Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1997989imu; Fri, 14 Dec 2018 04:16:06 -0800 (PST) X-Google-Smtp-Source: AFSGD/VTRNPg1P0rJUU5zqiyaMTnz+Wi4mCFGljUtjJbzQPCapk7JeXIadsOvHnDQMHg7OI+GL9E X-Received: by 2002:a63:5c41:: with SMTP id n1mr2390132pgm.1.1544789766805; Fri, 14 Dec 2018 04:16:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544789766; cv=none; d=google.com; s=arc-20160816; b=l34v90jLEvSNHpY0HnyvwmU6Oq/aKKv+1X1EXmELG6fhaHsqelK8bUGCMoOn3oAFnS W5AekDJd8kXKwE86nqBpGMYrWE4iAmCMD5YfqIXZWtqlPBJ7HJK11UwMXXER5GaKmoi0 bSqKE/YG1dtLgaYPvIdFd+onIEu1Ie+BNhHY7Z4TOfhPB75EL4bmtYKvLX504RbHxqVW 0DkEoxEcszKjvWSMEH/B05ddYSrJ672T3/k5wTDdVJS/P8kdgCtA6DDtEifVLBIdWM4W FrD4Km+g0q205BWLOmXJ9eWPE5GrItTwygXRd5d13H29m07mZvVeBb1QsIr/OnmvUO+3 tYaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=a8bUDf1rqb6Z/klpmRLKpWYrlEll9HOeaPpqdF8aXdY=; b=j8CpDmVnZFW9E2dVncrOrICCewNL+czPLTiDbxXFagTOK+HygW4q3SAnof7w7dtX7x wcByKbqwE6Zo3s+v+xia88QvloucQu99jDR1UODwi4Y96RzK/Lx5MK+koIF9akTwPGbJ WbfVTCpw1eiMrZKqTi+WRxHGyj/VAmUlB8d1LP0u0meRsTlIiqRecsrLmBP2PdS+abtK oeW701ioHTaKrx9cyIDd5LQjqnsNxH5ffLJ7s4vRtXqdglRHw+0iccmcmTaFZv6CYmIU 4F52N6sN44oeTHn8dv7tb9Y08Tda2q2E5y/7RkABj+btT1QIzuERWafVlFcyWjo2pQBU bpLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MCIIrlIq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 21si3921379pgk.74.2018.12.14.04.15.50; Fri, 14 Dec 2018 04:16:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MCIIrlIq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732139AbeLNMNc (ORCPT + 99 others); Fri, 14 Dec 2018 07:13:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:60988 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732106AbeLNMNX (ORCPT ); Fri, 14 Dec 2018 07:13:23 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 636B420892; Fri, 14 Dec 2018 12:13:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544789602; bh=wbN8ZAMfKRTCchSqS2d0nRdYPouYi3cQ+3GTbK4OToY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MCIIrlIq0Py+gZJbenrIZKqIg7sAu9RnWM8K7j4i1vP3a6sKwAL1jfZUX4NN4xMeL KK+CY9xv4BWH+HHT6vNQ/2goWlLAPwOtgELIK4rNJaG3e2h4CLGhAu7eSUz8upDKf+ /C9fSby++OL6GzIVi3ZhHuMU9WCk3xsF3B8hbca4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Larry Chen , Changwei Ge , Mark Fasheh , Joel Becker , Junxiao Bi , Joseph Qi , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.9 45/51] ocfs2: fix deadlock caused by ocfs2_defrag_extent() Date: Fri, 14 Dec 2018 13:00:47 +0100 Message-Id: <20181214115717.119288312@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115713.244259772@linuxfoundation.org> References: <20181214115713.244259772@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit e21e57445a64598b29a6f629688f9b9a39e7242a ] ocfs2_defrag_extent may fall into deadlock. ocfs2_ioctl_move_extents ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent ocfs2_lock_allocators_move_extents ocfs2_reserve_clusters inode_lock GLOBAL_BITMAP_SYSTEM_INODE __ocfs2_flush_truncate_log inode_lock GLOBAL_BITMAP_SYSTEM_INODE As backtrace shows above, ocfs2_reserve_clusters() will call inode_lock against the global bitmap if local allocator has not sufficient cluters. Once global bitmap could meet the demand, ocfs2_reserve_cluster will return success with global bitmap locked. After ocfs2_reserve_cluster(), if truncate log is full, __ocfs2_flush_truncate_log() will definitely fall into deadlock because it needs to inode_lock global bitmap, which has already been locked. To fix this bug, we could remove from ocfs2_lock_allocators_move_extents() the code which intends to lock global allocator, and put the removed code after __ocfs2_flush_truncate_log(). ocfs2_lock_allocators_move_extents() is referred by 2 places, one is here, the other does not need the data allocator context, which means this patch does not affect the caller so far. Link: http://lkml.kernel.org/r/20181101071422.14470-1-lchen@suse.com Signed-off-by: Larry Chen Reviewed-by: Changwei Ge Cc: Mark Fasheh Cc: Joel Becker Cc: Junxiao Bi Cc: Joseph Qi Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/ocfs2/move_extents.c | 47 +++++++++++++++++++++++------------------ 1 file changed, 26 insertions(+), 21 deletions(-) diff --git a/fs/ocfs2/move_extents.c b/fs/ocfs2/move_extents.c index 4e8f32eb0bdb..c179afd0051a 100644 --- a/fs/ocfs2/move_extents.c +++ b/fs/ocfs2/move_extents.c @@ -156,18 +156,14 @@ static int __ocfs2_move_extent(handle_t *handle, } /* - * lock allocators, and reserving appropriate number of bits for - * meta blocks and data clusters. - * - * in some cases, we don't need to reserve clusters, just let data_ac - * be NULL. + * lock allocator, and reserve appropriate number of bits for + * meta blocks. */ -static int ocfs2_lock_allocators_move_extents(struct inode *inode, +static int ocfs2_lock_meta_allocator_move_extents(struct inode *inode, struct ocfs2_extent_tree *et, u32 clusters_to_move, u32 extents_to_split, struct ocfs2_alloc_context **meta_ac, - struct ocfs2_alloc_context **data_ac, int extra_blocks, int *credits) { @@ -192,13 +188,6 @@ static int ocfs2_lock_allocators_move_extents(struct inode *inode, goto out; } - if (data_ac) { - ret = ocfs2_reserve_clusters(osb, clusters_to_move, data_ac); - if (ret) { - mlog_errno(ret); - goto out; - } - } *credits += ocfs2_calc_extend_credits(osb->sb, et->et_root_el); @@ -260,10 +249,10 @@ static int ocfs2_defrag_extent(struct ocfs2_move_extents_context *context, } } - ret = ocfs2_lock_allocators_move_extents(inode, &context->et, *len, 1, - &context->meta_ac, - &context->data_ac, - extra_blocks, &credits); + ret = ocfs2_lock_meta_allocator_move_extents(inode, &context->et, + *len, 1, + &context->meta_ac, + extra_blocks, &credits); if (ret) { mlog_errno(ret); goto out; @@ -286,6 +275,21 @@ static int ocfs2_defrag_extent(struct ocfs2_move_extents_context *context, } } + /* + * Make sure ocfs2_reserve_cluster is called after + * __ocfs2_flush_truncate_log, otherwise, dead lock may happen. + * + * If ocfs2_reserve_cluster is called + * before __ocfs2_flush_truncate_log, dead lock on global bitmap + * may happen. + * + */ + ret = ocfs2_reserve_clusters(osb, *len, &context->data_ac); + if (ret) { + mlog_errno(ret); + goto out_unlock_mutex; + } + handle = ocfs2_start_trans(osb, credits); if (IS_ERR(handle)) { ret = PTR_ERR(handle); @@ -606,9 +610,10 @@ static int ocfs2_move_extent(struct ocfs2_move_extents_context *context, } } - ret = ocfs2_lock_allocators_move_extents(inode, &context->et, len, 1, - &context->meta_ac, - NULL, extra_blocks, &credits); + ret = ocfs2_lock_meta_allocator_move_extents(inode, &context->et, + len, 1, + &context->meta_ac, + extra_blocks, &credits); if (ret) { mlog_errno(ret); goto out; -- 2.19.1