZpZFB92IwtdfCm2eERVtjDGHoR1TPII9LLzgQ0G fG+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=hZeH/6FHgerT+YH6jl5wZNUAXEzrpwBKg9kN8iwOAaY=; b=kw3jHFUMFSBM++mkHaySJVm6r1Q7QWM4q0SpDJuKRArSqNPn3v8mKEVBmYLow2HLfR 4aM3nBJJlnz9fsdpduGteSQngKpM0XewdDvUMzh5Q2i3YZrBkBPNmzkSj5DFhfOJ/5MV Uqq+pEVXdwnrz44XefZGI0ZAWgn92xTPvrUsaKXQBUX2g1ORtvpZbYk7i/BUEaQsdkFw PDbfs23NGROoO2xlDHhb6ivJVIFjkIBvrdy6BeReERO4TMMtmotNSmu5pqBBziSEwJmt zHil36qMcIqD2ePTkwPBZXsoZjiCvV2nesZl8GUv0LsBSwCLdBvcgTx6kJuY8MlZndGm ov0A== X-Gm-Message-State: AOAM533/ls5mGmge88LNH7eUxhM8CFxQ6tB8FbFnclRGdgC2Y+UaQvDn uaW79brHBkR/MoeULwbPT+ho0A== X-Received: by 2002:a05:6512:21cb:: with SMTP id d11mr2208016lft.579.1634941922655; Fri, 22 Oct 2021 15:32:02 -0700 (PDT) Received: from box.localdomain ([86.57.175.117]) by smtp.gmail.com with ESMTPSA id x4sm848531lfq.246.2021.10.22.15.32.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Oct 2021 15:32:02 -0700 (PDT) Received: by box.localdomain (Postfix, from userid 1000) id CED1F10315F; Sat, 23 Oct 2021 01:32:06 +0300 (+03) Date: Sat, 23 Oct 2021 01:32:06 +0300 From: "Kirill A. Shutemov" To: Rongwei Wang Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, akpm@linux-foundation.org, willy@infradead.org, song@kernel.org, william.kucharski@oracle.com, hughd@google.com, shy828301@gmail.com Subject: Re: [PATCH RESEND] mm, thp: bail out early in collapse_file for writeback page Message-ID: <20211022223206.2ns74vvfbap2i4p7@box.shutemov.name> References: <20211022023052.33114-1-rongwei.wang@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211022023052.33114-1-rongwei.wang@linux.alibaba.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 22, 2021 at 10:30:52AM +0800, Rongwei Wang wrote: > Currently collapse_file does not explicitly check PG_writeback, instead, > page_has_private and try_to_release_page are used to filter writeback > pages. This does not work for xfs with blocksize equal to or larger > than pagesize, because in such case xfs has no page->private. > > This makes collapse_file bail out early for writeback page. Otherwise, > xfs end_page_writeback will panic as follows. > > page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32 > aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so" > flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback) > raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8 > raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000 > page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u <= 127u)) > page->mem_cgroup:ffff0000c3e9a000 > ------------[ cut here ]------------ > kernel BUG at include/linux/mm.h:1212! > Internal error: Oops - BUG: 0 [#1] SMP > Modules linked in: > BUG: Bad page state in process khugepaged pfn:84ef32 > xfs(E) > page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32 > libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ... > CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ... > pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--) > pc : end_page_writeback+0x1c0/0x214 > lr : end_page_writeback+0x1c0/0x214 > sp : ffff800011ce3cc0 > x29: ffff800011ce3cc0 x28: 0000000000000000 > x27: ffff000c04608040 x26: 0000000000000000 > x25: ffff000c04608040 x24: 0000000000001000 > x23: ffff0003f88c8530 x22: 0000000000001000 > x21: ffff0003f88c8530 x20: 0000000000000000 > x19: fffffe00201bcc80 x18: 0000000000000030 > x17: 0000000000000000 x16: 0000000000000000 > x15: ffff000c018f9760 x14: ffffffffffffffff > x13: ffff8000119d72b0 x12: ffff8000119d6ee3 > x11: ffff8000117b69b8 x10: 00000000ffff8000 > x9 : ffff800010617534 x8 : 0000000000000000 > x7 : ffff8000114f69b8 x6 : 000000000000000f > x5 : 0000000000000000 x4 : 0000000000000000 > x3 : 0000000000000400 x2 : 0000000000000000 > x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > end_page_writeback+0x1c0/0x214 > iomap_finish_page_writeback+0x13c/0x204 > iomap_finish_ioend+0xe8/0x19c > iomap_writepage_end_bio+0x38/0x50 > bio_endio+0x168/0x1ec > blk_update_request+0x278/0x3f0 > blk_mq_end_request+0x34/0x15c > virtblk_request_done+0x38/0x74 [virtio_blk] > blk_done_softirq+0xc4/0x110 > __do_softirq+0x128/0x38c > __irq_exit_rcu+0x118/0x150 > irq_exit+0x1c/0x30 > __handle_domain_irq+0x8c/0xf0 > gic_handle_irq+0x84/0x108 > el1_irq+0xcc/0x180 > arch_cpu_idle+0x18/0x40 > default_idle_call+0x4c/0x1a0 > cpuidle_idle_call+0x168/0x1e0 > do_idle+0xb4/0x104 > cpu_startup_entry+0x30/0x9c > secondary_start_kernel+0x104/0x180 > Code: d4210000 b0006161 910c8021 94013f4d (d4210000) > ---[ end trace 4a88c6a074082f8c ]--- > Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt > > Fixes: 99cb0dbd47a1 ("mm,thp: add read-only THP support for (non-shmem) FS") > Suggested-by: Yang Shi > Signed-off-by: Xu Yu > Signed-off-by: Rongwei Wang > Cc: > Reviewed-by: Matthew Wilcox (Oracle) > Reviewed-by: Yang Shi Okay, it makes sense: Acked-by: Kirill A. Shutemov I would also add a sentance in the commit message that PG_writeback setting is serialized with page_lock(). I have not had experience with writeback and it was something that I had to dig up. > --- > mm/khugepaged.c | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/mm/khugepaged.c b/mm/khugepaged.c > index 045cc579f724..48de4e1b0783 100644 > --- a/mm/khugepaged.c > +++ b/mm/khugepaged.c > @@ -1763,6 +1763,10 @@ static void collapse_file(struct mm_struct *mm, > filemap_flush(mapping); > result = SCAN_FAIL; > goto xa_unlocked; > + } else if (PageWriteback(page)) { > + xas_unlock_irq(&xas); > + result = SCAN_FAIL; > + goto xa_unlocked; > } else if (trylock_page(page)) { > get_page(page); > xas_unlock_irq(&xas); > @@ -1798,7 +1802,8 @@ static void collapse_file(struct mm_struct *mm, > goto out_unlock; > } > > - if (!is_shmem && PageDirty(page)) { > + if (!is_shmem && (PageDirty(page) || > + PageWriteback(page))) { > /* > * khugepaged only works on read-only fd, so this > * page is dirty because it hasn't been flushed > -- > 2.27.0 > > -- Kirill A. Shutemov