From patchwork Wed Aug 23 08:17:06 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shiyang Ruan X-Patchwork-Id: 13361787 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2C14EE49A0 for ; Wed, 23 Aug 2023 08:19:43 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 19A3F280069; Wed, 23 Aug 2023 04:19:43 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 12163280062; Wed, 23 Aug 2023 04:19:43 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EDCD8280069; Wed, 23 Aug 2023 04:19:42 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id D6F08280062 for ; Wed, 23 Aug 2023 04:19:42 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 98D71B1FA1 for ; Wed, 23 Aug 2023 08:19:42 +0000 (UTC) X-FDA: 81154670604.18.11B43AC Received: from esa2.hc1455-7.c3s2.iphmx.com (esa2.hc1455-7.c3s2.iphmx.com [207.54.90.48]) by imf17.hostedemail.com (Postfix) with ESMTP id 260AF4001A for ; Wed, 23 Aug 2023 08:19:39 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=fujitsu.com; spf=pass (imf17.hostedemail.com: domain of ruansy.fnst@fujitsu.com designates 207.54.90.48 as permitted sender) smtp.mailfrom=ruansy.fnst@fujitsu.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1692778780; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=zPgDkuAo/pfCqfQCMNn0VGb1a2eP5REGWftZ4C4crKk=; b=PO3D2NFpixrzBr5wpPrgMpxDh3UGJAZNIyrNl/kNVjRNEVBRMmEehuKwABohw6S4WQ1OX/ bTTlm0Ek2hgwPFhC7WpkQvPAb4bmDYdAqktdYwqMCcM6+wWEfqIhSmpRoxbF8QNQ4Eah3J 5m8WNvhGzSga7fxNTUAgOet4/KA+B+0= ARC-Authentication-Results: i=1; imf17.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=fujitsu.com; spf=pass (imf17.hostedemail.com: domain of ruansy.fnst@fujitsu.com designates 207.54.90.48 as permitted sender) smtp.mailfrom=ruansy.fnst@fujitsu.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1692778780; a=rsa-sha256; cv=none; b=uXF1XNHy29FJhSW8JkFcxBi69LQbccU2VHZcTV2XFerfTJY9avwyigb5dLs7lT2Oux6N14 1aw57mnUMc3gdWbDcD70kpbz55LdodOJKS7ySQyTNxcWNCwa2Wcnzz6x5SM+kuD1OczZqi HBFaHfmCwLV+tyzT0XTCAojY+zfB2MU= X-IronPort-AV: E=McAfee;i="6600,9927,10810"; a="129178220" X-IronPort-AV: E=Sophos;i="6.01,195,1684767600"; d="scan'208";a="129178220" Received: from unknown (HELO oym-r2.gw.nic.fujitsu.com) ([210.162.30.90]) by esa2.hc1455-7.c3s2.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Aug 2023 17:19:37 +0900 Received: from oym-m4.gw.nic.fujitsu.com (oym-nat-oym-m4.gw.nic.fujitsu.com [192.168.87.61]) by oym-r2.gw.nic.fujitsu.com (Postfix) with ESMTP id ACDBACD7E3 for ; Wed, 23 Aug 2023 17:19:35 +0900 (JST) Received: from kws-ab4.gw.nic.fujitsu.com (kws-ab4.gw.nic.fujitsu.com [192.51.206.22]) by oym-m4.gw.nic.fujitsu.com (Postfix) with ESMTP id D4709D5618 for ; Wed, 23 Aug 2023 17:19:34 +0900 (JST) Received: from irides.g08.fujitsu.local (unknown [10.167.234.230]) by kws-ab4.gw.nic.fujitsu.com (Postfix) with ESMTP id F423522E2EC; Wed, 23 Aug 2023 17:19:33 +0900 (JST) From: Shiyang Ruan To: linux-fsdevel@vger.kernel.org, nvdimm@lists.linux.dev, linux-xfs@vger.kernel.org, linux-mm@kvack.org Cc: dan.j.williams@intel.com, willy@infradead.org, jack@suse.cz, akpm@linux-foundation.org, djwong@kernel.org, mcgrof@kernel.org Subject: [PATCH v13] mm, pmem, xfs: Introduce MF_MEM_PRE_REMOVE for unbind Date: Wed, 23 Aug 2023 16:17:06 +0800 Message-ID: <20230823081706.2970430-1-ruansy.fnst@fujitsu.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230629081651.253626-3-ruansy.fnst@fujitsu.com> References: <20230629081651.253626-3-ruansy.fnst@fujitsu.com> MIME-Version: 1.0 X-TM-AS-GCONF: 00 X-TM-AS-Product-Ver: IMSS-9.1.0.1417-9.0.0.1002-27830.005 X-TM-AS-User-Approved-Sender: Yes X-TMASE-Version: IMSS-9.1.0.1417-9.0.1002-27830.005 X-TMASE-Result: 10--17.307800-10.000000 X-TMASE-MatchedRID: jyNpowM6mpsUN/8aAzvyJRIRh9wkXSlF2FA7wK9mP9dgPgeggVwCFuZk XqvcLVUNlxPsRwiY5LzUqA+C93oBWsD2BXku4KdJvR08UROkEAchauGyjTkf9QX+uAQWEHBwZn5 u7bQd2qJ1oo/WkOb0VaCfwPQUqdEypdSzuQPv1TYLwUwfdPoXvpSlv/9klkDiAS8CIlg1PGsHzY bIalkde73+usKi9oxVdk3TBobQ8JBpORapdxWmu79A3Bl1/DcVdwX/SSKrKHjXFJ7W3lIp4wW/T AV6gqi8We3lYtwpBw+x20KR2zlXCtDCM5b2Q+i0nVTWWiNp+v/BOVz0Jwcxl0fyM5VfgjG2pNen lUW/Ky/OG+e9aAIpHmKW2rd6XT7zf9/Sma78f5LOvXpg7ONnXYoalu7bmVkyJLfQYoCQHFZpQPI /PUz4jq0TVqwcl7WLuR46my6IOf5exSxKcqB2AKoXHZz/dXlxWQ3R4k5PTnBFpKl8aBgi1/cwyV YGZr7I/t8GtPJsyDaCUDg+fMvu+JH0YXYnbGozFEUknJ/kEl6Ax/bc87r9b/oLR4+zsDTtH/zyL +gBqizGDL/XkKk4qWoP4CtLdG3e+dFfB4Lb6TAzPPs7QubshQ== X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0 X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: 260AF4001A X-Stat-Signature: e1tfjcbk7cgph9z49tjeu9twg8ygxuna X-Rspam-User: X-HE-Tag: 1692778779-339045 X-HE-Meta: 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 dBt/7FMF D28rPgOYpHRiwjn6oGj4ni0qCwvRDQ9jZuONAxu6yBVIvofPrSg+/lBRaxgZOz0gIv0PEeluQGBG1pGDFdyi7p5qe/z/pSIhj9ifz8qWBwuOnehcxNIPTMzgnLdoMUG0QroYZTw6SywXvFge+2lCPRGwypK0H4aMHr05v8wjftcw0cviNKoxRY4+/h8fpsocAomzDpczuVmctqz9LerXVc7si5A3DtEkoswiXap0cMFjeW9GnZnqpxqd3cykMuODyHRc0Ygp8MsYwkNn/DnrdNhJ37A== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: ==== Changes since v12: 1. correct flag name in subject (MF_MEM_REMOVE => MF_MEM_PRE_REMOVE) 2. complete the behavior when fs has already frozen by kernel call NOTICE: Instead of "call notify_failure() again w/o PRE_REMOVE", I tried this proposal[0]. 3. call xfs_dax_notify_failure_freeze() and _thaw() in same function 4. rebase on: xfs/xfs-linux.git vfs-for-next ==== Now, if we suddenly remove a PMEM device(by calling unbind) which contains FSDAX while programs are still accessing data in this device, e.g.: ``` $FSSTRESS_PROG -d $SCRATCH_MNT -n 99999 -p 4 & # $FSX_PROG -N 1000000 -o 8192 -l 500000 $SCRATCH_MNT/t001 & echo "pfn1.1" > /sys/bus/nd/drivers/nd_pmem/unbind ``` it could come into an unacceptable state: 1. device has gone but mount point still exists, and umount will fail with "target is busy" 2. programs will hang and cannot be killed 3. may crash with NULL pointer dereference To fix this, we introduce a MF_MEM_PRE_REMOVE flag to let it know that we are going to remove the whole device, and make sure all related processes could be notified so that they could end up gracefully. This patch is inspired by Dan's "mm, dax, pmem: Introduce dev_pagemap_failure()"[1]. With the help of dax_holder and ->notify_failure() mechanism, the pmem driver is able to ask filesystem on it to unmap all files in use, and notify processes who are using those files. Call trace: trigger unbind -> unbind_store() -> ... (skip) -> devres_release_all() -> kill_dax() -> dax_holder_notify_failure(dax_dev, 0, U64_MAX, MF_MEM_PRE_REMOVE) -> xfs_dax_notify_failure() `-> freeze_super() // freeze (kernel call) `-> do xfs rmap ` -> mf_dax_kill_procs() ` -> collect_procs_fsdax() // all associated processes ` -> unmap_and_kill() ` -> invalidate_inode_pages2_range() // drop file's cache `-> thaw_super() // thaw (both kernel & user call) Introduce MF_MEM_PRE_REMOVE to let filesystem know this is a remove event. Use the exclusive freeze/thaw[2] to lock the filesystem to prevent new dax mapping from being created. Do not shutdown filesystem directly if configuration is not supported, or if failure range includes metadata area. Make sure all files and processes(not only the current progress) are handled correctly. Also drop the cache of associated files before pmem is removed. [0]: https://lore.kernel.org/linux-xfs/25cf6700-4db0-a346-632c-ec9fc291793a@fujitsu.com/ [1]: https://lore.kernel.org/linux-mm/161604050314.1463742.14151665140035795571.stgit@dwillia2-desk3.amr.corp.intel.com/ [2]: https://lore.kernel.org/linux-xfs/169116275623.3187159.16862410128731457358.stg-ugh@frogsfrogsfrogs/ Signed-off-by: Shiyang Ruan --- drivers/dax/super.c | 3 +- fs/xfs/xfs_notify_failure.c | 99 ++++++++++++++++++++++++++++++++++--- include/linux/mm.h | 1 + mm/memory-failure.c | 17 +++++-- 4 files changed, 109 insertions(+), 11 deletions(-) diff --git a/drivers/dax/super.c b/drivers/dax/super.c index c4c4728a36e4..2e1a35e82fce 100644 --- a/drivers/dax/super.c +++ b/drivers/dax/super.c @@ -323,7 +323,8 @@ void kill_dax(struct dax_device *dax_dev) return; if (dax_dev->holder_data != NULL) - dax_holder_notify_failure(dax_dev, 0, U64_MAX, 0); + dax_holder_notify_failure(dax_dev, 0, U64_MAX, + MF_MEM_PRE_REMOVE); clear_bit(DAXDEV_ALIVE, &dax_dev->flags); synchronize_srcu(&dax_srcu); diff --git a/fs/xfs/xfs_notify_failure.c b/fs/xfs/xfs_notify_failure.c index 4a9bbd3fe120..6496c32a9172 100644 --- a/fs/xfs/xfs_notify_failure.c +++ b/fs/xfs/xfs_notify_failure.c @@ -22,6 +22,7 @@ #include #include +#include struct xfs_failure_info { xfs_agblock_t startblock; @@ -73,10 +74,16 @@ xfs_dax_failure_fn( struct xfs_mount *mp = cur->bc_mp; struct xfs_inode *ip; struct xfs_failure_info *notify = data; + struct address_space *mapping; + pgoff_t pgoff; + unsigned long pgcnt; int error = 0; if (XFS_RMAP_NON_INODE_OWNER(rec->rm_owner) || (rec->rm_flags & (XFS_RMAP_ATTR_FORK | XFS_RMAP_BMBT_BLOCK))) { + /* Continue the query because this isn't a failure. */ + if (notify->mf_flags & MF_MEM_PRE_REMOVE) + return 0; notify->want_shutdown = true; return 0; } @@ -92,14 +99,60 @@ xfs_dax_failure_fn( return 0; } - error = mf_dax_kill_procs(VFS_I(ip)->i_mapping, - xfs_failure_pgoff(mp, rec, notify), - xfs_failure_pgcnt(mp, rec, notify), - notify->mf_flags); + mapping = VFS_I(ip)->i_mapping; + pgoff = xfs_failure_pgoff(mp, rec, notify); + pgcnt = xfs_failure_pgcnt(mp, rec, notify); + + /* Continue the rmap query if the inode isn't a dax file. */ + if (dax_mapping(mapping)) + error = mf_dax_kill_procs(mapping, pgoff, pgcnt, + notify->mf_flags); + + /* Invalidate the cache in dax pages. */ + if (notify->mf_flags & MF_MEM_PRE_REMOVE) + invalidate_inode_pages2_range(mapping, pgoff, + pgoff + pgcnt - 1); + xfs_irele(ip); return error; } +static int +xfs_dax_notify_failure_freeze( + struct xfs_mount *mp) +{ + struct super_block *sb = mp->m_super; + int error; + + error = freeze_super(sb, FREEZE_HOLDER_KERNEL); + if (error) + xfs_emerg(mp, "already frozen by kernel, err=%d", error); + + return error; +} + +static void +xfs_dax_notify_failure_thaw( + struct xfs_mount *mp, + bool kernel_frozen) +{ + struct super_block *sb = mp->m_super; + int error; + + if (!kernel_frozen) { + error = thaw_super(sb, FREEZE_HOLDER_KERNEL); + if (error) + xfs_emerg(mp, "still frozen after notify failure, err=%d", + error); + } + + /* + * Also thaw userspace call anyway because the device is about to be + * removed immediately. + */ + thaw_super(sb, FREEZE_HOLDER_USERSPACE); +} + static int xfs_dax_notify_ddev_failure( struct xfs_mount *mp, @@ -112,15 +165,29 @@ xfs_dax_notify_ddev_failure( struct xfs_btree_cur *cur = NULL; struct xfs_buf *agf_bp = NULL; int error = 0; + bool kernel_frozen = false; xfs_fsblock_t fsbno = XFS_DADDR_TO_FSB(mp, daddr); xfs_agnumber_t agno = XFS_FSB_TO_AGNO(mp, fsbno); xfs_fsblock_t end_fsbno = XFS_DADDR_TO_FSB(mp, daddr + bblen - 1); xfs_agnumber_t end_agno = XFS_FSB_TO_AGNO(mp, end_fsbno); + if (mf_flags & MF_MEM_PRE_REMOVE) { + xfs_info(mp, "Device is about to be removed!"); + /* Freeze fs to prevent new mappings from being created. */ + error = xfs_dax_notify_failure_freeze(mp); + if (error) { + /* Keep going on if filesystem is frozen by kernel. */ + if (error == -EBUSY) + kernel_frozen = true; + else + return error; + } + } + error = xfs_trans_alloc_empty(mp, &tp); if (error) - return error; + goto out; for (; agno <= end_agno; agno++) { struct xfs_rmap_irec ri_low = { }; @@ -165,11 +232,23 @@ xfs_dax_notify_ddev_failure( } xfs_trans_cancel(tp); + + /* + * Determine how to shutdown the filesystem according to the + * error code and flags. + */ if (error || notify.want_shutdown) { xfs_force_shutdown(mp, SHUTDOWN_CORRUPT_ONDISK); if (!error) error = -EFSCORRUPTED; - } + } else if (mf_flags & MF_MEM_PRE_REMOVE) + xfs_force_shutdown(mp, SHUTDOWN_FORCE_UMOUNT); + +out: + /* Thaw the fs if it is frozen before. */ + if (mf_flags & MF_MEM_PRE_REMOVE) + xfs_dax_notify_failure_thaw(mp, kernel_frozen); + return error; } @@ -197,6 +276,8 @@ xfs_dax_notify_failure( if (mp->m_logdev_targp && mp->m_logdev_targp->bt_daxdev == dax_dev && mp->m_logdev_targp != mp->m_ddev_targp) { + if (mf_flags & MF_MEM_PRE_REMOVE) + return 0; xfs_err(mp, "ondisk log corrupt, shutting down fs!"); xfs_force_shutdown(mp, SHUTDOWN_CORRUPT_ONDISK); return -EFSCORRUPTED; @@ -210,6 +291,12 @@ xfs_dax_notify_failure( ddev_start = mp->m_ddev_targp->bt_dax_part_off; ddev_end = ddev_start + bdev_nr_bytes(mp->m_ddev_targp->bt_bdev) - 1; + /* Notify failure on the whole device. */ + if (offset == 0 && len == U64_MAX) { + offset = ddev_start; + len = bdev_nr_bytes(mp->m_ddev_targp->bt_bdev); + } + /* Ignore the range out of filesystem area */ if (offset + len - 1 < ddev_start) return -ENXIO; diff --git a/include/linux/mm.h b/include/linux/mm.h index 799836e84840..944a1165a321 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -3577,6 +3577,7 @@ enum mf_flags { MF_UNPOISON = 1 << 4, MF_SW_SIMULATED = 1 << 5, MF_NO_RETRY = 1 << 6, + MF_MEM_PRE_REMOVE = 1 << 7, }; int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, unsigned long count, int mf_flags); diff --git a/mm/memory-failure.c b/mm/memory-failure.c index dc5ff7dd4e50..92f18c9e0aaf 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -688,7 +688,7 @@ static void add_to_kill_fsdax(struct task_struct *tsk, struct page *p, */ static void collect_procs_fsdax(struct page *page, struct address_space *mapping, pgoff_t pgoff, - struct list_head *to_kill) + struct list_head *to_kill, bool pre_remove) { struct vm_area_struct *vma; struct task_struct *tsk; @@ -696,8 +696,15 @@ static void collect_procs_fsdax(struct page *page, i_mmap_lock_read(mapping); read_lock(&tasklist_lock); for_each_process(tsk) { - struct task_struct *t = task_early_kill(tsk, true); + struct task_struct *t = tsk; + /* + * Search for all tasks while MF_MEM_PRE_REMOVE is set, because + * the current may not be the one accessing the fsdax page. + * Otherwise, search for the current task. + */ + if (!pre_remove) + t = task_early_kill(tsk, true); if (!t) continue; vma_interval_tree_foreach(vma, &mapping->i_mmap, pgoff, pgoff) { @@ -1793,6 +1800,7 @@ int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, dax_entry_t cookie; struct page *page; size_t end = index + count; + bool pre_remove = mf_flags & MF_MEM_PRE_REMOVE; mf_flags |= MF_ACTION_REQUIRED | MF_MUST_KILL; @@ -1804,9 +1812,10 @@ int mf_dax_kill_procs(struct address_space *mapping, pgoff_t index, if (!page) goto unlock; - SetPageHWPoison(page); + if (!pre_remove) + SetPageHWPoison(page); - collect_procs_fsdax(page, mapping, index, &to_kill); + collect_procs_fsdax(page, mapping, index, &to_kill, pre_remove); unmap_and_kill(&to_kill, page_to_pfn(page), mapping, index, mf_flags); unlock: