Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5796824ybp; Tue, 15 Oct 2019 05:18:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqxevr+5fcZ8yaR0nRZEO1INbINdjqWRcKsRQl129BttpNkLAKVbD/NExzv2mnvyOuZAABjQ X-Received: by 2002:a17:906:19cf:: with SMTP id h15mr34912237ejd.184.1571141885286; Tue, 15 Oct 2019 05:18:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571141885; cv=none; d=google.com; s=arc-20160816; b=fgml7iGSOLXJ8fNe1PtRWtoMGt37NTFtcSV/7+skigW1h8hBRPWOkWwz2vP35wy/pi tG+zt8Yc5u5jQ1JfD760OflbJdX5Ka3cEOHDBkcnQPQ7dPMz06Vz2JoeWBk4Xl98eT8w /SDb1X0Rc8/CkwCEbXJKGTH6cOJOXiIS4UiB6G/ahIiMol0OODno7Jb7IekowAsy67Ei yKTvNEq98s87WxBu2JiWOkwmwAGWhuTxgnqRKFAu6f1i+8D9Nft2p5HDsj3Vqe8+JdYs MI2KNeT5EQd4mILJ3dxSUV0+6Vzwb6lt1Ijup4+QNQUmGtXFda+w96K1u77hVdkpqXdY 6Uww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=8TC5Nx9hISRrOABZyEZUcrX+egyIsv5AUHS37LZPrSI=; b=S1x3H2C6X8lm7MWNkkZpjgt6DQS7XpOOelqlHdizqQm2c7p5vyUgWd1qfiIZaq9x1n 2Tq4i1GA/6lzinbGYqfL5/PsvzSmMdUKAKswwyHH/VDuIFhvqvmvSQFnWF9kBWN6dUT/ nBqnR4yqjaZDvLg6eKaEGF2JMy9G9/bVkIw33clkPCdEgh91uhbac7XeREnosGmTBWFJ UoC0JCQWXzuVcWxQX2C4vY1+bCVEKOjHWQNGcIDUjZhB4/nlZPk/kQckKm59HNUeZHjT XQGJKHeC2kxvEOaLsJRfCjJFv4AlQTyRvp2eqdco2KjnhRJnZUtq+ctnkxqnF2ttAYwD dK6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b50si15143754ede.28.2019.10.15.05.17.42; Tue, 15 Oct 2019 05:18:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729657AbfJOLuR (ORCPT + 99 others); Tue, 15 Oct 2019 07:50:17 -0400 Received: from out30-42.freemail.mail.aliyun.com ([115.124.30.42]:56509 "EHLO out30-42.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725790AbfJOLuR (ORCPT ); Tue, 15 Oct 2019 07:50:17 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R201e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e07487;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0Tf82AeM_1571140212; Received: from JosephdeMacBook-Pro.local(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0Tf82AeM_1571140212) by smtp.aliyun-inc.com(127.0.0.1); Tue, 15 Oct 2019 19:50:12 +0800 Subject: Re: [PATCH v2] ocfs2: fix panic due to ocfs2_wq is null To: Yi Li , linux-kernel@vger.kernel.org Cc: Yi Li , "ocfs2-devel@oss.oracle.com" , Andrew Morton References: <1571138943-22631-1-git-send-email-yili@winhong.com> From: Joseph Qi Message-ID: <4f5e38b9-bf93-e475-523d-b72a17ee53f0@linux.alibaba.com> Date: Tue, 15 Oct 2019 19:50:12 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <1571138943-22631-1-git-send-email-yili@winhong.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 19/10/15 19:29, Yi Li wrote: > From: Yi Li > > mount.ocfs2 failed when read ocfs2 filesystem super error. > the func ocfs2_initialize_super will return before allocate ocfs2_wq. > ocfs2_dismount_volume will triggered the following panic. > > Oct 15 16:09:27 cnwarekv-205120 kernel: On-disk corruption > discovered.Please run fsck.ocfs2 once the filesystem is unmounted. > Oct 15 16:09:27 cnwarekv-205120 kernel: (mount.ocfs2,22804,44): > ocfs2_read_locked_inode:537 ERROR: status = -30 > Oct 15 16:09:27 cnwarekv-205120 kernel: (mount.ocfs2,22804,44): > ocfs2_init_global_system_inodes:458 ERROR: status = -30 > Oct 15 16:09:27 cnwarekv-205120 kernel: (mount.ocfs2,22804,44): > ocfs2_init_global_system_inodes:491 ERROR: status = -30 > Oct 15 16:09:27 cnwarekv-205120 kernel: (mount.ocfs2,22804,44): > ocfs2_initialize_super:2313 ERROR: status = -30 > Oct 15 16:09:27 cnwarekv-205120 kernel: (mount.ocfs2,22804,44): > ocfs2_fill_super:1033 ERROR: status = -30 > ------------[ cut here ]------------ > Oops: 0002 [#1] SMP NOPTI > Modules linked in: ocfs2 rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs fscache > lockd grace ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm ocfs2_nodemanager > ocfs2_stackglue configfs sunrpc ipt_REJECT nf_reject_ipv4 > nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT > nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack > ip6table_filter ip6_tables ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad > rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr ipv6 ovmapi ppdev > parport_pc parport fb_sys_fops sysimgblt sysfillrect syscopyarea > acpi_cpufreq pcspkr i2c_piix4 i2c_core sg ext4 jbd2 mbcache2 sr_mod cdrom > CPU: 1 PID: 11753 Comm: mount.ocfs2 Tainted: G E > 4.14.148-200.ckv.x86_64 #1 > Hardware name: Sugon H320-G30/35N16-US, BIOS 0SSDX017 12/21/2018 > task: ffff967af0520000 task.stack: ffffa5f05484000 > RIP: 0010:mutex_lock+0x19/0x20 > Call Trace: > flush_workqueue+0x81/0x460 > ocfs2_shutdown_local_alloc+0x47/0x440 [ocfs2] > ocfs2_dismount_volume+0x84/0x400 [ocfs2] > ocfs2_fill_super+0xa4/0x1270 [ocfs2] > ? ocfs2_initialize_super.isa.211+0xf20/0xf20 [ocfs2] > mount_bdev+0x17f/0x1c0 > mount_fs+0x3a/0x160 > > Signed-off-by: Yi Li Cc: stable@vger.kernel.org Reviewed-by: Joseph Qi > --- > fs/ocfs2/journal.c | 3 ++- > fs/ocfs2/localalloc.c | 3 ++- > 2 files changed, 4 insertions(+), 2 deletions(-) > > diff --git a/fs/ocfs2/journal.c b/fs/ocfs2/journal.c > index 930e3d3..699a560 100644 > --- a/fs/ocfs2/journal.c > +++ b/fs/ocfs2/journal.c > @@ -217,7 +217,8 @@ void ocfs2_recovery_exit(struct ocfs2_super *osb) > /* At this point, we know that no more recovery threads can be > * launched, so wait for any recovery completion work to > * complete. */ > - flush_workqueue(osb->ocfs2_wq); > + if (osb->ocfs2_wq) > + flush_workqueue(osb->ocfs2_wq); > > /* > * Now that recovery is shut down, and the osb is about to be > diff --git a/fs/ocfs2/localalloc.c b/fs/ocfs2/localalloc.c > index 158e5af..720e9f9 100644 > --- a/fs/ocfs2/localalloc.c > +++ b/fs/ocfs2/localalloc.c > @@ -377,7 +377,8 @@ void ocfs2_shutdown_local_alloc(struct ocfs2_super *osb) > struct ocfs2_dinode *alloc = NULL; > > cancel_delayed_work(&osb->la_enable_wq); > - flush_workqueue(osb->ocfs2_wq); > + if (osb->ocfs2_wq) > + flush_workqueue(osb->ocfs2_wq); > > if (osb->local_alloc_state == OCFS2_LA_UNUSED) > goto out; >