From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A32FEB64DC for ; Fri, 14 Jul 2023 14:18:41 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B5CA98D0009; Fri, 14 Jul 2023 10:18:40 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B0C868D0005; Fri, 14 Jul 2023 10:18:40 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9FBF48D0009; Fri, 14 Jul 2023 10:18:40 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 92E018D0005 for ; Fri, 14 Jul 2023 10:18:40 -0400 (EDT) Received: from smtpin05.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 5D64312027E for ; Fri, 14 Jul 2023 14:18:40 +0000 (UTC) X-FDA: 81010423200.05.77FE907 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf18.hostedemail.com (Postfix) with ESMTP id 641B01C0026 for ; Fri, 14 Jul 2023 14:18:37 +0000 (UTC) Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=cT9x02C8; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf18.hostedemail.com: domain of djwong@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=djwong@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1689344317; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WWph7rENL6pntUpsIAcQ8JuSHCBmADIlULWoCE4uIOs=; b=7aj+Uiq1nDWjjQf5YOLpP02O31kkJO3nLFRjGFFUpP2fj3JSgahc3JPdFnwubWg7agEpdQ zVoGL8Z2TEstvGQ/c5UksQruum4kpyqrRkmf7JVChFjmGSZqcGTuliI7vdNGmeU7PK8rmr f1mnouzIoBupxUM89MSSmQsQoyokqlk= ARC-Authentication-Results: i=1; imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=cT9x02C8; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf18.hostedemail.com: domain of djwong@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=djwong@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1689344317; a=rsa-sha256; cv=none; b=kAayU6yuqBlNueB037+yWOCmjuVEL1WIX5/nK44OO8hr4dbuROO6y6xt9DcZTaeXOMAc9t OAylvzcIBZQm2rSZ/78nfH+I69zzIC3/Mtart9CN3thkov21/zOJorFMOQkgg0HKiSm9GS pIXsTx7E4xQ8drYGRHSBmk1J4bdXfgs= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3BA0961D32; Fri, 14 Jul 2023 14:18:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 72BAFC433C9; Fri, 14 Jul 2023 14:18:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689344315; bh=NBxojNf686LZaUvnbZGrisCG7GrRwbMsTcuYIic3v9c=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cT9x02C8K2KYjjYt9QFIQ8U+ruKyZ2V6vipN/Oqrdhl4xJajp4qhVag/OLTIS77Lz lAyGa+7Z+PROrY+Mq0ty6EiwVaPs/uGVAccr5spHGiNCnZ8hEVa8mcZ97skhAFAS8a fbrn+Le/SVYViz5BeW3vaXmqdoHarWNJmTxY+riQrEHlZHU9kQiNTNZJcrOIBGtgX1 VFj4qUjuODbq9j1PlZSmeQtaEhrGIbEnaIJ6wI+Tkscd+rQA7oeUd+IfXlb+hJZNkP FyoBPUWykAp76OKUuafuxU3ajfA0dS3Asen5HUtrD92Jo1op4ltUle/b4R0w35XxtK dAO87gEls58fw== Date: Fri, 14 Jul 2023 07:18:34 -0700 From: "Darrick J. Wong" To: Shiyang Ruan Cc: linux-mm@kvack.org, linux-xfs@vger.kernel.org, nvdimm@lists.linux.dev, linux-fsdevel@vger.kernel.org, dan.j.williams@intel.com, willy@infradead.org, jack@suse.cz, akpm@linux-foundation.org, mcgrof@kernel.org Subject: Re: [PATCH v12 2/2] mm, pmem, xfs: Introduce MF_MEM_REMOVE for unbind Message-ID: <20230714141834.GV108251@frogsfrogsfrogs> References: <20230629081651.253626-1-ruansy.fnst@fujitsu.com> <20230629081651.253626-3-ruansy.fnst@fujitsu.com> <2840406d-0b7d-9897-87f6-ef3627e9ed5d@fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <2840406d-0b7d-9897-87f6-ef3627e9ed5d@fujitsu.com> X-Rspamd-Queue-Id: 641B01C0026 X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: xqq9dmqojukay3zwci1m3d9wekrey37c X-HE-Tag: 1689344317-574750 X-HE-Meta: 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 wbE75yYL