Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp923540rwb; Thu, 18 Aug 2022 15:02:12 -0700 (PDT) X-Google-Smtp-Source: AA6agR6OaVk7fBKb9dODrWe26CIJegmiC36uQ7tRhfF0/rteqD4y1y4RASKQP16SPPPmCMB6AZYg X-Received: by 2002:a05:6402:3552:b0:43d:a634:3997 with SMTP id f18-20020a056402355200b0043da6343997mr3646041edd.389.1660860131817; Thu, 18 Aug 2022 15:02:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660860131; cv=none; d=google.com; s=arc-20160816; b=xPEtd1j+xiP4sRjpx8L/tqpc9WQ7mJQN+nAS0u35OjtOBi69B1fCr2dqMqI+tlT5CR lO/jzipaezCUEninZ8zAlPnQkyrdN3oknFQQPQf4t65OyRmPVtUqTMkJDmOiYFzV2bqz ZSDAk0YUbroh8WSOPVd4JZX4eCuZx0G8gRwDMUBVDek1vkA+Q/5XXbjBfD3fSBoSZvjM Ua7CFgF+afAmo5LBp5SEfF+TRviHCvLP9KnAzMnwAw4w+lOafJilpp9biak9uwGRvoCI /MgOW/ra0uMwTM5b415EMwtxpNaF5+7JO4LenZy8fF1NjwQ65LZucRw6KMtYKtuidygz 89NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=KTqXQ2Ic1K0oDWac9atBi+pWCvviJvvIY6kgvyi8LVA=; b=w3tXwgJBNZrVxMVN54guuMlT0ubDboPvaJs2VjbiHp3whqdMIyjYzfiuUqvgIYVZFU iltW/tGQcyOyDmTqhgseQFT8CFaRE/smlKwa6VZ0nFslp/pW2Z5dFTM6R7ahmggL0Kbd WBNkoZwsrYFHNQX1n3MZAR4edAjla/pzG8Dsb3YiC4UWP505zPo4n5M5T0EZAzr0N0WF pG8TnBge+sWAKmf1PWmjEEtGwNoPmn+DUSjHQCCEY9SsRzyzscaEDVoc6jx4cpcLlCyV 7eLv6eolvefaAk9mla86viXkoKa3KaW0J9oqkI0dxrGsvh2XopON0buEug6xKbOIqr1v 6jUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id he42-20020a1709073daa00b007331efb8a1asi2072967ejc.44.2022.08.18.15.01.44; Thu, 18 Aug 2022 15:02:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241451AbiHRV6m (ORCPT + 99 others); Thu, 18 Aug 2022 17:58:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54106 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232055AbiHRV6l (ORCPT ); Thu, 18 Aug 2022 17:58:41 -0400 Received: from mail105.syd.optusnet.com.au (mail105.syd.optusnet.com.au [211.29.132.249]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 130E412601; Thu, 18 Aug 2022 14:58:35 -0700 (PDT) Received: from dread.disaster.area (pa49-181-52-176.pa.nsw.optusnet.com.au [49.181.52.176]) by mail105.syd.optusnet.com.au (Postfix) with ESMTPS id 7868410E8A62; Fri, 19 Aug 2022 07:58:33 +1000 (AEST) Received: from dave by dread.disaster.area with local (Exim 4.92.3) (envelope-from ) id 1oOnX6-00EkRF-AQ; Fri, 19 Aug 2022 07:58:32 +1000 Date: Fri, 19 Aug 2022 07:58:32 +1000 From: Dave Chinner To: "Darrick J. Wong" Cc: Brian Foster , Matthew Wilcox , linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Christoph Hellwig , linux-mm@kvack.org Subject: Re: Multi-page folio issues in 5.19-rc4 (was [PATCH v3 25/25] xfs: Support large folios) Message-ID: <20220818215832.GH3600936@dread.disaster.area> References: <20220628073120.GI227878@dread.disaster.area> <20220628221757.GJ227878@dread.disaster.area> <20220817093627.GZ3600936@dread.disaster.area> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Optus-CM-Score: 0 X-Optus-CM-Analysis: v=2.4 cv=OJNEYQWB c=1 sm=1 tr=0 ts=62feb60b a=O3n/kZ8kT9QBBO3sWHYIyw==:117 a=O3n/kZ8kT9QBBO3sWHYIyw==:17 a=kj9zAlcOel0A:10 a=biHskzXt2R4A:10 a=7-415B0cAAAA:8 a=GHxbeFixHzRCEPZxQnkA:9 a=CjuIK1q_8ugA:10 a=biEYGPWJfzWAr4FL6Ov7:22 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 17, 2022 at 04:53:31PM -0700, Darrick J. Wong wrote: > On Wed, Aug 17, 2022 at 07:36:27PM +1000, Dave Chinner wrote: > > On Wed, Jun 29, 2022 at 08:57:30AM -0400, Brian Foster wrote: > > > Just based on Willy's earlier comment.. what I would probably be a > > > little careful/curious about here is whether the accounting fix leads to > > > an indirect behavior change that does impact reproducibility of the > > > corruption problem. For example, does artificially escalated dirty page > > > tracking lead to increased reclaim/writeback activity than might > > > otherwise occur, and thus contend with the fs workload? > > > > Yeah, I think you're right, Brian. There is an underlying problem > > here, and the writeback/memory pressure bugs exposed it for everyone > > to see. IOWs, we do indeed have a pre-existing problem with partial > > writes, iomap, unwritten extents, writeback and memory reclaim. > > > > (Please s/page/folio/ rather than complain I'm calling things pages > > and not folios, I'm juggling between RHEL-8 code and upstream > > here and it's just easier to refer to everything as pages as I write > > it.) > > > > (I'm assuming people are familiar with the iomap buffered IO code > > at this point.) > > > > Let's do a partial write into a page. Let's say the second half of > > the page. __iomap_begin_write() drops into iomap_adjust_read_range() > > to determine the range that needs zeroing or reading from disk. We > > then call iomap_block_needs_zeroing() to determine if we zero - > > which we do if it's a newly allocated or unwritten extent. Otherwise > > we read it from disk. > > > > Let's put this partial write over a large unwritten extent, which > > means we zero the first part of the page, and that writing it back > > runs unwritten extent conversion at IO completion. This changes the > > extent backing this file offset from unwritten to written. > > > > Then, add extreme memory pressure, so writeback is already running > > and soon after the page has been dirtied it gets marked for > > cleaning. Therefore, we have the possibility of background IO > > submission and memory reclaim occurring at the same time as new > > writes are occurring to the file. > > > > To that end, let's add a large racing write that *ends* on this same > > page that we have already partially filled with data - it will fill > > the start of the page that currently contains zeros with real data. > > > > Let's start that write() just before writeback of the already > > uptodate partial page starts. iomap_apply will map the entire > > write (and well beyond) as a single unwritten extent. This extent is > > the same extent that the original page in the page cache already > > covers, and this write would end by filling the remaining part of > > that write. > > > > While that second write is running around in the page cache > > copy-in loop for the unwritten extent that backs that range, IO > > submission runs and completes and converts the original partially > > filled page to a written extent, then marks it clean. > > So if I understand this correctly -- > > Thread 1 fallocates 1G of contiguous space and writes 38 bytes to the > end of that gigabyte. We instantiate a folio X for the region, zero the > parts we're not going to write, and copy the bytes we did want to write > into folio X. The folio is now uptodate and dirty. Thread 1 goes away. > > Thread 2 starts a (1G-38) write of that fallocated (and mostly > unwritten) space. It proceeds very slowly, one page at a time; it'll be > a while before it gets to folio X. > > ramsnake.exe fires up and pushes the system hard into memory reclaim. > Reclaim initiates dirty writeback of folio X, which writes it to disk > and does the unwritten extent conversion. Reclaim then removes X from > the page cache, and frees X. > > Thread 2 finally gets to the end of its 1G write. It is still using the > cached 1G unwritten mapping from before, unaware that some of the > mapping has changed to written state. It grabs a folio for (1G - 38), > but it gets folio Y instead of folio X. Y is not uptodate, so thread 2 > copies bytes from userspace and zeroes the last 38 bytes. > > **WRONG** > > We now have folio Y with zeroes in the last 38 bytes, instead of > whatever thread 1 wrote. Writeback pushes Y to disk, clobbering those > 38 bytes forever. Yes, that's pretty much it. > > [ Ayup, the extent map of the file just changed to be different > > to the iomap that the current write() thinks the file layout has. ] > > > > Further, because the partially written page is now clean, > > memory reclaim can snaffle it up and it gets removed from the page > > cache. > > > > The second write finally gets to the last page of it's write and > > doesn't find it in the page cache because memory reclaim removed it. > > So it pulls a new page into the page cache in iomap_begin_write(), > > and then in __iomap_begin_write we see that the we need to fill the > > second half of the page with either zeros or data from disk. > > > > We know that this data is on disk as the extent is now in written > > state. *However*, the cached iomap that we are currently using for > > the write() says the range is -unwritten-, and so at that point > > iomap_block_needs_zeroing() says "page needs zeroing". Hence > > __iomap_begin_write zeroes the second half of the page instead of > > reading it from disk, obliterating the data that the previous write > > had already written there. > > Yup. > > > Ouchy, we have data corruption because the incoming write holds a > > stale cached iomap...... > > > > At this point, I had a nasty feeling of deja vu. > > > > Oh, yeah, we already infrastructure in place to avoid using stale > > cached iomaps in ->writepages.... > > > > That is, iomap_writepage_map() calls ->map_block for every filesytem > > block, even though the iomap_writepage_ctx has a cached iomap in it. > > That's so the filesystem can check that the cached iomap is still > > valid whilst the page we are writing back is held locked. This > > protects writeback against races with truncate, hole punch, etc. > > > > XFS does this via a call to xfs_imap_valid() - we keep a generation > > number in the XFS extent trees that is bumped on every change so > > that we can check whether a cached iomap is still valid. If the > > generation numbers don't match, then we generate a new iomap for the > > writepage context.... > > > > What is clear to me now is that we have the same stale cached iomap > > problem with iomap_apply() because writeback can change the extent > > map state in a way that influence incoming writes and those updates > > are not in any way serialised against the incoming write IO path. > > > > Hence we have to validate that the cached iomap is not stale before > > we decide what to do with a new page in the page cache (zero or read > > from disk), and we have to do this iomap validation when the newly > > instantiated page is locked and ready for initialisation. > > > > I have not thought past this point - I'm only *just* smart enough to > > be able to dig out the root cause of this problem. No scratch that, > > I'm not smart, just stubborn enough to ignore the fact I've got the > > analysis wrong at least a dozen times already. > > > > That said, this stale mapping problem existed long before we started > > using unwritten extents for delayed allocation. The change to use > > unwritten extents (to fix other data corruption issues) exposed us > > to in-memory zeroing in this race condition case rather reading the > > block of data from disk. We just hadn't armed the landmine.... > > > > I suspect we are going to need a new iomap validation operation, and > > require the iomap actors to be able to handle iomap validation > > failure. What that looks like, I don't know as my brain > > turned to goo and dribbled out my ears about 4 hours ago.... > > Euughg. I suppose this means that ->iomap_begin has to be able to stuff > xfs_ifork.if_seq into a cookie value that we can set in struct iomap > somewhere? And then iomap has to be able to call back to XFS to > revalidate iomap.cookie? And if iomap.cookie != xfs_ifork.if_seq, then > I guess iomap will just ... unlock and put the folio, and return EAGAIN > (or something) so that its caller will return however many bytes have > been dirtied to iomap_apply so that _apply will go get a fresh mapping? Yeah, something like that. I have not had time to think this through any further than what you've just written. It does not look like it will be trivial, though, and it points out that every filesystem using iomap for multi-page extent maps will need to implement iomap invalidation detection in some way. We already have that for XFS with the sequence numbers, but I'm betting that none of the other filesystems that use iomap have the internal infrastructure to track racing extent map changes... Cheers, Dave. -- Dave Chinner david@fromorbit.com