Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp125331pxu; Thu, 3 Dec 2020 22:03:50 -0800 (PST) X-Google-Smtp-Source: ABdhPJzep+ddJ9mJ5f7yweIoZeqBIQOyy6LiuXkGQBFhKSaofrgNLROX7Ll2wCazID4ipD9OI0qz X-Received: by 2002:a05:6402:1acc:: with SMTP id ba12mr5895239edb.9.1607061830212; Thu, 03 Dec 2020 22:03:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607061830; cv=none; d=google.com; s=arc-20160816; b=ayjLbOZULEpB+TR5YsDLxBpdOxPvSHxlF9QOaNTLiJx2D8xkeLcwl3I/hfg+fhGEbH 6urtfQMST5WPsyI71NqyHSNIzwxr2kjE+hrn5nW2CglJ6K/DB90tCIKssUY8cmLCPWCa bCTGTUyQ/lOmZPZ7kIPviIj4xfV3bTHx9MPFUdq0j6LHcVex46XqFzXndMx2qJOIu/hq 0EF2fWQSD0N/rwnftqK0EiJ0GHx5bn3Y9E99T5BexmBdrLbCBvcrFIob62tJ3kTDFNfo Ada+FG4FReJTn1OCqnydzE/ATOBAiVBx2UgWB+BhY7HTtuxmP5BTEQutpdo7RhLz8e60 BFSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=lkQ30Y1TrKU35cOATyBNXyvs3PN3HMP+DnsQgnrz4Ms=; b=DEVBBsY1k/bc7uPXwvqgXMstA2yTVRFdVfrgYV3NPEBD2Wd1DH94XqeArV58B+WlUY FsT2hpg+9J+HnIJ9Ue5eRquY0FrZidXeMnF+UDZL9NxH/bkRJBJPfu0Bb0Eog545Kvct x5UOnUF/E+NxhxT40td6Eg4Vy0HGcLO1VdPivGvCGKFRO026MmZP/N5Azf/2QOdbs6aH wi7ohCCSSWMmwfQYMZpfgsixcC5C8mnouTwEbZbB2Kkr2vpPMj6hs/IO0Op33DLllwtX t4NgOV5vo57qcbKV2UK6Ji/DQDEe2oFM6USrH2EVtyVnF+5/00/YXV8SubK98UVHvD4c rsQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x12si801896ejv.264.2020.12.03.22.03.19; Thu, 03 Dec 2020 22:03:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727761AbgLDGBP (ORCPT + 99 others); Fri, 4 Dec 2020 01:01:15 -0500 Received: from regular1.263xmail.com ([211.150.70.206]:44172 "EHLO regular1.263xmail.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725372AbgLDGBP (ORCPT ); Fri, 4 Dec 2020 01:01:15 -0500 Received: from localhost (unknown [192.168.167.70]) by regular1.263xmail.com (Postfix) with ESMTP id 85E1B1B24; Fri, 4 Dec 2020 13:54:51 +0800 (CST) X-MAIL-GRAY: 0 X-MAIL-DELIVERY: 1 X-ADDR-CHECKED4: 1 X-ANTISPAM-LEVEL: 2 X-SKE-CHECKED: 1 X-ABS-CHECKED: 1 Received: from localhost.localdomain (unknown [14.18.236.70]) by smtp.263.net (postfix) whith ESMTP id P21328T140298957076224S1607061286350349_; Fri, 04 Dec 2020 13:54:50 +0800 (CST) X-IP-DOMAINF: 1 X-UNIQUE-TAG: <38248cf2e7045d4fd411bf67e7d6b4ee> X-RL-SENDER: yili@winhong.com X-SENDER: yili@winhong.com X-LOGIN-NAME: yili@winhong.com X-FST-TO: colyli@suse.de X-SENDER-IP: 14.18.236.70 X-ATTACHMENT-NUM: 0 X-System-Flag: 0 From: Yi Li To: colyli@suse.de Cc: yilikernel@gmail.com, kent.overstreet@gmail.com, linux-bcache@vger.kernel.org, linux-kernel@vger.kernel.org, Yi Li , Guo Chao Subject: [PATCH v3] bcache: fix panic due to cache_set is null Date: Fri, 4 Dec 2020 13:54:40 +0800 Message-Id: <20201204055440.2569865-1-yili@winhong.com> X-Mailer: git-send-email 2.25.3 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org bcache_device_detach will release the cache_set after hotunplug cache disk. Here is how the issue happens. 