Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2474197imm; Mon, 28 May 2018 08:46:19 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpohO+jeeY8udvcTjVS7dbMHFSHuHhDkOjfQ349F3oBUjfqSql7GIv7XFEnMYQGz6mJ7qJP X-Received: by 2002:a63:9041:: with SMTP id a62-v6mr10967827pge.191.1527522379160; Mon, 28 May 2018 08:46:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527522379; cv=none; d=google.com; s=arc-20160816; b=LeEgDrB4BM1uDViB59bkxd8BqaBcJWEbmFudEIrxMgLFxJm3IEPLqRZPdmr5A4MUW6 lKCRS+Suzz7+FYuBxtPFvNDn9hZH3PSQI7r1j4Ku92gTnBnDJe9kfU8IWQWTUXW+rd3t IMxmg0AZhPw5g0H4vtE7LZGGyq7NK0QoWIjeOgTobq7UzKvjxXqH1WtBTRG+sakuVrrB nK3JTrcKh8n2q6tn61s7BkDySqH6IF4NUytYefUUwAyu28sDfjyH4D2u4Zo2iXGHVbDj L1q0UiN730STKj1EVGtujThCx0GJYqqP36qVR5Np8NW8eBt20fEwrFlVUrVgWweLLTNE xY0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=x4KyBD7+oVyxMvyZgQGNhe966q0z10HtNG4xMjWD7xM=; b=CdSlRTTclkR6FGW2rnGTy+WdUsal7JUv5vsmmC2VJa59SRmz5ILWjmeM3g8KpNH6O6 EiDyE/ZD+TslEZx54zKVfisGHvpwAna804wNkPnNkwut3CB6qVj7OBzXr0s0bA9dzRCC IuD7mdaaTcYwDTuAJbwUoTPWcdKY7nCEXFOVYs8bGYTvnABDUYAidHmvY85m0KQpA6pP T9AktUKtUbnzvuoyk5NVGh2qV0DfVK0qFcPX5F6ZWm0TXjZcJt8fXdN0ismOZLGB+uu0 X1UaGnbq21iqFq/mH9q6ai8h8gNNV/l37M+oqGkirfas/eGdclkXFRINTPRSKYBSMKKS Gr3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mkKtdxR9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1-v6si16821403pgn.281.2018.05.28.08.46.04; Mon, 28 May 2018 08:46:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mkKtdxR9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S969201AbeE1Ppe (ORCPT + 99 others); Mon, 28 May 2018 11:45:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:37044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968603AbeE1KQz (ORCPT ); Mon, 28 May 2018 06:16:55 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3BCF320843; Mon, 28 May 2018 10:16:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502614; bh=IXpxZny6tXyvamY+zW3SMlN2MnacBG6RjTglVGEkI2w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mkKtdxR9WEv3sxK8tfoNKu67tjRMvJJuXggCsz27MgoIFPU60BnEdZX6KJDDuZ+Km i8waoE4DHoegqN9HXl6COG96OFNrD9zH4+dlxboHIHBXjezzD26JYP1H0f1v7KUDvN wSIxitL2utuQENJxqfUygZZV6LvDV+Eq5QBtkkRE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Coly Li , Hannes Reinecke , Michael Lyle , Junhui Tang , Jens Axboe , Sasha Levin Subject: [PATCH 4.4 065/268] bcache: properly set task state in bch_writeback_thread() Date: Mon, 28 May 2018 12:00:39 +0200 Message-Id: <20180528100209.257972470@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Coly Li [ Upstream commit 99361bbf26337186f02561109c17a4c4b1a7536a ] Kernel thread routine bch_writeback_thread() has the following code block, 447 down_write(&dc->writeback_lock); 448~450 if (check conditions) { 451 up_write(&dc->writeback_lock); 452 set_current_state(TASK_INTERRUPTIBLE); 453 454 if (kthread_should_stop()) 455 return 0; 456 457 schedule(); 458 continue; 459 } If condition check is true, its task state is set to TASK_INTERRUPTIBLE and call schedule() to wait for others to wake up it. There are 2 issues in current code, 1, Task state is set to TASK_INTERRUPTIBLE after the condition checks, if another process changes the condition and call wake_up_process(dc-> writeback_thread), then at line 452 task state is set back to TASK_INTERRUPTIBLE, the writeback kernel thread will lose a chance to be waken up. 2, At line 454 if kthread_should_stop() is true, writeback kernel thread will return to kernel/kthread.c:kthread() with TASK_INTERRUPTIBLE and call do_exit(). It is not good to enter do_exit() with task state TASK_INTERRUPTIBLE, in following code path might_sleep() is called and a warning message is reported by __might_sleep(): "WARNING: do not call blocking ops when !TASK_RUNNING; state=1 set at [xxxx]". For the first issue, task state should be set before condition checks. Ineed because dc->writeback_lock is required when modifying all the conditions, calling set_current_state() inside code block where dc-> writeback_lock is hold is safe. But this is quite implicit, so I still move set_current_state() before all the condition checks. For the second issue, frankley speaking it does not hurt when kernel thread exits with TASK_INTERRUPTIBLE state, but this warning message scares users, makes them feel there might be something risky with bcache and hurt their data. Setting task state to TASK_RUNNING before returning fixes this problem. In alloc.c:allocator_wait(), there is also a similar issue, and is also fixed in this patch. Changelog: v3: merge two similar fixes into one patch v2: fix the race issue in v1 patch. v1: initial buggy fix. Signed-off-by: Coly Li Reviewed-by: Hannes Reinecke Reviewed-by: Michael Lyle Cc: Michael Lyle Cc: Junhui Tang Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/md/bcache/alloc.c | 4 +++- drivers/md/bcache/writeback.c | 7 +++++-- 2 files changed, 8 insertions(+), 3 deletions(-) --- a/drivers/md/bcache/alloc.c +++ b/drivers/md/bcache/alloc.c @@ -285,8 +285,10 @@ do { \ break; \ \ mutex_unlock(&(ca)->set->bucket_lock); \ - if (kthread_should_stop()) \ + if (kthread_should_stop()) { \ + set_current_state(TASK_RUNNING); \ return 0; \ + } \ \ try_to_freeze(); \ schedule(); \ --- a/drivers/md/bcache/writeback.c +++ b/drivers/md/bcache/writeback.c @@ -425,19 +425,22 @@ static int bch_writeback_thread(void *ar while (!kthread_should_stop()) { down_write(&dc->writeback_lock); + set_current_state(TASK_INTERRUPTIBLE); if (!atomic_read(&dc->has_dirty) || (!test_bit(BCACHE_DEV_DETACHING, &dc->disk.flags) && !dc->writeback_running)) { up_write(&dc->writeback_lock); - set_current_state(TASK_INTERRUPTIBLE); - if (kthread_should_stop()) + if (kthread_should_stop()) { + set_current_state(TASK_RUNNING); return 0; + } try_to_freeze(); schedule(); continue; } + set_current_state(TASK_RUNNING); searched_full_index = refill_dirty(dc);