Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp9654ybp; Thu, 3 Oct 2019 09:27:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIyj6ICoUvT6THrlJc4Wno0gNYutUPUmGk4BA7VdKmLsry2NUSkFrmbWvpkR4wzOSkPTTn X-Received: by 2002:a50:ed17:: with SMTP id j23mr10392034eds.248.1570120037116; Thu, 03 Oct 2019 09:27:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570120037; cv=none; d=google.com; s=arc-20160816; b=cA0L0fm2CICTVea1sU3CrfLTA+JDZay0PznP6aKY32QY8Pi2nHycQhR3UZ9iNNkMTV hJlT7+NXaDvAXaKdy2ioOPsVj/Kc2FeuCtwSShePr3x1mCU+NSQA1/6ZldfkKG5nr3k3 A6agAgf6y2tRezpTHuZOM5OqDSVzKH+xd9fsTvh585C7dH4sT9/jlvt3ptrsOQCnaZiN bhkKOo7mibbNB80IRlys8cqysK9Dtqmnx0mD+Ohws+hodzP4BXxwr66KOyoqrgN4RCnB VDXTn8ZxC7aRXFf3sRf68z+xeV38VqAb71K8/f0k3/E8eaulFP+KgrNK+asXEdkvsaZZ wqZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NQhA2pxcnj3uqiMmC6EyU7YLUepO1tCdO3ZQQkjL1Iw=; b=JaDQ5ORtY041ewG5Dq5b9HNiELOFiYtUQsIMTGmCwoiINcE6RoISHpH3fQNGyxx4cK B6JPWVVRwIcuZNqts0/tNzCRUhQdsPgMnfSRqr1m6Rj9srYkuWGuMiglcpOklYZrevSl +Ihl22y1DA+DDYT4rtogjox2J+dSfbuMWwyFj4lmZ5EeJEhlUDhSQ5PWgdIQ3LdSXao/ T3SGqLBpoaTZmBmbM4df2FD3ALrs+tunktugJrZ3/yCND0T7BjeObCPbS4iuQrG5Mbdb UgQHgItdqQlcjbN8J25tdOeij331KPoZWQSLC/Q5M5bFmxoQgntRzXmANjcHH5dg9CTU ufhw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I6IdYaoP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d25si1764843edv.319.2019.10.03.09.26.52; Thu, 03 Oct 2019 09:27:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I6IdYaoP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390556AbfJCQXL (ORCPT + 99 others); Thu, 3 Oct 2019 12:23:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:51994 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390549AbfJCQXJ (ORCPT ); Thu, 3 Oct 2019 12:23:09 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2DE2221783; Thu, 3 Oct 2019 16:23:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570119788; bh=bfNnloBEnrQgDb4wl5PGD1ICVTNAsUiA3C7wfmlOuGU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I6IdYaoP4wM/1GgamM9xWhk8nGzk7EGwj5wLK0X9++aRFRISXvvaRCErVLCin5MrA jglfBxdsiwVO1lJpOdZTSUJ4paWMkvA6CrR5iLjGYj4XxV3iHR0CAs+KZY+hh/HNlP 37Qvcr2xok0dC4M4lZUtDjSeRq2zdFkyut8zsUus= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johannes Thumshirn , Nikolay Borisov , David Sterba Subject: [PATCH 4.19 192/211] btrfs: Relinquish CPUs in btrfs_compare_trees Date: Thu, 3 Oct 2019 17:54:18 +0200 Message-Id: <20191003154528.743918143@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154447.010950442@linuxfoundation.org> References: <20191003154447.010950442@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nikolay Borisov commit 6af112b11a4bc1b560f60a618ac9c1dcefe9836e upstream. When doing any form of incremental send the parent and the child trees need to be compared via btrfs_compare_trees. This can result in long loop chains without ever relinquishing the CPU. This causes softlockup detector to trigger when comparing trees with a lot of items. Example report: watchdog: BUG: soft lockup - CPU#0 stuck for 24s! [snapperd:16153] CPU: 0 PID: 16153 Comm: snapperd Not tainted 5.2.9-1-default #1 openSUSE Tumbleweed (unreleased) Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 40000005 (nZcv daif -PAN -UAO) pc : __ll_sc_arch_atomic_sub_return+0x14/0x20 lr : btrfs_release_extent_buffer_pages+0xe0/0x1e8 [btrfs] sp : ffff00001273b7e0 Call trace: __ll_sc_arch_atomic_sub_return+0x14/0x20 release_extent_buffer+0xdc/0x120 [btrfs] free_extent_buffer.part.0+0xb0/0x118 [btrfs] free_extent_buffer+0x24/0x30 [btrfs] btrfs_release_path+0x4c/0xa0 [btrfs] btrfs_free_path.part.0+0x20/0x40 [btrfs] btrfs_free_path+0x24/0x30 [btrfs] get_inode_info+0xa8/0xf8 [btrfs] finish_inode_if_needed+0xe0/0x6d8 [btrfs] changed_cb+0x9c/0x410 [btrfs] btrfs_compare_trees+0x284/0x648 [btrfs] send_subvol+0x33c/0x520 [btrfs] btrfs_ioctl_send+0x8a0/0xaf0 [btrfs] btrfs_ioctl+0x199c/0x2288 [btrfs] do_vfs_ioctl+0x4b0/0x820 ksys_ioctl+0x84/0xb8 __arm64_sys_ioctl+0x28/0x38 el0_svc_common.constprop.0+0x7c/0x188 el0_svc_handler+0x34/0x90 el0_svc+0x8/0xc Fix this by adding a call to cond_resched at the beginning of the main loop in btrfs_compare_trees. Fixes: 7069830a9e38 ("Btrfs: add btrfs_compare_trees function") CC: stable@vger.kernel.org # 4.4+ Reviewed-by: Johannes Thumshirn Signed-off-by: Nikolay Borisov Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/ctree.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/btrfs/ctree.c +++ b/fs/btrfs/ctree.c @@ -5516,6 +5516,7 @@ int btrfs_compare_trees(struct btrfs_roo advance_left = advance_right = 0; while (1) { + cond_resched(); if (advance_left && !left_end_reached) { ret = tree_advance(fs_info, left_path, &left_level, left_root_level,