1) cached_dev_free do cancel_writeback_rate_update_dwork without bch_register_lock. 2) Wirting the writeback_percent by sysfs with bch_register_lock will insert a writeback_rate_update work. 3) cached_dev_free with bch_register_lock to do bcache_device_free. dc->disk.c will be set NULL. 4) update_writeback_rate will crash when access dc->disk.c. After Patch: 1) cached_dev_free do cancel_writeback_rate_update_dwork and set dc->disk.c to NULL with bch_register_lock. 2) dc->disk.c = NULL will avoid that Wirting the writeback_percent by sysfs insert a writeback_rate_update work. Fixes: 80265d8dfd77 ("bcache: acquire bch_register_lock later in cached_dev_free()") IP: [] update_writeback_rate+0x59/0x3a0 [bcache] PGD 879620067 PUD 8755d3067 PMD 0 Oops: 0000 [#1] SMP CPU: 8 PID: 1005702 Comm: kworker/8:0 Tainted: G 4.4.0+10 #1 Hardware name: Intel BIOS SE5C610.86B.01.01.0021.032120170601 03/21/2017 Workqueue: events update_writeback_rate [bcache] task: ffff8808786f3800 ti: ffff88077082c000 task.ti: ffff88077082c000 RIP: e030:[] update_writeback_rate+0x59/0x3a0 [bcache] RSP: e02b:ffff88077082fde0 EFLAGS: 00010202 RAX: 0000000000000018 RBX: ffff8808047f0b08 RCX: 0000000000000000 RDX: 0000000000000001 RSI: ffff88088170dab8 RDI: ffff88088170dab8 RBP: ffff88077082fe18 R08: 000000000000000a R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000017bc8 R12: 0000000000000000 R13: ffff8808047f0000 R14: 0000000000000200 R15: ffff8808047f0b08 FS: 00007f157b6d6700(0000) GS:ffff880881700000(0000) knlGS:0000000000000000 CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000368 CR3: 0000000875c05000 CR4: 0000000000040660 Stack: 0000000000000001 0000000000007ff0 ffff88085ff600c0 ffff880881714e80 ffff880881719500 0000000000000200 ffff8808047f0b08 ffff88077082fe60 ffffffff81088c0c 0000000081714e80 0000000000000000 ffff880881714e80 Call Trace: [] process_one_work+0x1fc/0x3b0 [] worker_thread+0x2a5/0x470 [] ? __schedule+0x648/0x870 [] ? rescuer_thread+0x300/0x300 [] kthread+0xd5/0xe0 [] ? kthread_stop+0x110/0x110 [] ret_from_fork+0x3f/0x70 [] ? kthread_stop+0x110/0x110 Reported-by: Guo Chao Signed-off-by: Yi Li --- drivers/md/bcache/super.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/md/bcache/super.c b/drivers/md/bcache/super.c index 46a00134a36a..381f9fbcd765 100644 --- a/drivers/md/bcache/super.c +++ b/drivers/md/bcache/super.c @@ -1122,9 +1122,6 @@ static void cached_dev_detach_finish(struct work_struct *w) BUG_ON(refcount_read(&dc->count)); - if (test_and_clear_bit(BCACHE_DEV_WB_RUNNING, &dc->disk.flags)) - cancel_writeback_rate_update_dwork(dc); - if (!IS_ERR_OR_NULL(dc->writeback_thread)) { kthread_stop(dc->writeback_thread); dc->writeback_thread = NULL; @@ -1138,6 +1135,9 @@ static void cached_dev_detach_finish(struct work_struct *w) mutex_lock(&bch_register_lock); + if (test_and_clear_bit(BCACHE_DEV_WB_RUNNING, &dc->disk.flags)) + cancel_writeback_rate_update_dwork(dc); + calc_cached_dev_sectors(dc->disk.c); bcache_device_detach(&dc->disk); list_move(&dc->list, &uncached_devices); @@ -1334,9 +1334,6 @@ static void cached_dev_free(struct closure *cl) { struct cached_dev *dc = container_of(cl, struct cached_dev, disk.cl); - if (test_and_clear_bit(BCACHE_DEV_WB_RUNNING, &dc->disk.flags)) - cancel_writeback_rate_update_dwork(dc); - if (!IS_ERR_OR_NULL(dc->writeback_thread)) kthread_stop(dc->writeback_thread); if (!IS_ERR_OR_NULL(dc->status_update_thread)) @@ -1344,6 +1341,9 @@ static void cached_dev_free(struct closure *cl) mutex_lock(&bch_register_lock); + if (test_and_clear_bit(BCACHE_DEV_WB_RUNNING, &dc->disk.flags)) + cancel_writeback_rate_update_dwork(dc); + if (atomic_read(&dc->running)) bd_unlink_disk_holder(dc->bdev, dc->disk.disk); bcache_device_free(&dc->disk); -- 2.25.3