Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1493302rwl; Wed, 5 Apr 2023 18:53:03 -0700 (PDT) X-Google-Smtp-Source: AKy350YemifkI8jUdKzCZy9EgzJ3ZzrLHmeZkNZitRaYwuCCykGy5jTBqhlZVcky1zZDW3BKjPnj X-Received: by 2002:a17:906:828f:b0:92f:e40d:1489 with SMTP id h15-20020a170906828f00b0092fe40d1489mr4222982ejx.61.1680745983109; Wed, 05 Apr 2023 18:53:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680745983; cv=none; d=google.com; s=arc-20160816; b=fFRKn40zCSnmddTgPusb2Ucztv/OI8e3Z/zUv1K1ty0tr6dfhuoxpBsSf0vA6xcysn /DJMgTXquy7Kb9n+mQhzYICkxsCUyVoS5YT3dNSkemi6pzP/xFs26oU82puIrA/w4X4G 5xQ55UaQA8LlG6F3sUKbQoLQ/e24e66dSX/iNyKqrsLzjp62HjfduzD3ydWPRVzmeFl8 by0rLs00M4O506u9qIfORSclhGalP6yB8oBeMM0Bd18e8QbLyVGuU8AGg9FhBhTNJLzm nWjwJ2+GQGE779JyxhEM9kROr4wEkHt/9Yxa0ikeLX0XEpYfRwaWybf4epDz6aqzu1fx VAMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=XmQvIiYi/4i07AFgDk5IgQ9ctrFqbVOjaV5M6jy/SzE=; b=SsFZuT/hTvHb1529l14QW1D0j3IlfdxwPtgrxLEkHkp0izJQj/Atgtfuxj4zVAlijL SQSZe/g9OP7yZEL+yGp0da3q2T3A/9nc141aZ0SpHDuEvQ+lKc3LNBWWWbmncxoGmERv T77t/58fad5ap/nA9mGOVPGq/kuHZao7v6uRONkonC4tdQQYlD/3QWw+UAP9ZaiEI9fq MiFZffvRCmTgjrbg6GkQQ1VR1PuojUVEdbsNdA8CGE7SEugyfIRJ0c3BlAZzzxQbX66U UOK/1Bz5BnDgliWklTN/mM518uLm9wgcSbg6uhSotTW9VXftsRhBhQmPkXqvfh6aX1iZ tTJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aAton7TQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p14-20020a1709060e8e00b00949aadb2d86si230697ejf.645.2023.04.05.18.52.37; Wed, 05 Apr 2023 18:53:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aAton7TQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234794AbjDFBuI (ORCPT + 99 others); Wed, 5 Apr 2023 21:50:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49502 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233641AbjDFBuH (ORCPT ); Wed, 5 Apr 2023 21:50:07 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2E3EA65A9; Wed, 5 Apr 2023 18:50:06 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BD399642E0; Thu, 6 Apr 2023 01:50:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 88A1FC433D2; Thu, 6 Apr 2023 01:50:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1680745805; bh=xgpkfNiyM2OsqZ9AjY4VjyDtc1aONna/URR/VaLtHlg=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=aAton7TQlCgNxi38nrF0Di/+BG0JaOPRYgDRjd1hEVudb3rurcj+JPE0hrpS3vP5m kLdFzQLeoFO56ngekzX4tlDDvgneNXs2IdyLX8wM8TFOAwo+fbg0nBJL5GzOJutRQQ jR9xmxItGDDCvR+PCEOPfCVEIW7/CfpSfqQ5o5J/qsIjAvT1OJq14igoRsFBs4EOAV exhqmAZpsf8eXQXoSl2iwZxvW4CTjZ4TOYr4/soe3ULjuM2g70H68PflMyx4rqbtpr 0LrcBmGc+VK7K+n3Zwr78O4tpUkonUXd8mhRnN/Dk4pOKux0Gu6DZ2FWpazv9NS2cW hg3kSO5Ef2qJQ== Message-ID: <9dc4ba32-5be5-26d8-5dd2-9bd48d6b0af4@kernel.org> Date: Thu, 6 Apr 2023 09:50:01 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.9.1 Subject: Re: [f2fs-dev] [PATCH] f2fs: get out of a repeat loop when getting a locked data page Content-Language: en-US To: Jaegeuk Kim , Matthew Wilcox Cc: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, stable@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org References: <20230323213919.1876157-1-jaegeuk@kernel.org> <8aea02b0-86f9-539a-02e9-27b381e68b66@kernel.org> From: Chao Yu In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.6 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023/4/6 0:39, Jaegeuk Kim wrote: > On 03/27, Matthew Wilcox wrote: >> On Mon, Mar 27, 2023 at 08:30:33AM -0700, Jaegeuk Kim wrote: >>> On 03/26, Chao Yu wrote: >>>> On 2023/3/24 5:39, Jaegeuk Kim wrote: >>>>> https://bugzilla.kernel.org/show_bug.cgi?id=216050 >>>>> >>>>> Somehow we're getting a page which has a different mapping. >>>>> Let's avoid the infinite loop. >>>>> >>>>> Cc: >>>>> Signed-off-by: Jaegeuk Kim >>>>> --- >>>>> fs/f2fs/data.c | 8 ++------ >>>>> 1 file changed, 2 insertions(+), 6 deletions(-) >>>>> >>>>> diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c >>>>> index bf51e6e4eb64..80702c93e885 100644 >>>>> --- a/fs/f2fs/data.c >>>>> +++ b/fs/f2fs/data.c >>>>> @@ -1329,18 +1329,14 @@ struct page *f2fs_get_lock_data_page(struct inode *inode, pgoff_t index, >>>>> { >>>>> struct address_space *mapping = inode->i_mapping; >>>>> struct page *page; >>>>> -repeat: >>>>> + >>>>> page = f2fs_get_read_data_page(inode, index, 0, for_write, NULL); >>>>> if (IS_ERR(page)) >>>>> return page; >>>>> /* wait for read completion */ >>>>> lock_page(page); >>>>> - if (unlikely(page->mapping != mapping)) { >>>> >>>> How about using such logic only for move_data_page() to limit affect for >>>> other paths? >>> >>> Why move_data_page() only? If this happens, we'll fall into a loop in anywhere? >>> >>>> >>>> Jaegeuk, any thoughts about why mapping is mismatch