N5E1BUwxicnsPGbkmoVWfViUWPkXAL1VTEq86Q3x6BakfIl7XV6xOQ0qJs73AywTcYX5QD5p05Rsa4Ixv9eIJzk5tVPiKzlUR3I2uItxQGbnehx3XQOwIBZPz7Gt3OZqtkIlwQjRiSaFtvfzpQuErmniIJELf9qT26xMl6mU+AxAWzn0zx6D94dfzgvB3rrfpsz93eDa7clwWXQl+aPHEK+eEdhCuvMeZowraA/dlDTbtwoDJlNMpZ28ezduXme6mFbVdv/OvC14K3t1ncAMj/uHwA0l0xpvSekhTPwZUBfhAULvasXYXi5A6S0cIv+y6epcF5wGRXiLW+8QpkYZ7zquUTz33jvyf7MAFaBmJ1Z4qiG97XudXP3Z2VjZ7eSYLkINAGRWrdjUqFyXqPuQGUQyf4jS9D2PNequX5hhR3f69DuNwxB++ACQGWuqcY425SSGs X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, Jul 14, 2023 at 05:07:58PM +0800, Shiyang Ruan wrote: > Hi Darrick, > > Thanks for applying the 1st patch. > > Now, since this patch is based on the new freeze_super()/thaw_super() > api[1], I'd like to ask what's the plan for this api? It seems to have > missed the v6.5-rc1. > > [1] https://lore.kernel.org/linux-xfs/168688010689.860947.1788875898367401950.stgit@frogsfrogsfrogs/ 6.6. I intend to push the XFS UBSAN fixes to the list today for review. Early next week I'll resend the 6.5 rebase of the kernelfreeze series and push it to vfs-for-next. Some time after that will come large folio writes. --D > > -- > Thanks, > Ruan. > > > 在 2023/6/29 16:16, Shiyang Ruan 写道: > > This patch is inspired by Dan's "mm, dax, pmem: Introduce > > dev_pagemap_failure()"[1]. With the help of dax_holder and > > ->notify_failure() mechanism, the pmem driver is able to ask filesystem > > on it to unmap all files in use, and notify processes who are using > > those files. > > > > Call trace: > > trigger unbind > > -> unbind_store() > > -> ... (skip) > > -> devres_release_all() > > -> kill_dax() > > -> dax_holder_notify_failure(dax_dev, 0, U64_MAX, MF_MEM_PRE_REMOVE) > > -> xfs_dax_notify_failure() > > `-> freeze_super() // freeze (kernel call) > > `-> do xfs rmap > > ` -> mf_dax_kill_procs() > > ` -> collect_procs_fsdax() // all associated processes > > ` -> unmap_and_kill() > > ` -> invalidate_inode_pages2_range() // drop file's cache > > `-> thaw_super() // thaw (both kernel & user call) > > > > Introduce MF_MEM_PRE_REMOVE to let filesystem know this is a remove > > event. Use the exclusive freeze/thaw[2] to lock the filesystem to prevent > > new dax mapping from being created. Do not shutdown filesystem directly > > if configuration is not supported, or if failure range includes metadata > > area. Make sure all files and processes(not only the current progress) > > are handled correctly. Also drop the cache of associated files before > > pmem is removed. > > > > [1]: https://lore.kernel.org/linux-mm/161604050314.1463742.14151665140035795571.stgit@dwillia2-desk3.amr.corp.intel.com/ > > [2]: https://lore.kernel.org/linux-xfs/168688010689.860947.1788875898367401950.stgit@frogsfrogsfrogs/ > > > > Signed-off-by: Shiyang Ruan > > --- > > drivers/dax/super.c | 3 +- > > fs/xfs/xfs_notify_failure.c | 86 ++++++++++++++++++++++++++++++++++--- > > include/linux/mm.h | 1 + > > mm/memory-failure.c | 17 ++++++-- > > 4 files changed, 96 insertions(+), 11 deletions(-) > > > > diff --git a/drivers/dax/super.c b/drivers/dax/super.c > > index c4c4728a36e4..2e1a35e82fce 100644 > > --- a/drivers/dax/super.c > > +++ b/drivers/dax/super.c > > @@ -323,7 +323,8 @@ void kill_dax(struct dax_device *dax_dev) > > return; > > if (dax_dev->holder_data != NULL) > > - dax_holder_notify_failure(dax_dev, 0, U64_MAX, 0); > > + dax_holder_notify_failure(dax_dev, 0, U64_MAX, > > + MF_MEM_PRE_REMOVE); > > clear_bit(DAXDEV_ALIVE, &dax_dev->flags); > > synchronize_srcu(&dax_srcu); > > diff --git a/fs/xfs/xfs_notify_failure.c b/fs/xfs/xfs_notify_failure.c > > index 4a9bbd3fe120..f6ec56b76db6 100644 > > --- a/fs/xfs/xfs_notify_failure.c > > +++ b/fs/xfs/xfs_notify_failure.c > > @@ -22,6 +22,7 @@ > > #include > > #include > > +#include > > struct xfs_failure_info { > > xfs_agblock_t startblock; > > @@ -73,10 +74,16 @@ xfs_dax_failure_fn( > > struct xfs_mount *mp = cur->bc_mp; > > struct xfs_inode *ip; > > struct xfs_failure_info *notify = data; > > + struct address_space *mapping; > > + pgoff_t pgoff; > > + unsigned long pgcnt; > > int error = 0; > > if (XFS_RMAP_NON_INODE_OWNER(rec->rm_owner) || > > (rec->rm_flags & (XFS_RMAP_ATTR_FORK | XFS_RMAP_BMBT_BLOCK))) { > > + /* Continue the query because this isn't a failure. */ > > + if (notify->mf_flags & MF_MEM_PRE_REMOVE) > > + return 0; > > notify->want_shutdown = true; > > return 0; > > } > > @@ -92,14 +99,55 @@ xfs_dax_failure_fn( > > return 0; > > } > > - error = mf_dax_kill_procs(VFS_I(ip)->i_mapping, > > - xfs_failure_pgoff(mp, rec, notify), > > - xfs_failure_pgcnt(mp, rec, notify), > > - notify->mf_flags); > > + mapping = VFS_I(ip)->i_mapping; > > + pgoff = xfs_failure_pgoff(mp, rec, notify); > > + pgcnt = xfs_failure_pgcnt(mp, rec, notify); > > + > > + /* Continue the rmap query if the inode isn't a dax file. */ > > + if (dax_mapping(mapping)) > > + error = mf_dax_kill_procs(mapping, pgoff, pgcnt, > > + notify->mf_flags); > > + > > + /* Invalidate the cache in dax pages. */ > > + if (notify->mf_flags & MF_MEM_PRE_REMOVE) > > + invalidate_inode_pages2_range(mapping, pgoff, > > + pgoff + pgcnt - 1); > > + > > xfs_irele(ip); > > return error; > > } > > +static void > > +xfs_dax_notify_failure_freeze( > > + struct xfs_mount *mp) > > +{ > > + struct super_block *sb = mp->m_super; > > + > > + /* Wait until no one is holding the FREEZE_HOLDER_KERNEL. */ > > + while (freeze_super(sb, FREEZE_HOLDER_KERNEL) != 0) { > > + // Shall we just wait, or print warning then return -EBUSY? > > + delay(HZ / 10); > > + } > > +} > > + > > +static void > > +xfs_dax_notify_failure_thaw( > > + struct xfs_mount *mp) > > +{ > > + struct super_block *sb = mp->m_super; > > + int error; > > + > > + error = thaw_super(sb, FREEZE_HOLDER_KERNEL); > > + if (error) > > + xfs_emerg(mp, "still frozen after notify failure, err=%d", > > + error); > > + /* > > + * Also thaw userspace call anyway because the device is about to be > > + * removed immediately. > > + */ > > + thaw_super(sb, FREEZE_HOLDER_USERSPACE); > > +} > > + > > static int > > xfs_dax_notify_ddev_failure( > > struct xfs_mount *mp, > > @@ -120,7 +168,7 @@ xfs_dax_notify_ddev_failure( > > error = xfs_trans_alloc_empty(mp, &tp); > > if (error) > > - return error; > > + goto out; > > for (; agno <= end_agno; agno++) { > > struct xfs_rmap_irec ri_low = { }; > > @@ -165,11 +213,23 @@ xfs_dax_notify_ddev_failure( > > } > > xfs_trans_cancel(tp); > > + > > + /* > > + * Determine how to shutdown the filesystem according to the > > + * error code and flags. > > + */ > > if (error || notify.want_shutdown) { > > xfs_force_shutdown(mp, SHUTDOWN_CORRUPT_ONDISK); > > if (!error) > > error = -EFSCORRUPTED; > > - } > > + } else if (mf_flags & MF_MEM_PRE_REMOVE) > > + xfs_force_shutdown(mp, SHUTDOWN_FORCE_UMOUNT); > > + > > +out: > > + /* Thaw the fs if it is freezed before. */ > > + if (mf_flags & MF_MEM_PRE_REMOVE) > > + xfs_dax_notify_failure_thaw(mp); > > + > > return error; > > } > > @@ -197,6 +257,8 @@ xfs_dax_notify_failure( > > if (mp->m_logdev_targp && mp->m_logdev_targp->bt_daxdev == dax_dev && > > mp->m_logdev_targp != mp->m_ddev_targp) { > > + if (mf_flags & MF_MEM_PRE_REMOVE) > > + return 0; > > xfs_err(mp, "ondisk log corrupt, shutting down fs!"); > > xfs_force_shutdown(mp, SHUTDOWN_CORRUPT_ONDISK); > > return -EFSCORRUPTED; > > @@ -210,6 +272,12 @@ xfs_dax_notify_failure( > > ddev_start = mp->m_ddev_targp->bt_dax_part_off; > > ddev_end = ddev_start + bdev_nr_bytes(mp->m_ddev_targp->bt_bdev) - 1; > > + /* Notify failure on the whole device. */ > > + if (offset == 0 && len == U64_MAX) { > > + offset = ddev_start; > > + len = bdev_nr_bytes(mp->m_ddev_targp->bt_bdev); > > + } > > + > > /* Ignore the range out of filesystem area */ > > if (offset + len - 1 < ddev_start) > > return -ENXIO; > > @@ -226,6 +294,12 @@ xfs_dax_notify_failure( > > if (offset + len - 1 > ddev_end) > > len = ddev_end - offset + 1; > > + if (mf_flags & MF_MEM_PRE_REMOVE) { > > + xfs_info(mp, "device is about to be removed!"); > > + /* Freeze fs to prevent new mappings from being created. */ > > + xfs_dax_notify_failure_freeze(mp); > > + } > > + > > return xfs_dax_notify_ddev_failure(mp, BTOBB(offset), BTOBB(len), > > mf_flags); > > } > > diff --git a/include/linux/mm.h b/include/linux/mm.h > > index 27ce77080c79..a80c255b88d2 100644 > > --- a/include/linux/mm.h > > +++ b/include/linux/mm.h > > @@ -3576,6 +3576,7 @@ enum mf_flags { > > MF_UNPOISON = 1 << 4, > > MF_SW_SIMULATED = 1 << 5, > > MF_NO_RETRY = 1 << 6, > > + MF_MEM_PRE_REMOVE = 1 << 7, > > }; > > int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, > > unsigned long count, int mf_flags); > > diff --git a/mm/memory-failure.c b/mm/memory-failure.c > > index 5b663eca1f29..483b75f2fcfb 100644 > > --- a/mm/memory-failure.c > > +++ b/mm/memory-failure.c > > @@ -688,7 +688,7 @@ static void add_to_kill_fsdax(struct task_struct *tsk, struct page *p, > > */ > > static void collect_procs_fsdax(struct page *page, > > struct address_space *mapping, pgoff_t pgoff, > > - struct list_head *to_kill) > > + struct list_head *to_kill, bool pre_remove) > > { > > struct vm_area_struct *vma; > > struct task_struct *tsk; > > @@ -696,8 +696,15 @@ static void collect_procs_fsdax(struct page *page, > > i_mmap_lock_read(mapping); > > read_lock(&tasklist_lock); > > for_each_process(tsk) { > > - struct task_struct *t = task_early_kill(tsk, true); > > + struct task_struct *t = tsk; > > + /* > > + * Search for all tasks while MF_MEM_PRE_REMOVE, because the > > + * current may not be the one accessing the fsdax page. > > + * Otherwise, search for the current task. > > + */ > > + if (!pre_remove) > > + t = task_early_kill(tsk, true); > > if (!t) > > continue; > > vma_interval_tree_foreach(vma, &mapping->i_mmap, pgoff, pgoff) { > > @@ -1793,6 +1800,7 @@ int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, > > dax_entry_t cookie; > > struct page *page; > > size_t end = index + count; > > + bool pre_remove = mf_flags & MF_MEM_PRE_REMOVE; > > mf_flags |= MF_ACTION_REQUIRED | MF_MUST_KILL; > > @@ -1804,9 +1812,10 @@ int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, > > if (!page) > > goto unlock; > > - SetPageHWPoison(page); > > + if (!pre_remove) > > + SetPageHWPoison(page); > > - collect_procs_fsdax(page, mapping, index, &to_kill); > > + collect_procs_fsdax(page, mapping, index, &to_kill, pre_remove); > > unmap_and_kill(&to_kill, page_to_pfn(page), mapping, > > index, mf_flags); > > unlock: