Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp1531261imd; Thu, 1 Nov 2018 17:54:27 -0700 (PDT) X-Google-Smtp-Source: AJdET5djzJvPPg6wBk53BIKr6arBb0ADolR/6WIkiLWVyQeA7DA3+j7+xBeFcmKrCSxueXrysjjT X-Received: by 2002:a17:902:b183:: with SMTP id s3-v6mr9201357plr.70.1541120067303; Thu, 01 Nov 2018 17:54:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541120067; cv=none; d=google.com; s=arc-20160816; b=ZwcBiFIY7JWjG0doTImkaUsgD80vUNzmojQk2QMVWV3Mqc5g+ryJRkoygTrF5w3bFF cEhtvNTUKeCGhSxd/0RcPmG6yHqGCBmCSmxEoUbKQDXB/hh4vazFGtF28mh6JXo8YaIZ UC8xy/XqZmeWLlUSEX0HuqS+rlVYw5v+PAFNi/fML70M66oGUvteCxzuyl9sZ+/8w3V9 515CgP9+iM3FGJ9GKOJQBbYxprcyC4uywsGPbE85gOctx2KKh9RttVhzivVqyd6X5wy4 6Mddyu+QKcXldKryhcfisWTSgln365xmDSmgVvBmsOGkZArCsZtD5Im9B/aibSL2QpSs wqBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=q4f56MFbxBDXav2G8HF1b+fEMaHDizdoxB2H8JDrKAE=; b=iCi+KjsKdOFywVoxJJDmf9Ah4nkq+6y9cVVLskzzR6kLhSke2lIVCdt/sVRJKWLo7N NxWKqu/tebRTTIzt5SXWOJ4qmT8aFHeRtDHwcerb3dR2+Wy3P8c8NJip64t867l0TNR1 Bk8eMEux8eQWUJGQacrCKDuOvlhEBssDVV8tYWU1InRAR3OOIjmTnFOHWr4mQRxzVuu2 RcnyX3HlH+E1Odc2SFFShfSKBlMSkUl+E/TpzuxFGSyOS4XX+Fc1Cv2prlQmrqiiYQpZ Sr3PYU8AVX6e3smcNPmaQG+zMl1lwevfDhk1LUxXYxFQ/cI//1UZHia+btGMvHjzfVZd 47eg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y18-v6si2218823pfa.75.2018.11.01.17.54.12; Thu, 01 Nov 2018 17:54:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726252AbeKBJ7F convert rfc822-to-8bit (ORCPT + 99 others); Fri, 2 Nov 2018 05:59:05 -0400 Received: from smtp.h3c.com ([60.191.123.56]:23060 "EHLO h3cmg01-ex.h3c.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726084AbeKBJ7F (ORCPT ); Fri, 2 Nov 2018 05:59:05 -0400 Received: from BJHUB02-EX.srv.huawei-3com.com (unknown [10.63.20.170]) by h3cmg01-ex.h3c.com with smtp id 02a7_010e_fba128bb_31d6_499e_a934_5b179a324ae9; Fri, 02 Nov 2018 08:53:17 +0800 Received: from H3CMLB12-EX.srv.huawei-3com.com ([fe80::10fe:abde:731b:fdde]) by BJHUB02-EX.srv.huawei-3com.com ([::1]) with mapi id 14.03.0415.000; Fri, 2 Nov 2018 08:53:04 +0800 From: Changwei Ge To: Larry Chen , "mark@fasheh.com" , "jlbec@evilplan.org" CC: "linux-kernel@vger.kernel.org" , "ocfs2-devel@oss.oracle.com" , "akpm@linux-foundation.org" Subject: Re: [PATCH V3] ocfs2: fix dead lock caused by ocfs2_defrag_extent Thread-Topic: [PATCH V3] ocfs2: fix dead lock caused by ocfs2_defrag_extent Thread-Index: AQHUcbKZagBejW0xd0Sk/bgqi0J6UA== Date: Fri, 2 Nov 2018 00:53:03 +0000 Message-ID: <63ADC13FD55D6546B7DECE290D39E37301277DE845@H3CMLB12-EX.srv.huawei-3com.com> References: <20181101071422.14470-1-lchen@suse.com> Accept-Language: en-US, zh-CN Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.125.20.206] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Larry, The change looks good to me. On 2018/11/1 15:14, Larry Chen wrote: > ocfs2_defrag_extent may fall into deadlock. > > ocfs2_ioctl_move_extents > ocfs2_ioctl_move_extents > ocfs2_move_extents > ocfs2_defrag_extent > ocfs2_lock_allocators_move_extents > > ocfs2_reserve_clusters > inode_lock GLOBAL_BITMAP_SYSTEM_INODE > > __ocfs2_flush_truncate_log > inode_lock GLOBAL_BITMAP_SYSTEM_INODE > > As backtrace shows above, ocfs2_reserve_clusters() will call inode_lock > against the global bitmap if local allocator has not sufficient cluters. > Once global bitmap could meet the demand, ocfs2_reserve_cluster will > return success with global bitmap locked. > > After ocfs2_reserve_cluster(), if truncate log is full, > __ocfs2_flush_truncate_log() will definitely fall into deadlock because it > needs to inode_lock global bitmap, which has already been locked. > > To fix this bug, we could remove from ocfs2_lock_allocators_move_extents() > the code which intends to lock global allocator, and put the removed code > after __ocfs2_flush_truncate_log(). > > ocfs2_lock_allocators_move_extents() is referred by 2 places, one is here, > the other does not need the data allocator context, which means this patch > does not affect the caller so far. > > Change log: > 1. Correct the function comment. > 2. Remove unused argument from ocfs2_lock_meta_allocator_move_extents. > > Signed-off-by: Larry Chen Reviewed-by: Changwei Ge > --- > fs/ocfs2/move_extents.c | 47 ++++++++++++++++++++++++++--------------------- > 1 file changed, 26 insertions(+), 21 deletions(-) > > diff --git a/fs/ocfs2/move_extents.c b/fs/ocfs2/move_extents.c > index 7eb3b0a6347e..f55f82ca3425 100644 > --- a/fs/ocfs2/move_extents.c > +++ b/fs/ocfs2/move_extents.c > @@ -156,18 +156,14 @@ static int __ocfs2_move_extent(handle_t *handle, > } > > /* > - * lock allocators, and reserving appropriate number of bits for > - * meta blocks and data clusters. > - * > - * in some cases, we don't need to reserve clusters, just let data_ac > - * be NULL. > + * lock allocator, and reserve appropriate number of bits for > + * meta blocks. > */ > -static int ocfs2_lock_allocators_move_extents(struct inode *inode, > +static int ocfs2_lock_meta_allocator_move_extents(struct inode *inode, > struct ocfs2_extent_tree *et, > u32 clusters_to_move, > u32 extents_to_split, > struct ocfs2_alloc_context **meta_ac, > - struct ocfs2_alloc_context **data_ac, > int extra_blocks, > int *credits) > { > @@ -192,13 +188,6 @@ static int ocfs2_lock_allocators_move_extents(struct inode *inode, > goto out; > } > > - if (data_ac) { > - ret = ocfs2_reserve_clusters(osb, clusters_to_move, data_ac); > - if (ret) { > - mlog_errno(ret); > - goto out; > - } > - } > > *credits += ocfs2_calc_extend_credits(osb->sb, et->et_root_el); > > @@ -257,10 +246,10 @@ static int ocfs2_defrag_extent(struct ocfs2_move_extents_context *context, > } > } > > - ret = ocfs2_lock_allocators_move_extents(inode, &context->et, *len, 1, > - &context->meta_ac, > - &context->data_ac, > - extra_blocks, &credits); > + ret = ocfs2_lock_meta_allocator_move_extents(inode, &context->et, > + *len, 1, > + &context->meta_ac, > + extra_blocks, &credits); > if (ret) { > mlog_errno(ret); > goto out; > @@ -283,6 +272,21 @@ static int ocfs2_defrag_extent(struct ocfs2_move_extents_context *context, > } > } > > + /* > + * Make sure ocfs2_reserve_cluster is called after > + * __ocfs2_flush_truncate_log, otherwise, dead lock may happen. > + * > + * If ocfs2_reserve_cluster is called > + * before __ocfs2_flush_truncate_log, dead lock on global bitmap > + * may happen. > + * > + */ > + ret = ocfs2_reserve_clusters(osb, *len, &context->data_ac); > + if (ret) { > + mlog_errno(ret); > + goto out_unlock_mutex; > + } > + > handle = ocfs2_start_trans(osb, credits); > if (IS_ERR(handle)) { > ret = PTR_ERR(handle); > @@ -600,9 +604,10 @@ static int ocfs2_move_extent(struct ocfs2_move_extents_context *context, > } > } > > - ret = ocfs2_lock_allocators_move_extents(inode, &context->et, len, 1, > - &context->meta_ac, > - NULL, extra_blocks, &credits); > + ret = ocfs2_lock_meta_allocator_move_extents(inode, &context->et, > + len, 1, > + &context->meta_ac, > + extra_blocks, &credits); > if (ret) { > mlog_errno(ret); > goto out; >