Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp1515845ybj; Tue, 5 May 2020 23:24:07 -0700 (PDT) X-Google-Smtp-Source: APiQypIX5wIy84zm72fNj6Yrgn501tRoLJkDK8UhP083/RxpV1mvs68lhefLq432CKkCWE/FuSAO X-Received: by 2002:a17:906:7204:: with SMTP id m4mr6185457ejk.48.1588746247647; Tue, 05 May 2020 23:24:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588746247; cv=none; d=google.com; s=arc-20160816; b=EKyBPaD1Ipv+Xpjd+tCHyUAbrU6xePctg2kEV6wi6Ac2ZLVOOPIaTKD8yi6YmS+n17 6L9Iqr6xot6sElKIfDsqdXuaX1yL9EEynI+FUZq5TfI2XntVXR2IH2sYN9QBV5k7NQrh Kji2Mn1l69F6BVU6dGGyApMijSR5UNY+32lMVW7GnWWLbFLyMWOdTC76iD8U4p9wAXiA KXyupxAf6tUvIKIEi2T12ZuuoZXaKtpabOfkOrCNGns8BuiB7VVOnTaE55bITc9t5N96 a4awYHdoS2fj8M9WHizUByi3MeDEw29rk9NepGQQ5vOMXjQsQLugkBU0gsAPm1kNpN44 QkdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=vkbZv3Oyy0uATuHRPMqT3qKR+d4IM9hjVB0ieK3AgkY=; b=ZXIMk6IahvfT9N12He/vyTdcYZ+kHCSkxSB5pgFV/dzLTTbrUPhzxVvvUlnFEjXGny MA9afl+U2e4AKbZuX1FBsTo204Axg+5fRYjTosZ6EnJF6SdKkQddHy85LCplYr/HU5j9 Lb+hsUJ7n5R4n1l73+9l0Yzb4+6p/G1r2YRC5BhQpJFhC0J+lVIzMN199vOK1GtehDsf F5AdjTXrwZAW0NgQo1GSzZ0b1jd49jTUPQWlXzYWfhoHA+GsL5rUMeNj5xYXxttY1yh9 1hfHGQ2KNpBgQ13iFl+sx6uhz9kyfnWDls2+hZdG0pKLOHi5wTyHkonbfK718BBuXNGU d6fg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j13si433134edn.465.2020.05.05.23.23.44; Tue, 05 May 2020 23:24:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728069AbgEFGVp (ORCPT + 99 others); Wed, 6 May 2020 02:21:45 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:54152 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726438AbgEFGVo (ORCPT ); Wed, 6 May 2020 02:21:44 -0400 Received: from DGGEMS414-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id CB25E46A86DC60311C1D; Wed, 6 May 2020 14:21:41 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.214) with Microsoft SMTP Server (TLS) id 14.3.487.0; Wed, 6 May 2020 14:21:39 +0800 Subject: Re: [PATCH V4] f2fs: Avoid double lock for cp_rwsem during checkpoint To: Sayali Lokhande , , CC: , References: <1588244309-1468-1-git-send-email-sayalil@codeaurora.org> From: Chao Yu Message-ID: <02e5d9ab-4ff9-4c8e-8a67-0fae6b3da372@huawei.com> Date: Wed, 6 May 2020 14:21:38 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <1588244309-1468-1-git-send-email-sayalil@codeaurora.org> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/4/30 18:58, Sayali Lokhande wrote: > There could be a scenario where f2fs_sync_node_pages gets > called during checkpoint, which in turn tries to flush > inline data and calls iput(). This results in deadlock as > iput() tries to hold cp_rwsem, which is already held at the > beginning by checkpoint->block_operations(). > > Call stack : > > Thread A Thread B > f2fs_write_checkpoint() > - block_operations(sbi) > - f2fs_lock_all(sbi); > - down_write(&sbi->cp_rwsem); > > - open() > - igrab() > - write() write inline data > - unlink() > - f2fs_sync_node_pages() > - if (is_inline_node(page)) > - flush_inline_data() > - ilookup() > page = f2fs_pagecache_get_page() > if (!page) > goto iput_out; > iput_out: > -close() > -iput() > iput(inode); > - f2fs_evict_inode() > - f2fs_truncate_blocks() > - f2fs_lock_op() > - down_read(&sbi->cp_rwsem); > > Fixes: 2049d4fcb057 ("f2fs: avoid multiple node page writes due to inline_data") > Signed-off-by: Sayali Lokhande Reviewed-by: Chao Yu Thanks,