[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230503163426.5538-2-findns94@gmail.com>
Date: Thu, 4 May 2023 00:34:26 +0800
From: Yue Zhao <findns94@...il.com>
To: stable@...r.kernel.org
Cc: linux-ext4@...r.kernel.org, linux-mm@...ck.org,
linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
tytso@....edu, adilger.kernel@...ger.ca, jack@...e.cz,
yi.zhang@...wei.com, tangyeechou@...il.com,
Yue Zhao <findns94@...il.com>
Subject: [PATCH 1/1][For stable 5.4] mm: migrate: buffer_migrate_page_norefs() fallback migrate not uptodate pages
Recently we notice that ext4 filesystem occasionally fail to read
metadata from disk and report error message, but the disk and block
layer looks fine. After analyse, we lockon commit 88dbcbb3a484
("blkdev: avoid migration stalls for blkdev pages"). It provide a
migration method for the bdev, we could move page that has buffers
without extra users now, but it will lock the buffers on the page, which
breaks a lot of current filesystem's fragile metadata read operations,
like ll_rw_block() for common usage and ext4_read_bh_lock() for ext4,
these helpers just trylock the buffer and skip submit IO if it lock
failed, many callers just wait_on_buffer() and conclude IO error if the
buffer is not uptodate after buffer unlocked.
This issue could be easily reproduced by add some delay just after
buffer_migrate_lock_buffers() in __buffer_migrate_page() and do
fsstress on ext4 filesystem.
EXT4-fs error (device pmem1): __ext4_find_entry:1658: inode #73193:
comm fsstress: reading directory lblock 0
EXT4-fs error (device pmem1): __ext4_find_entry:1658: inode #75334:
comm fsstress: reading directory lblock 0
Something like ll_rw_block() should be used carefully and seems could
only be safely used for the readahead case. So the best way is to fix
the read operations in filesystem in the long run, but now let us avoid
this issue first. This patch avoid this issue by fallback to migrate
pages that are not uptodate like fallback_migrate_page(), those pages
that has buffers may probably do read operation soon.
Fixes: 88dbcbb3a484 ("blkdev: avoid migration stalls for blkdev pages")
Signed-off-by: Yue Zhao <findns94@...il.com>
---
mm/migrate.c | 33 +++++++++++++++++++++++++++++++++
1 file changed, 33 insertions(+)
diff --git a/mm/migrate.c b/mm/migrate.c
index 034b0662fd3b..1e908e997147 100644
--- a/mm/migrate.c
+++ b/mm/migrate.c
@@ -751,6 +751,39 @@ static int __buffer_migrate_page(struct address_space *mapping,
return -EAGAIN;
head = page_buffers(page);
+
+ /*
+ * If the mapped buffers on the page are not uptodate and has refcount,
+ * some others may propably try to lock the buffer and submit read IO
+ * through ll_rw_block(), but it will not submit IO once it failed to
+ * lock the buffer, so try to fallback to migrate_page() to prevent
+ * false positive EIO.
+ */
+ if (check_refs) {
+ bool uptodate = true;
+ bool invalidate = false;
+
+ bh = head;
+ do {
+ if (buffer_mapped(bh) && !buffer_uptodate(bh)) {
+ uptodate = false;
+ if (atomic_read(&bh->b_count)) {
+ invalidate = true;
+ break;
+ }
+ }
+ bh = bh->b_this_page;
+ } while (bh != head);
+
+ if (!uptodate) {
+ if (invalidate)
+ invalidate_bh_lrus();
+ if (try_to_release_page(page, GFP_KERNEL))
+ return migrate_page(mapping, newpage, page, mode);
+ return -EAGAIN;
+ }
+ }
+
if (!buffer_migrate_lock_buffers(head, mode))
return -EAGAIN;
--
2.17.1
Powered by blists - more mailing lists