From: Shiyang Ruan <ruansy.fnst@fujitsu.com>
To: Dave Chinner <david@fromorbit.com>
Cc: <linux-xfs@vger.kernel.org>, <nvdimm@lists.linux.dev>,
<linux-fsdevel@vger.kernel.org>, <linux-mm@kvack.org>,
<djwong@kernel.org>, <dan.j.williams@intel.com>,
<hch@infradead.org>, <jane.chu@oracle.com>,
<akpm@linux-foundation.org>, <willy@infradead.org>
Subject: Re: [PATCH v10 3/3] mm, pmem, xfs: Introduce MF_MEM_REMOVE for unbind
Date: Fri, 24 Mar 2023 17:49:04 +0800 [thread overview]
Message-ID: <7ba8c1f6-b9fe-714a-cd40-2b9e17ea61e7@fujitsu.com> (raw)
In-Reply-To: <b1d9fc03-1a71-a75f-f87b-5819991e4eb2@fujitsu.com>
在 2023/3/21 18:59, Shiyang Ruan 写道:
>
>
> 在 2023/2/27 18:06, Shiyang Ruan 写道:
>>
>>
>> 在 2023/2/27 8:07, Dave Chinner 写道:
>>> On Fri, Feb 17, 2023 at 02:48:32PM +0000, Shiyang Ruan wrote:
>>>> This patch is inspired by Dan's "mm, dax, pmem: Introduce
>>>> dev_pagemap_failure()"[1]. With the help of dax_holder and
>>>> ->notify_failure() mechanism, the pmem driver is able to ask filesystem
>>>> (or mapped device) on it to unmap all files in use and notify processes
>>>> who are using those files.
>>>>
>>>> Call trace:
>>>> trigger unbind
>>>> -> unbind_store()
>>>> -> ... (skip)
>>>> -> devres_release_all() # was pmem driver ->remove() in v1
>>>> -> kill_dax()
>>>> -> dax_holder_notify_failure(dax_dev, 0, U64_MAX,
>>>> MF_MEM_PRE_REMOVE)
>>>> -> xfs_dax_notify_failure()
>>>>
>>>> Introduce MF_MEM_PRE_REMOVE to let filesystem know this is a remove
>>>> event. So do not shutdown filesystem directly if something not
>>>> supported, or if failure range includes metadata area. Make sure all
>>>> files and processes are handled correctly.
>>>>
>>>> [1]:
>>>> https://lore.kernel.org/linux-mm/161604050314.1463742.14151665140035795571.stgit@dwillia2-desk3.amr.corp.intel.com/
>>>>
>>>> Signed-off-by: Shiyang Ruan <ruansy.fnst@fujitsu.com>
>>>
>>> .....
>>>
>>>> ---
>>>> @@ -225,6 +242,15 @@ xfs_dax_notify_failure(
>>>> if (offset + len - 1 > ddev_end)
>>>> len = ddev_end - offset + 1;
>>>> + if (mf_flags & MF_MEM_PRE_REMOVE) {
>>>> + xfs_info(mp, "device is about to be removed!");
>>>> + error = freeze_super(mp->m_super);
>>>> + if (error)
>>>> + return error;
>>>> + /* invalidate_inode_pages2() invalidates dax mapping */
>>>> + super_drop_pagecache(mp->m_super, invalidate_inode_pages2);
>>>> + }
>>>
>>> Why do you still need to drop the pagecache here? My suggestion was
>>> to replace it with freezing the filesystem at this point is to stop
>>> it being dirtied further before the device remove actually occurs.
>>> The userspace processes will be killed, their DAX mappings reclaimed
>>> and the filesystem shut down before device removal occurs, so
>>> super_drop_pagecache() is largely superfluous as it doesn't actually
>>> provide any protection against racing with new mappings or dirtying
>>> of existing/newly created mappings.
>>>
>>> Freezing doesn't stop the creation of new mappings, either, it just
>>> cleans all the dirty mappings and halts anything that is trying to
>>
>> This is the point I wasn't aware of.
>>
>>> dirty existing clean mappings. It's not until we kill the userspace
>>> processes that new mappings will be stopped, and it's not until we
>>> shut the filesystem down that the filesystem itself will stop
>>> accessing the storage.
>>>
>>> Hence I don't see why you retained super_drop_pagecache() here at
>>> all. Can you explain why it is still needed?
>>
>>
>> So I was just afraid that it's not enough for rmap & processes killer
>> to invalidate the dax mappings. If something error happened during
>> the rmap walker, the fs will shutdown and there is no chance to
>> invalidate the rest mappings whose user didn't be killed yet.
>>
>> Now that freezing the fs is enough, I will remove the drop cache code.
>
> I removed the drop cache code, then kernel always went into crash when
> running the test[1]. After the investigation, I found that the crash is
> cause by accessing (invalidate dax pages when umounting fs) the page of
> a pmem while the pmem has been removed.
>
> According to the design, the dax page should have been invalidated by
> mf_dax_kill_procs() but it didn't. I found two reasons:
> 1. collect_procs_fsdax() only kills the current process
> 2. unmap_mapping_range() doesn't invalidate the dax pages
> (disassociate dax entry in fs/dax.c), which causes the crash in my test
>
> So, I think we should:
> 1. pass the mf_flag to collect_procs_fsdax() to let it collect all
> processes associated with the file on the XFS.
> 2. drop cache is still needed, but just drop the associated files'
> cache after mf_dax_kill_procs(), instead of dropping cache of the whole
> filesystem.
>
> Then the logic shuld be looked like this:
> unbind
> `-> dax_holder_notify_failure(dax_dev, 0, U64_MAX, MF_MEM_PRE_REMOVE)
> `-> xfs_dax_notify_failure()
> `-> freeze_super()
> `-> do xfs rmap
> `-> mf_dax_kill_procs()
> `-> collect_procs_fsdax() // all associated
> `-> unmap_and_kill()
> `-> invalidate_inode_pages2() // drop file's cache
> `-> thaw_super()
>
>
> [1] The step of unbind test:
> 1. create fsdax namespace on a pmem
> 2. mkfs.xfs on it
> 3. run fsx test in background
> 4. wait 1s
> 5. echo "pfn0.1" > unbind
> 6. wait 1s
> 7. umount xfs --> crash happened
>
Hi,
Any comments?
>
> --
> Thanks,
> Ruan.
>
>>
>>
>> --
>> Thanks,
>> Ruan.
>>
>>>
>>> -Dave.
prev parent reply other threads:[~2023-03-24 9:49 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-02-17 14:48 [PATCH v10 0/3] " Shiyang Ruan
2023-02-17 14:48 ` [PATCH v10 1/3] xfs: fix the calculation of length and end Shiyang Ruan
2023-02-17 14:48 ` [PATCH v10 2/3] fs: introduce super_drop_pagecache() Shiyang Ruan
2023-02-17 16:14 ` Matthew Wilcox
2023-02-18 1:16 ` Shiyang Ruan
2023-02-18 18:27 ` Matthew Wilcox
2023-02-20 9:39 ` Shiyang Ruan
2023-02-20 9:45 ` Shiyang Ruan
2023-02-20 21:25 ` Dave Chinner
2023-02-21 1:57 ` Shiyang Ruan
2023-02-26 23:50 ` Dave Chinner
2023-02-17 14:48 ` [PATCH v10 3/3] mm, pmem, xfs: Introduce MF_MEM_REMOVE for unbind Shiyang Ruan
2023-02-27 0:07 ` Dave Chinner
2023-02-27 10:06 ` Shiyang Ruan
2023-03-21 10:59 ` Shiyang Ruan
2023-03-24 9:49 ` Shiyang Ruan [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7ba8c1f6-b9fe-714a-cd40-2b9e17ea61e7@fujitsu.com \
--to=ruansy.fnst@fujitsu.com \
--cc=akpm@linux-foundation.org \
--cc=dan.j.williams@intel.com \
--cc=david@fromorbit.com \
--cc=djwong@kernel.org \
--cc=hch@infradead.org \
--cc=jane.chu@oracle.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=linux-xfs@vger.kernel.org \
--cc=nvdimm@lists.linux.dev \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox