From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from m16.mail.163.com (m16.mail.163.com [117.135.210.4]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1EB561D7E30; Fri, 18 Oct 2024 13:45:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=117.135.210.4 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729259167; cv=none; b=XcIyhtAt1Z/bpMHaMgMheXnvPKDxpxvVffTfFt5Gig3zwZeLsAZLDOd4m78KYFGguCEpVATw3llFRpDZzt+uVws5ocbRV5BLHfJTBo1YS+9xRzOrvEngGpT3GR0XQmZa1fZxzw9h5A5VmUh6O4m4IYMkd6qwOhsZQ88vtBESxyI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729259167; c=relaxed/simple; bh=dh+wjZdfUBxpUoqon6zAO+XWJbO5H2lWlfOsKXtFa2U=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=hiH90y1vRw5iBu9+eL/Kjtk9cfDKXOGfS8lnO1MOLDRDOovEnmU+mjeWjcQsUfX8MJJV7w6pNNy2nPiDd0vRA6oyPXv78xjGZWkjnyZBqKp3TTjsRzHBTaRYWjlw5uGYir3cG6h6FPpufE4wPWqRaX7kK7xdrH3umUXFLSJvSp8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=163.com; spf=pass smtp.mailfrom=163.com; dkim=pass (1024-bit key) header.d=163.com header.i=@163.com header.b=BkjMCwr4; arc=none smtp.client-ip=117.135.210.4 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=163.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=163.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=163.com header.i=@163.com header.b="BkjMCwr4" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=Message-ID:Date:MIME-Version:Subject:From: Content-Type; bh=iOaJpHzEwh2BhwSGhAssRj4dXQuutR5jgMH7jg6OoOo=; b=BkjMCwr4H605oM663Hx4jDm1QUyQ9jDJI/LwLM5U3rs8k8/1k/e+gu40VB8XvW WgUvMzuoniYHTuhpAM9TM87bFsCv9M05Mot30UMkByhvMuaGUL+5/XnLgaW5WTpj QomzWvAIQ+0b+WBV+mMX0tUL961FMiqSg8v3sQf6t0SiU= Received: from [192.168.22.184] (unknown [223.70.253.255]) by gzga-smtp-mtada-g0-1 (Coremail) with SMTP id _____wDXP+VzZhJn1NBwBw--.8058S2; Fri, 18 Oct 2024 21:45:24 +0800 (CST) Message-ID: <5c8a866f-cc22-47d7-b1bb-d20abbf9c1a8@163.com> Date: Fri, 18 Oct 2024 21:45:20 +0800 Precedence: bulk X-Mailing-List: linux-ext4@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v1] ext4: fix a assertion failure due to ungranted bh dirting To: Jan Kara Cc: tytso@mit.edu, adilger.kernel@dilger.ca, zhangshida@kylinos.cn, longzhi@sangfor.com.cn, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, Baolin Liu References: <20241010025855.2632516-1-liubaolin12138@163.com> <20241010092923.r53povuflevzhxrw@quack3> <5dc22111.4718.19279c3f3b7.Coremail.liubaolin12138@163.com> <20241016103301.rl6qngi2fb6yxjin@quack3> <908502d6-cb0c-44ae-8c03-9a22c8c7fbf2@163.com> <8c14e5b0-5229-4611-b8e6-434c6eb34ee9@163.com> <20241018091444.tmzhbj73gvegfmb5@quack3> <20241018123733.vvdh4mefn4la3zec@quack3> From: liubaolin In-Reply-To: <20241018123733.vvdh4mefn4la3zec@quack3> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-CM-TRANSID:_____wDXP+VzZhJn1NBwBw--.8058S2 X-Coremail-Antispam: 1Uf129KBjvJXoW3XrW7JF17CFy8Jw1xKr1Utrb_yoW3JFy5pr y3K3W7Kr4Dtr1UArnFqF4UXrWUK34UJr9rXr15Gr1xXws0yr1ftr48tr10kryDCrWDGw10 vr1UJr9rGr1jy37anT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x07U3-BiUUUUU= X-CM-SenderInfo: xolxutxrol0iasrtmqqrwthudrp/xtbBDh98ymcST15xsgABsB > I'm sorry to bother you again. I checked the V2 patch you submitted. > It seems my email was missed. > "Baolin Liu liubaolin@kylinos.cn" is my work email, not "liubaolin12138@163.com." > I apologize for the inconvenience, but please change it to "Baolin Liu " . > Thank you. 在 2024/10/18 20:37, Jan Kara 写道: > On Fri 18-10-24 19:34:31, liubaolin wrote: >>> Sorry, I saw the patch you submitted. >>> I would like to request a modification to the commit message. >>> I use the email 'Baolin Liu liubaolin12138@163.com' for community communication. >>> However, my work email is 'Baolin Liu liubaolin@kylinos.cn'. >>> >>> So I would like to ask you to modify the commit message as follows: >>> From: >>> Reported-by: Baolin Liu liubaolin12138@163.com >>> Reported-by: Zhi Long longzhi@sangfor.com.cn >>> To: >>> Reported-and-tested-by: Baolin Liu liubaolin@kylinos.cn >>> Reported-and-tested-by: Zhi Long longzhi@sangfor.com.cn >>> >>> Could you please make the modification? Thank you. > > OK, I've sent v2 with updated tags. > > Honza > >> 在 2024/10/18 17:14, Jan Kara 写道: >>> On Fri 18-10-24 09:48:17, liubaolin wrote: >>>>> Hello, I am very sorry. >>>>> I did not previously understand the approach of your patch to solve the issue. >>>>> Yesterday, I intentionally injected faults during the quick reproduction >>>>> test, and indeed, after applying your patch, the crash issue was >>>>> resolved and did not occur again. >>>>> I finally understood your approach to solving the problem. Please disregard my previous email. >>>>> Thank you for helping me solve this crash issue in a better way. >>>>> I still need to improve my skills in file systems, and I truly appreciate your guidance. >>> >>> Great! Thanks for testing. I'll send the patch for inclusion then. >>> >>> Honza >>> >>>> 在 2024/10/16 21:38, liubaolin 写道: >>>>>> Hello, >>>>>> I reviewed the patch attached in your email. The issue you mentioned >>>>>> about clearing buffer_new(bh) in write_end_fn() is indeed a bug. >>>>>> However, this patch does not resolve the crash issue we encountered. >>>>>> >>>>>> Let me explain my analysis in detail below. >>>>>> The crash occurs in the function jbd2_journal_dirty_metadata(). >>>>>> >>>>>> ext4_block_write_begin() -> ext4_journalled_zero_new_buffers() -> >>>>>> write_end_fn() >>>>>>  -> ext4_dirty_journalled_data() -> ext4_handle_dirty_metadata() -> >>>>>> __ext4_handle_dirty_metadata() >>>>>>  -> jbd2_journal_dirty_metadata() >>>>>> >>>>>> In the function jbd2_journal_dirty_metadata(), there is the >>>>>> following condition: >>>>>> —--------------------------------------------------------------------------------------------------- >>>>>>         if (data_race(jh->b_transaction != transaction && >>>>>>             jh->b_next_transaction != transaction)) { >>>>>>                 spin_lock(&jh->b_state_lock); >>>>>>                 J_ASSERT_JH(jh, jh->b_transaction == transaction || >>>>>>                                 jh->b_next_transaction == transaction); >>>>>>                 spin_unlock(&jh->b_state_lock); >>>>>>         } >>>>>> ---------------------------------------------------------------------------------------------------- >>>>>> By analyzing the vmcore, I found that both jh->b_transaction and jh- >>>>>>> b_next_transaction are NULL. >>>>>> Through code analysis, I discovered that the >>>>>> __jbd2_journal_file_buffer() function adds the corresponding >>>>>> transaction of bh to jh->b_transaction. >>>>>> Normally, this is accessed through do_journal_get_write_access(), >>>>>> which can call __jbd2_journal_file_buffer(). >>>>>> The detailed function call process is as follows: >>>>>> do_journal_get_write_access() -> ext4_journal_get_write_access() -> >>>>>> __ext4_journal_get_write_access() >>>>>>  -> jbd2_journal_get_write_access() -> do_get_write_access() -> >>>>>> __jbd2_journal_file_buffer() >>>>>> >>>>>> >>>>>> Therefore, resolving the crash issue requires obtaining write access >>>>>> before calling the jbd2_journal_dirty_metadata() function. >>>>>> The comment at the definition of the jbd2_journal_dirty_metadata() >>>>>> function also states:     'The buffer must have previously had >>>>>> jbd2_journal_get_write_access().' >>>>>> >>>>>> In the ext4_block_write_begin() function, if get_block() encounters >>>>>> an error, then neither bh->b_this_page nor the subsequent bh calls >>>>>> do_journal_get_write_access(). >>>>>> If bh->b_this_page and the subsequent bh are in the new state, it >>>>>> will lead to a crash when reaching the jbd2_journal_dirty_metadata() >>>>>> function. >>>>>> >>>>>> So, there are two ways to resolve this crash issue: >>>>>> 1、Call do_journal_get_write_access() on bh that is not handled due >>>>>> to get_block() error. >>>>>>     The patch modification is in the attachment 0001-ext4-fix-a- >>>>>> assertion-failure-due-to-ungranted-bh-dir.patch. >>>>>> >>>>>> 2、Call clear_buffer_new() on bh that is not handled due to >>>>>> get_block() error. >>>>>>     The patch modification is in the attachment 0001-ext4-fix-a- >>>>>> assertion-failure-due-to-bh-not-clear-new.patch. >>>>>> >>>>>> Additionally, I have found a method to quickly reproduce this crash >>>>>> issue. >>>>>> For details, please refer to the email I previously sent you: >>>>>> “https://lore.kernel.org/all/bd41c24b-7325-4584- >>>>>> a965-392a32e32c74@163.com/”. >>>>>> I have verified that this quick reproduction method works for both >>>>>> solutions to resolve the issue. >>>>>> >>>>>> Please continue to consider which method is better to resolve this >>>>>> issue. If you think that using clear_buffer_new() is a better >>>>>> solution, I can resend the patch via git send-mail. >>>>> >>>>> >>>>> >>>>> 在 2024/10/16 18:33, Jan Kara 写道: >>>>>> Hello, >>>>>> >>>>>> On Fri 11-10-24 12:08:58, Baolin Liu wrote: >>>>>>> Greetings, >>>>>>> >>>>>>> This problem is reproduced by our customer using their own testing tool >>>>>>> “run_bug”. When I consulted with a client, the testing tool “run_bug” >>>>>>> used a variety of background programs to benchmark (including memory >>>>>>> pressure, cpu pressure, file cycle manipulation, fsstress Stress testing >>>>>>> tool, postmark program,and so on). >>>>>>> >>>>>>> The recurrence probability is relatively low. >>>>>> >>>>>> OK, thanks for asking! >>>>>> >>>>>>> In response to your query, in ext4_block_write_begin, the new state will >>>>>>> be clear before get block, and the bh that failed get_block will not be >>>>>>> set to new. However, when the page size is greater than the >>>>>>> block size, a >>>>>>> page will contain multiple bh. >>>>>> >>>>>> True. I wanted to argue that the buffer_new bit should be either >>>>>> cleared in >>>>>> ext4_block_write_begin() (in case of error) or in >>>>>> ext4_journalled_write_end() (in case of success) but actually >>>>>> ext4_journalled_write_end() misses the clearing. So I think the better >>>>>> solution is like the attached patch. I'll submit it once testing finishes >>>>>> but it would be great if you could test that it fixes your problems as >>>>>> well. Thanks! >>>>>> >>>>>>                                 Honza >>>> >>