Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp6915pxb; Mon, 31 Jan 2022 03:55:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJyAu/7186r0q/OdWB36v4GlInIaAjN5aEQKsu77HZ3EjmSP6oS7M7FOPIs7E+zM09nY3o87 X-Received: by 2002:a63:2b4c:: with SMTP id r73mr16619018pgr.517.1643630139834; Mon, 31 Jan 2022 03:55:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643630139; cv=none; d=google.com; s=arc-20160816; b=RrZ4fo0IRDIS111sxI3vx4bZd8dHYJmPRACUqsQVCM771OrPjKEpoDb3Ub0y7A1HTy +g4RLPWswb19aAM3tLynbKTWr3REL7iOieGP01U5bJnzt8O4truzvL9VMXZLWnq5BTbd WolpD1wp8DAa5zPqGZtz8n2BPc7sgTOUevoSsuDwmyXT0BtkGUKQ8Pb//qqOBDZFuv7Z 1n5JoVXiWSQSzt3N4W/LxmwlxLOyYt9/jLGR0Gp//R9YjnymBNYHrhJfhW3UI25q+zC1 ZYvF1XQoYfrvokqPTKJhL87E+yzSNl5Y4c6vHhJuKTw8fGILah2XbNWRKNZ4xhiIKutw oovQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=DFblRwXXYjKA4J7nt9NGCBxiiZ4BsJAb4M9XzvDHqbY=; b=oCzHipVQ7Z8yJAhuB+68jHafeJTYWRWic5PwJBS2P8Yla78llM+tJfMcAekTgIeByL ZOMeJYlxStoMLFoT7pf/ayb58B6z+dCzyPmUsMeoUozTDTIz9DIlas9EVTHAxdg13TTv IIyjM8Nb4oaMAdon7M5Y0rlWQ+ykF1PBF4ae3cpCPoTve2ogf48DuMvDQNDeMOBssPK7 y1M3KNVGI2PIl/nlIwdmzBx1XaBLapz6VSYXVbqkDvVXJfhb4mmSKKhNHBVGRlYl8PbJ zRGS1wQgrAOWwlsmK4D/SBiAn5QsWhI7cCM3O4vrUPyZwJzOGydhT0P/3/eOEznWjrqN Onlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pKKn21Lm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d5si12423252pls.160.2022.01.31.03.55.25; Mon, 31 Jan 2022 03:55:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pKKn21Lm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237098AbiA2AhM (ORCPT + 99 others); Fri, 28 Jan 2022 19:37:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40508 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233942AbiA2AhJ (ORCPT ); Fri, 28 Jan 2022 19:37:09 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E435CC061714 for ; Fri, 28 Jan 2022 16:37:08 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8326860DBC for ; Sat, 29 Jan 2022 00:37:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BDFBFC340E7; Sat, 29 Jan 2022 00:37:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643416627; bh=ouiW9oGv6HXtWJIQRDQ98A6hortJtyz/aXTnLA/yjuM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pKKn21LmTef1+meSgnLxRAzGVJE/j1YKS9Y2dSpRubtjxTRb7/4pwt/lCvTsx6ErQ wbCW8Qc2RF0ITgt7flUqqqQEmjxAqthzRSnzhvuYNpYeB8QfWjnpBEpKxtC6rdB36m GKeS2w/qimQJJobuAmwz5EC7f/uahexPGRaUSpv72Xkj9I9/EpYiiqTnAnlClCgj+h E20CInzh/K62mSKSlCwa5+17x8/sF/fAyx/sSNltxvwMU7FDW16jov7S1c/Q3kLI5G XQ+BwWnlqB6t4YpuloIvNRYrpOPckYCE1Rxzy3iJSf7wKadLtxgwRbpaaw3+qMfjIF qjnBBlsUfE+mQ== Date: Fri, 28 Jan 2022 16:37:06 -0800 From: Jaegeuk Kim To: Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Zhiguo Niu , Jing Xia Subject: Re: [PATCH] f2fs: fix to avoid potential deadlock Message-ID: References: <20220127054449.24711-1-chao@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/28, Chao Yu wrote: > On 2022/1/28 5:59, Jaegeuk Kim wrote: > > On 01/27, Chao Yu wrote: > > > Quoted from Jing Xia's report, there is a potential deadlock may happen > > > between kworker and checkpoint as below: > > > > > > [T:writeback] [T:checkpoint] > > > - wb_writeback > > > - blk_start_plug > > > bio contains NodeA was plugged in writeback threads > > > > I'm still trying to understand more precisely. So, how is it possible to > > have bio having node write in this current context? > > IMO, after above blk_start_plug(), it may plug some inode's node page in kworker > during writebacking node_inode's data page (which should be node page)? Wasn't that added into a different task->plug? > > Thanks, > > > > > > - do_writepages -- sync write inodeB, inc wb_sync_req[DATA] > > > - f2fs_write_data_pages > > > - f2fs_write_single_data_page -- write last dirty page > > > - f2fs_do_write_data_page > > > - set_page_writeback -- clear page dirty flag and > > > PAGECACHE_TAG_DIRTY tag in radix tree > > > - f2fs_outplace_write_data > > > - f2fs_update_data_blkaddr > > > - f2fs_wait_on_page_writeback -- wait NodeA to writeback here > > > - inode_dec_dirty_pages > > > - writeback_sb_inodes > > > - writeback_single_inode > > > - do_writepages > > > - f2fs_write_data_pages -- skip writepages due to wb_sync_req[DATA] > > > - wbc->pages_skipped += get_dirty_pages() -- PAGECACHE_TAG_DIRTY is not set but get_dirty_pages() returns one > > > - requeue_inode -- requeue inode to wb->b_dirty queue due to non-zero.pages_skipped > > > - blk_finish_plug > > > > > > Let's try to avoid deadlock condition by forcing unplugging previous bio via > > > blk_finish_plug(current->plug) once we'v skipped writeback in writepages() > > > due to valid sbi->wb_sync_req[DATA/NODE]. > > > > > > Fixes: 687de7f1010c ("f2fs: avoid IO split due to mixed WB_SYNC_ALL and WB_SYNC_NONE") > > > Signed-off-by: Zhiguo Niu > > > Signed-off-by: Jing Xia > > > Signed-off-by: Chao Yu > > > --- > > > fs/f2fs/data.c | 6 +++++- > > > fs/f2fs/node.c | 6 +++++- > > > 2 files changed, 10 insertions(+), 2 deletions(-) > > > > > > diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c > > > index 76d6fe7b0c8f..932a4c81acaf 100644 > > > --- a/fs/f2fs/data.c > > > +++ b/fs/f2fs/data.c > > > @@ -3174,8 +3174,12 @@ static int __f2fs_write_data_pages(struct address_space *mapping, > > > /* to avoid spliting IOs due to mixed WB_SYNC_ALL and WB_SYNC_NONE */ > > > if (wbc->sync_mode == WB_SYNC_ALL) > > > atomic_inc(&sbi->wb_sync_req[DATA]); > > > - else if (atomic_read(&sbi->wb_sync_req[DATA])) > > > + else if (atomic_read(&sbi->wb_sync_req[DATA])) { > > > + /* to avoid potential deadlock */ > > > + if (current->plug) > > > + blk_finish_plug(current->plug); > > > goto skip_write; > > > + } > > > if (__should_serialize_io(inode, wbc)) { > > > mutex_lock(&sbi->writepages); > > > diff --git a/fs/f2fs/node.c b/fs/f2fs/node.c > > > index 556fcd8457f3..69c6bcaf5aae 100644 > > > --- a/fs/f2fs/node.c > > > +++ b/fs/f2fs/node.c > > > @@ -2106,8 +2106,12 @@ static int f2fs_write_node_pages(struct address_space *mapping, > > > if (wbc->sync_mode == WB_SYNC_ALL) > > > atomic_inc(&sbi->wb_sync_req[NODE]); > > > - else if (atomic_read(&sbi->wb_sync_req[NODE])) > > > + else if (atomic_read(&sbi->wb_sync_req[NODE])) { > > > + /* to avoid potential deadlock */ > > > + if (current->plug) > > > + blk_finish_plug(current->plug); > > > goto skip_write; > > > + } > > > trace_f2fs_writepages(mapping->host, wbc, NODE); > > > -- > > > 2.32.0