Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3708477ybv; Mon, 10 Feb 2020 05:05:58 -0800 (PST) X-Google-Smtp-Source: APXvYqzv+Y/zz9dMe9yRpg8TfgaagrFJzupp/KbPz441nTuZ7R0OF9K7qJ35dW94UXjV0rjd4794 X-Received: by 2002:aca:dc8b:: with SMTP id t133mr763160oig.98.1581339958506; Mon, 10 Feb 2020 05:05:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581339958; cv=none; d=google.com; s=arc-20160816; b=USMsrCbx4IqDw45aJRFQG9LVqswuSIGBlbEJsuqRP6KTAHwI46GLKzQNvIekMW6C0W l0SuglXsxz+5RpXj6Di6BhCzF6FCZoIl70IjSM+o9ACunsIOy1sclCxI28dfEDpYpqGV ThCIHT3nmSdO2HA3PF7uPJ8l9uG1nfS6URce9JLgNjWFsDI7f+sI4sCuNANSlvJWKTts pgP3ZtndOy6pOp++qfRMmRE+pvYm2BnHNDh8OiYXrYl5yh6ehobbkm3TNSaCawlm40b2 iY4DJBY2xzcQBu1lBOSTrqNC5llY9KRvGGaFm199fbx1D/rOErQtazV4+2WY2paZ8b9M Wkvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W+6D0BPwtyphNIvcfBrwlz6cSj4uqT16HQRtcr2pbIU=; b=Kfxgls8oZzm+uUNqtbhC/M3Ldx7YqwwnJETRC/RWmpO9aLcZIp/X+FAHGQSXqZIbk0 76xvvRUN5q0LcD6NdZHV8pzTfTe5OLokskqsaBP8Kna9zhgI0op9K6YsoC53EeK5KjP4 686W6uK4eGBS4Sq2L+j06ZErX5fKHI4hwRmrR37iLDuip4mDFdSgHnmkvROXr5fZpH98 DA47E3lCX6gx0uQmz7ueyPBKseSZr3ebccT95jOsyINIUzVdz4YsSP73rRcCwsdBMEoE 5w5OIPszvVW2PUDxKRCMV6e1Hum6ikgOahg2k8kK8MaQPM7uCtx3v3N3cQctubmyV+l6 9ehA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y6PSWcRj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1si165937otk.42.2020.02.10.05.05.46; Mon, 10 Feb 2020 05:05:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y6PSWcRj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730323AbgBJNFZ (ORCPT + 99 others); Mon, 10 Feb 2020 08:05:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:38940 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729184AbgBJMkE (ORCPT ); Mon, 10 Feb 2020 07:40:04 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F0B712051A; Mon, 10 Feb 2020 12:40:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338404; bh=/glp9sSdbLe3epTTSCqFRgpTWpPljAzDuqmKyRFBIH0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=y6PSWcRj1D8daXsFeMyWhngvonIn6754Qc0NCAiCTe5mZQwFmE/kZYwkyYvzw/QeP ggdDEIrMkoaQG5ac/8BSw3VyuT8fhgpWbEe0KTOFdsJnuls+CEyuEoimyLwj32MX1k kEnpIt1k3/nhfU9iBb3n88u4nDXdZYeBrV7No9GM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhihao Cheng , "zhangyi (F)" , Stable@vger.kernel.org, Richard Weinberger Subject: [PATCH 5.5 105/367] ubifs: Fix deadlock in concurrent bulk-read and writepage Date: Mon, 10 Feb 2020 04:30:18 -0800 Message-Id: <20200210122434.083181923@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhihao Cheng commit f5de5b83303e61b1f3fb09bd77ce3ac2d7a475f2 upstream. In ubifs, concurrent execution of writepage and bulk read on the same file may cause ABBA deadlock, for example (Reproduce method see Link): Process A(Bulk-read starts from page4) Process B(write page4 back) vfs_read wb_workfn or fsync ... ... generic_file_buffered_read write_cache_pages ubifs_readpage LOCK(page4) ubifs_bulk_read ubifs_writepage LOCK(ui->ui_mutex) ubifs_write_inode ubifs_do_bulk_read LOCK(ui->ui_mutex) find_or_create_page(alloc page4) ↑ LOCK(page4) <-- ABBA deadlock occurs! In order to ensure the serialization execution of bulk read, we can't remove the big lock 'ui->ui_mutex' in ubifs_bulk_read(). Instead, we allow ubifs_do_bulk_read() to lock page failed by replacing find_or_create_page(FGP_LOCK) with pagecache_get_page(FGP_LOCK | FGP_NOWAIT). Signed-off-by: Zhihao Cheng Suggested-by: zhangyi (F) Cc: Fixes: 4793e7c5e1c ("UBIFS: add bulk-read facility") Link: https://bugzilla.kernel.org/show_bug.cgi?id=206153 Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- fs/ubifs/file.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/fs/ubifs/file.c +++ b/fs/ubifs/file.c @@ -786,7 +786,9 @@ static int ubifs_do_bulk_read(struct ubi if (page_offset > end_index) break; - page = find_or_create_page(mapping, page_offset, ra_gfp_mask); + page = pagecache_get_page(mapping, page_offset, + FGP_LOCK|FGP_ACCESSED|FGP_CREAT|FGP_NOWAIT, + ra_gfp_mask); if (!page) break; if (!PageUptodate(page))