Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13369086ybl; Sun, 29 Dec 2019 10:14:42 -0800 (PST) X-Google-Smtp-Source: APXvYqzUPzF/B6DkkbeWZTj1Jywxz5Aopw4qXGTLZVzHOjALGQsL6dA7Wc1x0RMZIBj1tX9jPGRH X-Received: by 2002:a05:6830:1cd3:: with SMTP id p19mr52599342otg.70.1577643282810; Sun, 29 Dec 2019 10:14:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577643282; cv=none; d=google.com; s=arc-20160816; b=NyvI7q7ndWLKYmpj2y2fXS9lnztAWv4i2HyGyMd3nLUzlv2pLP1EhVzlnixnw0BCml o15W/1OpCOwxefKorDOShvy/c5CccGMD5nM0xhK1XZIdF1wsHeFgUtO0BaJzOXDJVima sgREQ4ZivGurBaKvcmWDj7jsxC9glbdeEbz+3dPabLDD20Hm7JDXkvEmKfk7E48UhJIR go8kH9hTd6h+Yg1QlCp9UzZSycqHEGGsnZChhGymfKPNEBORj2zATo87aG52bh4ff/j4 1wZ05Owq5QUqwZbHzY8ZcNZOHPfynAvlWUaeL3ErlHqL0dbNtxWpNEUs7/GPY1C/fbcM pPbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=lhgwzTJfAOCzdUyIjWKU+T7FuHLkMxY1ojDlbKUB5wc=; b=SB4FeKsty76pVEPEcdqll/79VJcLqraz3cdgpxHg1/XioE1ELSiSFlIAzmPKNm3VSl dubELhv9n7dutuuE9iE+9Yi6ULENL0qZkX1aL7Ym2qnbb6o007Xu7npKwKwVObhRMR07 nZL/SPbz/Hl+dD7JwmAdGgwWkCd0hQYL2UiMifrtnEMNAr7hWecPXSR6s76gT45By2Gn AWSI1tbhvZWM5LXi2TSkfgmRp+ud3YYw1+CUaZToOmQa3RVvqoTRwjQzkCH8mdiKjQkt 5uip/yHFVm14wRJHICCZGkfYzLBMxfvoppNg6BitAmgDtj8t1Axlu8nzOzQZWTCBm1Oi RFuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NijV9fyX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25si11694650oti.244.2019.12.29.10.14.31; Sun, 29 Dec 2019 10:14:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NijV9fyX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728538AbfL2R2J (ORCPT + 99 others); Sun, 29 Dec 2019 12:28:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:51008 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728531AbfL2R2E (ORCPT ); Sun, 29 Dec 2019 12:28:04 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C53DC208E4; Sun, 29 Dec 2019 17:28:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640483; bh=PdLIJqNP0qhgDm4kjLXmuiOrNEn+UR54zLGQicJ7uMo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NijV9fyXRM0mbrXmUOGO+kTQQ4TL2VcZEUN9h85ceZxT6GWnOPkZLIfkOrJI/vat2 PQwc2txmsjZ6NWtN3oAWnXxSinlwWN/+EKRJzbkzbX+9s+xtzdvaVDLTJPIhIAUFib TfK6Oo2cAM8Ue1OVuNbXzKpQOU1cz3FhVUdp85jE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , David Sterba Subject: [PATCH 4.19 015/219] btrfs: do not call synchronize_srcu() in inode_tree_del Date: Sun, 29 Dec 2019 18:16:57 +0100 Message-Id: <20191229162511.294306894@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162508.458551679@linuxfoundation.org> References: <20191229162508.458551679@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik commit f72ff01df9cf5db25c76674cac16605992d15467 upstream. Testing with the new fsstress uncovered a pretty nasty deadlock with lookup and snapshot deletion. Process A unlink -> final iput -> inode_tree_del -> synchronize_srcu(subvol_srcu) Process B btrfs_lookup <- srcu_read_lock() acquired here -> btrfs_iget -> find inode that has I_FREEING set -> __wait_on_freeing_inode() We're holding the srcu_read_lock() while doing the iget in order to make sure our fs root doesn't go away, and then we are waiting for the inode to finish freeing. However because the free'ing process is doing a synchronize_srcu() we deadlock. Fix this by dropping the synchronize_srcu() in inode_tree_del(). We don't need people to stop accessing the fs root at this point, we're only adding our empty root to the dead roots list. A larger much more invasive fix is forthcoming to address how we deal with fs roots, but this fixes the immediate problem. Fixes: 76dda93c6ae2 ("Btrfs: add snapshot/subvolume destroy ioctl") CC: stable@vger.kernel.org # 4.4+ Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/inode.c | 2 -- 1 file changed, 2 deletions(-) --- a/fs/btrfs/inode.c +++ b/fs/btrfs/inode.c @@ -5665,7 +5665,6 @@ static void inode_tree_add(struct inode static void inode_tree_del(struct inode *inode) { - struct btrfs_fs_info *fs_info = btrfs_sb(inode->i_sb); struct btrfs_root *root = BTRFS_I(inode)->root; int empty = 0; @@ -5678,7 +5677,6 @@ static void inode_tree_del(struct inode spin_unlock(&root->inode_lock); if (empty && btrfs_root_refs(&root->root_item) == 0) { - synchronize_srcu(&fs_info->subvol_srcu); spin_lock(&root->inode_lock); empty = RB_EMPTY_ROOT(&root->inode_tree); spin_unlock(&root->inode_lock);