Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp258423ybi; Wed, 29 May 2019 20:49:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqyi32uY8871KAPieQxZL6NQLzTAv9EnSzcsUGG/7DVlsHKz4OZeonXG7QLD9GcWhHeH6Fai X-Received: by 2002:aa7:8dc3:: with SMTP id j3mr1603044pfr.141.1559188183042; Wed, 29 May 2019 20:49:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559188183; cv=none; d=google.com; s=arc-20160816; b=veIc49J1T0YTiHpM/kzY5N4c4S9ktiEQJsjHXwWnZ+UuaNqzmMLA4H8DCIxQmFxb+f grtW440fLA2ygB4zeKZ6e9sRPq12fTXmgFjAaLMH0eoo7xqiBLzYC9ZCfPRGFS+SBaeR Pe4iWXzSAbmfFRBLbVBQ+xd67HfJlz7McrTeMu/PucaTHgWKuXxAsgQvNf4E9ZL83n2j k98omqTvXKxkeSkNl+hQ4uI2XKKR3oRpKimd3CFiRI1Lfo8WbUjP7ZnEnZK5yKjKztyJ PE9SkGqi8YFjr/qdxvqsxY6jlE46Bu1Zi1ZUYHyT3ASOxmvCZX7w6MOIbLTMJCbv5RAT Tkkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/NcOp7yWaTyrmR3xMFbSyMzSHqbfaejywbS0bhrGqp0=; b=koVkoZPOZVrSD92qenHGVd/d8t7tPC93voz4gLPrZL37CNc0EgWA5+T736ubM4gnss tDIeEPBQS2jqUsqABXMFkG4Qn2wKDgKTKIztaPTlGcl3INssRdgyRW0Kokwrpa1TfTk4 9QizWjfV5KhWJnwTO8ftEkJGpQw8j6pX8mnqXe1Gj5OKDAwkukut1+94Geq368JqGYdL /IXqwOO6lwGIQQxHgbFCkraXH1fDtsaZNpwZMeKAisqzlDLF8Q9nXCD4vr3GX83WUvrt qyZLgYW+7FBTkCLhPhWB7/nFaIWt4//3BPLnT4/VIcqclYR0H4wNAcXyqF1/nVEuQ+8K geKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eSqEyP28; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i16si2216762pje.6.2019.05.29.20.49.26; Wed, 29 May 2019 20:49:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eSqEyP28; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732971AbfE3Drd (ORCPT + 99 others); Wed, 29 May 2019 23:47:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:58924 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732217AbfE3DUc (ORCPT ); Wed, 29 May 2019 23:20:32 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D6A0E2492F; Thu, 30 May 2019 03:20:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186431; bh=WksFeKBKm23ZOKJUdAGeHa17sDokfaDq+8RAvwQ/XTw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eSqEyP28PsTMsUpatIThmXy0Tcn5BVmEmwIaoeysDWedNt6jQtGBSZ8qd6wnUEUh5 aGvgp5WuKAFJOe7k67li64Ut+APX5p8AztBwhiLRcZy40q6PF3mHUP9xDtTKag4MCH ZVaCkUH9oyGZCLAAtJUZ4zvb31WSNnSo/kM8YFc4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ross Lagerwall , Andreas Gruenbacher , Sasha Levin Subject: [PATCH 4.9 023/128] gfs2: Fix lru_count going negative Date: Wed, 29 May 2019 20:05:55 -0700 Message-Id: <20190530030438.979746132@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030432.977908967@linuxfoundation.org> References: <20190530030432.977908967@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 7881ef3f33bb80f459ea6020d1e021fc524a6348 ] Under certain conditions, lru_count may drop below zero resulting in a large amount of log spam like this: vmscan: shrink_slab: gfs2_dump_glock+0x3b0/0x630 [gfs2] \ negative objects to delete nr=-1 This happens as follows: 1) A glock is moved from lru_list to the dispose list and lru_count is decremented. 2) The dispose function calls cond_resched() and drops the lru lock. 3) Another thread takes the lru lock and tries to add the same glock to lru_list, checking if the glock is on an lru list. 4) It is on a list (actually the dispose list) and so it avoids incrementing lru_count. 5) The glock is moved to lru_list. 5) The original thread doesn't dispose it because it has been re-added to the lru list but the lru_count has still decreased by one. Fix by checking if the LRU flag is set on the glock rather than checking if the glock is on some list and rearrange the code so that the LRU flag is added/removed precisely when the glock is added/removed from lru_list. Signed-off-by: Ross Lagerwall Signed-off-by: Andreas Gruenbacher Signed-off-by: Sasha Levin --- fs/gfs2/glock.c | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/fs/gfs2/glock.c b/fs/gfs2/glock.c index 7a8b1d72e3d91..efd44d5645d83 100644 --- a/fs/gfs2/glock.c +++ b/fs/gfs2/glock.c @@ -136,22 +136,26 @@ static int demote_ok(const struct gfs2_glock *gl) void gfs2_glock_add_to_lru(struct gfs2_glock *gl) { + if (!(gl->gl_ops->go_flags & GLOF_LRU)) + return; + spin_lock(&lru_lock); - if (!list_empty(&gl->gl_lru)) - list_del_init(&gl->gl_lru); - else + list_del(&gl->gl_lru); + list_add_tail(&gl->gl_lru, &lru_list); + + if (!test_bit(GLF_LRU, &gl->gl_flags)) { + set_bit(GLF_LRU, &gl->gl_flags); atomic_inc(&lru_count); + } - list_add_tail(&gl->gl_lru, &lru_list); - set_bit(GLF_LRU, &gl->gl_flags); spin_unlock(&lru_lock); } static void gfs2_glock_remove_from_lru(struct gfs2_glock *gl) { spin_lock(&lru_lock); - if (!list_empty(&gl->gl_lru)) { + if (test_bit(GLF_LRU, &gl->gl_flags)) { list_del_init(&gl->gl_lru); atomic_dec(&lru_count); clear_bit(GLF_LRU, &gl->gl_flags); @@ -1048,8 +1052,7 @@ void gfs2_glock_dq(struct gfs2_holder *gh) !test_bit(GLF_DEMOTE, &gl->gl_flags)) fast_path = 1; } - if (!test_bit(GLF_LFLUSH, &gl->gl_flags) && demote_ok(gl) && - (glops->go_flags & GLOF_LRU)) + if (!test_bit(GLF_LFLUSH, &gl->gl_flags) && demote_ok(gl)) gfs2_glock_add_to_lru(gl); trace_gfs2_glock_queue(gh, 0); @@ -1349,6 +1352,7 @@ __acquires(&lru_lock) if (!spin_trylock(&gl->gl_lockref.lock)) { add_back_to_lru: list_add(&gl->gl_lru, &lru_list); + set_bit(GLF_LRU, &gl->gl_flags); atomic_inc(&lru_count); continue; } @@ -1356,7 +1360,6 @@ __acquires(&lru_lock) spin_unlock(&gl->gl_lockref.lock); goto add_back_to_lru; } - clear_bit(GLF_LRU, &gl->gl_flags); gl->gl_lockref.count++; if (demote_ok(gl)) handle_callback(gl, LM_ST_UNLOCKED, 0, false); @@ -1392,6 +1395,7 @@ static long gfs2_scan_glock_lru(int nr) if (!test_bit(GLF_LOCK, &gl->gl_flags)) { list_move(&gl->gl_lru, &dispose); atomic_dec(&lru_count); + clear_bit(GLF_LRU, &gl->gl_flags); freed++; continue; } -- 2.20.1