Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3702326pxb; Sat, 13 Feb 2021 06:29:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJy05g7JndK8kjcoz7PpLTxza0tZOlAVNs3EbkvObKR3LFnlWMHcHc44IftL7R+UEzGVCDys X-Received: by 2002:a17:907:3f13:: with SMTP id hq19mr7793058ejc.142.1613226575809; Sat, 13 Feb 2021 06:29:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613226575; cv=none; d=google.com; s=arc-20160816; b=zNFJEwabeMt8M3pSiRWVhs1LeJ/QaVaB7yD029aOqmkwJ8kj10YNB5GfeQXUHAKWgd IP2kyB3tE9XqzMf+ErAcNBxRyWppYQa0WEe2eynGQKH8fFsh6TsUiyDZtjR8MVVbKBY+ q3hkriZ7lz3R/xoxmE50YKFnMA+yCLkd5PynSBWI55WaZ2DUxngkrJP69s2F8k8Xjk+N 2lBJWIt6ehvUj1utLsozPg3NdA4ogHwvxyAODlo9KipAdrbDBv2qUC/ICHDRmWMK+git PYU+2y7D9H/+x7jejEi9iNS+McF4TK6Y943PH8pdRElPTRE9BhiwsXhwY+OywHrGpt+t MfSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=UjVHq4tNi1U0IBFkmOMpomXQW2iL779RVKVMAddssD4=; b=RWcv4ofgV90Wr900KtGLFldyqufUHKWY9vdQraAIOMomJ73sy9i1VzcrZ+dqk7tPLi 6PCS6pWA+/Ok6usGqn+pLqEnKUbV7MnELmPKJeboajd0obSwi8mfCKllRfNUgoyk391b q2pIZCdPnnZn5r6WK85CAMAnSVZCilm5LwD13xAKBY3gST4sOpTHyCOllXkVxUKiaZk1 fMiY/qpqGB+s2oEO8DobPTgO8/6lkzQWyu7t84pazGVuk1MbUzfh+azg3GyEJxzFEfrY XOqF3YvizTqKEhYC/7ScdHdeQIIGRG3bHD+yAtX9FkoicuaFE83Y6X7Okj5DYYf0vIxS VqPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g23si8268714edh.11.2021.02.13.06.29.09; Sat, 13 Feb 2021 06:29:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229665AbhBMO1Z (ORCPT + 99 others); Sat, 13 Feb 2021 09:27:25 -0500 Received: from www262.sakura.ne.jp ([202.181.97.72]:51639 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229651AbhBMO1Y (ORCPT ); Sat, 13 Feb 2021 09:27:24 -0500 Received: from fsav402.sakura.ne.jp (fsav402.sakura.ne.jp [133.242.250.101]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 11DEQeXB006750; Sat, 13 Feb 2021 23:26:40 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav402.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav402.sakura.ne.jp); Sat, 13 Feb 2021 23:26:40 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav402.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 11DEQeQ5006747 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Sat, 13 Feb 2021 23:26:40 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: possible deadlock in start_this_handle (2) To: Jan Kara Cc: jack@suse.com, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, tytso@mit.edu, mhocko@suse.cz, linux-mm@kvack.org, syzbot References: <000000000000563a0205bafb7970@google.com> <20210211104947.GL19070@quack2.suse.cz> From: Tetsuo Handa Message-ID: Date: Sat, 13 Feb 2021 23:26:37 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <20210211104947.GL19070@quack2.suse.cz> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/02/11 19:49, Jan Kara wrote: > This stacktrace should never happen. ext4_xattr_set() starts a transaction. > That internally goes through start_this_handle() which calls: > > handle->saved_alloc_context = memalloc_nofs_save(); > > and we restore the allocation context only in stop_this_handle() when > stopping the handle. And with this fs_reclaim_acquire() should remove > __GFP_FS from the mask and not call __fs_reclaim_acquire(). Excuse me, but it seems to me that nothing prevents ext4_xattr_set_handle() from reaching ext4_xattr_inode_lookup_create() without memalloc_nofs_save() when hitting ext4_get_nojournal() path. Will you explain when ext4_get_nojournal() path is executed? ext4_xattr_set() { handle = ext4_journal_start(inode, EXT4_HT_XATTR, credits) == __ext4_journal_start() { return __ext4_journal_start_sb() { journal = EXT4_SB(sb)->s_journal; if (!journal || (EXT4_SB(sb)->s_mount_state & EXT4_FC_REPLAY)) return ext4_get_nojournal(); // Never calls memalloc_nofs_save() despite returning !IS_ERR() value. return jbd2__journal_start(journal, blocks, rsv_blocks, revoke_creds, GFP_NOFS, type, line); // Calls memalloc_nofs_save() when start_this_handle() returns 0. } } } error = ext4_xattr_set_handle(handle, inode, name_index, name, value, value_len, flags); { ext4_write_lock_xattr(inode, &no_expand); // Grabs &ei->xattr_sem error = ext4_xattr_ibody_set(handle, inode, &i, &is) { error = ext4_xattr_set_entry(i, s, handle, inode, false /* is_block */) { ret = ext4_xattr_inode_lookup_create(handle, inode, i->value, i->value_len, &new_ea_inode); // Using GFP_KERNEL based on assumption that ext4_journal_start() called memalloc_nofs_save(). } } } }