Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2020305pxa; Mon, 3 Aug 2020 05:34:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzywo8vBo0Z9W96g7aQJ31FckSKtMJYNXaXH8doqxdPNPYYlE9HMqwkG+2J1lQhYXUpRwq3 X-Received: by 2002:a05:6402:c86:: with SMTP id cm6mr15148116edb.205.1596458045679; Mon, 03 Aug 2020 05:34:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596458045; cv=none; d=google.com; s=arc-20160816; b=inlBHp5wb63D5gWS/F9XebzNjmlOhYmRCrrADOfR+D9Wx+c+32VZMBhLf7Y5vZZvZL DD3yuEb/yx3ltCWKFdyRwzeSOd3Hq8FRN7kW1bM2rsyAcvLwZdsaZj5WD3rApopUq/LB 7efZzD5H6+wY/7zQjXopNh2/7Uk0oiS+STMuKJRCPjg3vroIpbbG+aeurwhI/IketoW8 jbI5HnmsEbhlTa5kzvwAiDuxZ4vSPKlOOi1+erPeEEiAlW2bJgiem3VxVpCTurAoDfqx A9BCfMgE8xZIK6jh3UVArAaD3chkMvx7Mu145boPR93ZDuhfVO5g045UwlfmTx9NFuAr iOMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZvN1M7CBGxU5bxwnbqUTMBcnNH3VGGaYZ047naT51mo=; b=SteDx5qHJe2EEBKg8IHuksbK6FgK32FcauBLClxZgboCG12wWRVPR1NybN7WwH4g0V oivDws2RWTAr78wG9bnpTtIG/PJHBX/IoMFV9rZOdqq34ZAB3Rn2SX5M+2CCV4Wx2mgv Jw9SYACBrUuVvvBYEbwHFwviNRzOPBGx424OPESL+qXMCMaQY5lPPzeW5S/0A0fCB/4D HU4zvPnMxzJSIJw9iBN8S/qA4mPw0DEFPBVzRA49vLzLEG4azST491Oyp5oFA7G9ffOo YiyKxGFc9lDpujKpCXaGzh4kwHJ2GAEZUoKD4lz9MwYapMU9oNSA3hxdgMhxwuGhW+iT Z9uA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cSbJIake; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e24si10005741eds.212.2020.08.03.05.33.43; Mon, 03 Aug 2020 05:34:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cSbJIake; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729336AbgHCMch (ORCPT + 99 others); Mon, 3 Aug 2020 08:32:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:60524 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729312AbgHCMce (ORCPT ); Mon, 3 Aug 2020 08:32:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E513F2076B; Mon, 3 Aug 2020 12:32:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596457952; bh=u8PusDECc95mnoSbEKkMsdXrtKxVgtw+dC/6YfrvWzY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cSbJIakelUnUwy5S6D8hNJNa7q1plBOU31E9Hp4IyLVz2cJV/grgi6GNhDDCF5Dtp g+HgocRJcKuh/erxwYq6wYMZTvG9vfUuK1idoAqk/G3fcwSU5RLqDkWRx4jPxlsDkx yMNU3M6rAhNewzM5ZVTOhgJokQqxFFonOZUtxITs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chris Mason , Rik van Riel , Dave Chinner , "Darrick J. Wong" , Samuel Mendoza-Jonas , Frank van der Linden , Suraj Jitindar Singh , Benjamin Herrenschmidt , Anchal Agarwal Subject: [PATCH 4.19 24/56] xfs: fix missed wakeup on l_flush_wait Date: Mon, 3 Aug 2020 14:19:39 +0200 Message-Id: <20200803121851.506464786@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200803121850.306734207@linuxfoundation.org> References: <20200803121850.306734207@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Rik van Riel commit cdea5459ce263fbc963657a7736762ae897a8ae6 upstream. The code in xlog_wait uses the spinlock to make adding the task to the wait queue, and setting the task state to UNINTERRUPTIBLE atomic with respect to the waker. Doing the wakeup after releasing the spinlock opens up the following race condition: Task 1 task 2 add task to wait queue wake up task set task state to UNINTERRUPTIBLE This issue was found through code inspection as a result of kworkers being observed stuck in UNINTERRUPTIBLE state with an empty wait queue. It is rare and largely unreproducable. Simply moving the spin_unlock to after the wake_up_all results in the waker not being able to see a task on the waitqueue before it has set its state to UNINTERRUPTIBLE. This bug dates back to the conversion of this code to generic waitqueue infrastructure from a counting semaphore back in 2008 which didn't place the wakeups consistently w.r.t. to the relevant spin locks. [dchinner: Also fix a similar issue in the shutdown path on xc_commit_wait. Update commit log with more details of the issue.] Fixes: d748c62367eb ("[XFS] Convert l_flushsema to a sv_t") Reported-by: Chris Mason Signed-off-by: Rik van Riel Signed-off-by: Dave Chinner Reviewed-by: Darrick J. Wong Signed-off-by: Darrick J. Wong Cc: stable@vger.kernel.org # 4.9.x-4.19.x [modified for contextual change near xlog_state_do_callback()] Signed-off-by: Samuel Mendoza-Jonas Reviewed-by: Frank van der Linden Reviewed-by: Suraj Jitindar Singh Reviewed-by: Benjamin Herrenschmidt Reviewed-by: Anchal Agarwal Signed-off-by: Greg Kroah-Hartman --- fs/xfs/xfs_log.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) --- a/fs/xfs/xfs_log.c +++ b/fs/xfs/xfs_log.c @@ -2712,7 +2712,6 @@ xlog_state_do_callback( int funcdidcallbacks; /* flag: function did callbacks */ int repeats; /* for issuing console warnings if * looping too many times */ - int wake = 0; spin_lock(&log->l_icloglock); first_iclog = iclog = log->l_iclog; @@ -2914,11 +2913,9 @@ xlog_state_do_callback( #endif if (log->l_iclog->ic_state & (XLOG_STATE_ACTIVE|XLOG_STATE_IOERROR)) - wake = 1; - spin_unlock(&log->l_icloglock); - - if (wake) wake_up_all(&log->l_flush_wait); + + spin_unlock(&log->l_icloglock); } @@ -4026,7 +4023,9 @@ xfs_log_force_umount( * item committed callback functions will do this again under lock to * avoid races. */ + spin_lock(&log->l_cilp->xc_push_lock); wake_up_all(&log->l_cilp->xc_commit_wait); + spin_unlock(&log->l_cilp->xc_push_lock); xlog_state_do_callback(log, XFS_LI_ABORTED, NULL); #ifdef XFSERRORDEBUG