in between page's one and >>>> inode->i_mapping? >>> >>>> >>>> After several times code review, I didn't get any clue about why f2fs always >>>> get the different mapping in a loop. >>> >>> I couldn't find the path to happen this. So weird. Please check the history in the >>> bug. >>> >>>> >>>> Maybe we can loop MM guys to check whether below folio_file_page() may return >>>> page which has different mapping? >>> >>> Matthew may have some idea on this? >> >> There's a lot of comments in the bug ... hard to come into this one >> cold. >> >> I did notice this one (#119): >> : Interestingly, ref count is 514, which looks suspiciously as a binary >> : flag 1000000010. Is it possible that during 5.17/5.18 implementation >> : of a "pin", somehow binary flag was written to ref count, or something >> : like '1 << ...' happens? >> >> That indicates to me that somehow you've got hold of a THP that is in >> the page cache. Probably shmem/tmpfs. That indicate to me a refcount >> problem that looks something like this: >> >> f2fs allocates a page >> f2fs adds the page to the page cache >> f2fs puts the reference to the page without removing it from the >> page cache (how?) > > Is it somewhat related to setting a bit in private field? IIUC, it looks the page reference is added/removed as pair. > > When we migrate the blocks, we do: > 1) get_lock_page() - f2fs_grab_cache_page - pagecache_get_page - __filemap_get_folio - no_page -> filemap_alloc_folio page_ref = 1 (referenced by caller) - filemap_add_folio page_ref = 2 (referenced by radix tree) > 2) submit read > 3) lock_page() > 3) set_page_dirty() > 4) set_page_private_gcing(page) page_ref = 3 (reference by private data) > > --- in fs/f2fs/f2fs.h > 1409 #define PAGE_PRIVATE_SET_FUNC(name, flagname) \ > 1410 static inline void set_page_private_##name(struct page *page) \ > 1411 { \ > 1412 if (!PagePrivate(page)) { \ > 1413 get_page(page); \ > 1414 SetPagePrivate(page); \ > 1415 set_page_private(page, 0); \ > 1416 } \ > 1417 set_bit(PAGE_PRIVATE_NOT_POINTER, &page_private(page)); \ > 1418 set_bit(PAGE_PRIVATE_##flagname, &page_private(page)); \ > 1419 } > > > 5) set_page_writebac() > 6) submit write > 7) unlock_page() > 8) put_page(page) page_ref = 2 (ref by caller was removed) > > Later, f2fs_invalidate_folio will do put_page again by: > clear_page_private_gcing(&folio->page); page_ref = 1 (ref by private was removed, and the last left ref is hold by radix tree) > > --- in fs/f2fs/f2fs.h > 1421 #define PAGE_PRIVATE_CLEAR_FUNC(name, flagname) \ > 1422 static inline void clear_page_private_##name(struct page *page) \ > 1423 { \ > 1424 clear_bit(PAGE_PRIVATE_##flagname, &page_private(page)); \ > 1425 if (page_private(page) == BIT(PAGE_PRIVATE_NOT_POINTER)) { \ > 1426 set_page_private(page, 0); \ > 1427 if (PagePrivate(page)) { \ > 1428 ClearPagePrivate(page); \ Since PagePrivate was cleared, so folio_detach_private in f2fs_invalidate_folio()/f2fs_release_folio will just skip drop reference. static inline void *folio_detach_private(struct folio *folio) { void *data = folio_get_private(folio); if (!folio_test_private(folio)) return NULL; folio_clear_private(folio); folio->private = NULL; folio_put(folio); return data; } Or am I missing something? Thanks, > 1429 put_page(page); \ > 1430 }\ > 1431 } \ > 1432 } > >> page is now free, gets reallocated into a THP >> lookup from the f2fs file finds the new THP >> things explode messily >> >> Checking page->mapping is going to avoid the messy explosion, but >> you'll still have a page in the page cache which doesn't actually >> belong to you, and that's going to lead to subtle data corruption. >> >> This should be caught by page_expected_state(), called from >> free_page_is_bad(), called from free_pages_prepare(). Do your testers >> have CONFIG_DEBUG_VM enabled? That might give you a fighting chance at >> finding the last place which called put_page(). It won't necessarily be >> the _wrong_ place to call put_page() (that may have happened earlier), >> but it may give you a clue. >> >>>> >>>> struct page *pagecache_get_page(struct address_space *mapping, pgoff_t index, >>>> int fgp_flags, gfp_t gfp) >>>> { >>>> struct folio *folio; >>>> >>>> folio = __filemap_get_folio(mapping, index, fgp_flags, gfp); >>>> if (IS_ERR(folio)) >>>> return NULL; >>>> return folio_file_page(folio, index); >>>> } >>>> >>>> Thanks, >>>> >>>>> - f2fs_put_page(page, 1); >>>>> - goto repeat; >>>>> - } >>>>> - if (unlikely(!PageUptodate(page))) { >>>>> + if (unlikely(page->mapping != mapping || !PageUptodate(page))) { >>>>> f2fs_put_page(page, 1); >>>>> return ERR_PTR(-EIO); >>>>> }