Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp2794462pxb; Mon, 6 Sep 2021 05:38:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4I2TcB3wgvN7acCw9F9XEQEdoYTTy6HtMyzKkzmnM8hDQXX1XuAwV6UEnVorYAlO3thyd X-Received: by 2002:a17:906:30d6:: with SMTP id b22mr13863186ejb.442.1630931920099; Mon, 06 Sep 2021 05:38:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630931920; cv=none; d=google.com; s=arc-20160816; b=PwZl7E1O6FbNP8Rh3FvH2Ixr4cthRx8Ph6+4K0g7kOprQye53d5C6SyNqk1nXyO+d8 lU9JZBOV97Yu6ooqSRTpY/oY5sD/imvaJonZUamzc8t27hf/g3htgwV2Be2jr9Ic1wQL HCMUdM/0sH1BSsztzXl1wZzs8PXBmwQTnHksv3qHxPRP5EYABW81CsDltWvH6chDSpHy tvpnJ0CAdqQXU8IHjB9ER2Uc4zWlOPRGadKSxHbNPiIcUp+qrI1Gdv52huR5ir588Ojy ZScIv/eER3a2fiob7SQNhvp6AvhbGjF5P3bVF6154IiK3A3FsJUHy/CdVH/Cd/VmdukA 6BAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:mail-followup-to:reply-to:message-id :subject:cc:to:from:date:dkim-signature:dkim-signature; bh=q5Gjv/o2r31Pg5vgSEoAXdlHZThs4FawYEtj69ES0+s=; b=E/UPPgF8RsNyTRhfcoQmsqdt6+86anh4ngVddJrcctrxauqQ5Z2xdcPOG+OTNHpb7B uDjuLjvxM0bD9XGC45sWH4VEbz3dnN4J9ZhZwA3mRTeuPlZQVL0s5NrtRsnlIPEw7AhK 2EnyjvO33c7pYQ2nXkJTVYIu2Px7eIVwcHIK27fN0bf4+w+4uVrXi/9bS5kgQG7GGKMX QT4qi2SkiDvicVGlzt76VbQStimTHJzioSXg4S0f+3mEbHozHM5JoKkwzOA5Wm/VzlEf vQaaZdDqg3sESSBDT6ZIc7XMWTouP7MNM5n74pTVcJIDzrzqw8bN4F/qGIqaQMcjehOd 7ZmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=Wjec5BuF; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=y8Fm6tja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c11si7348947ejm.510.2021.09.06.05.38.16; Mon, 06 Sep 2021 05:38:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=Wjec5BuF; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=y8Fm6tja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242260AbhIFM26 (ORCPT + 99 others); Mon, 6 Sep 2021 08:28:58 -0400 Received: from smtp-out2.suse.de ([195.135.220.29]:56720 "EHLO smtp-out2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242247AbhIFM25 (ORCPT ); Mon, 6 Sep 2021 08:28:57 -0400 Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out2.suse.de (Postfix) with ESMTP id E5CB41FEEE; Mon, 6 Sep 2021 12:27:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1630931270; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=q5Gjv/o2r31Pg5vgSEoAXdlHZThs4FawYEtj69ES0+s=; b=Wjec5BuFH/snRU+lj0EWXJqw1F4PdiMVA37DDVriVRPiWzNFBLTMKM+So6qgjp8cBOY/qw mLKxW4bglIuDqnshO4dHOIsK58LZE/JEXPlTsU3dQChorU5/ge+QzD9/+bwdt4nGYB2374 Ttk8f5ucNkvnpjn9swZWaWNBoOv0zCM= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1630931270; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=q5Gjv/o2r31Pg5vgSEoAXdlHZThs4FawYEtj69ES0+s=; b=y8Fm6tjaBOyin7BFqKGEf25V2DvFHbrdu1O/xm6qRqlDTwZCeG5RsNRnYtAbEYpos5US/D R0+7g9L9iR25S/Cw== Received: from ds.suse.cz (ds.suse.cz [10.100.12.205]) by relay2.suse.de (Postfix) with ESMTP id DB451A3B88; Mon, 6 Sep 2021 12:27:50 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 83674DA781; Mon, 6 Sep 2021 14:27:47 +0200 (CEST) Date: Mon, 6 Sep 2021 14:27:47 +0200 From: David Sterba To: Baptiste Lepers Cc: "Paul E . McKenney" , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] btrfs: transaction: Fix misplaced barrier in btrfs_record_root_in_trans Message-ID: <20210906122747.GG3379@suse.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, Baptiste Lepers , "Paul E . McKenney" , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org References: <20210906012559.8605-1-baptiste.lepers@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210906012559.8605-1-baptiste.lepers@gmail.com> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 06, 2021 at 11:25:59AM +1000, Baptiste Lepers wrote: > Per comment, record_root_in_trans orders the writes of the root->state > and root->last_trans: > set_bit(BTRFS_ROOT_IN_TRANS_SETUP, &root->state); > smp_wmb(); > root->last_trans = trans->transid; > > But the barrier that enforces the order on the read side is misplaced: > smp_rmb(); <-- misplaced > if (root->last_trans == trans->transid && > <-- missing barrier here --> > !test_bit(BTRFS_ROOT_IN_TRANS_SETUP, &root->state)) > > This patches fixes the ordering and wraps the racy accesses with > READ_ONCE and WRITE_ONCE calls to avoid load/store tearing. > > Fixes: 7585717f304f5 ("Btrfs: fix relocation races") > Signed-off-by: Baptiste Lepers > --- > fs/btrfs/transaction.c | 7 ++++--- > 1 file changed, 4 insertions(+), 3 deletions(-) > > diff --git a/fs/btrfs/transaction.c b/fs/btrfs/transaction.c > index 14b9fdc8aaa9..a609222e6704 100644 > --- a/fs/btrfs/transaction.c > +++ b/fs/btrfs/transaction.c > @@ -437,7 +437,7 @@ static int record_root_in_trans(struct btrfs_trans_handle *trans, > (unsigned long)root->root_key.objectid, > BTRFS_ROOT_TRANS_TAG); > spin_unlock(&fs_info->fs_roots_radix_lock); > - root->last_trans = trans->transid; > + WRITE_ONCE(root->last_trans, trans->transid); > > /* this is pretty tricky. We don't want to > * take the relocation lock in btrfs_record_root_in_trans > @@ -489,7 +489,7 @@ int btrfs_record_root_in_trans(struct btrfs_trans_handle *trans, > struct btrfs_root *root) > { > struct btrfs_fs_info *fs_info = root->fs_info; > - int ret; > + int ret, last_trans; > > if (!test_bit(BTRFS_ROOT_SHAREABLE, &root->state)) > return 0; > @@ -498,8 +498,9 @@ int btrfs_record_root_in_trans(struct btrfs_trans_handle *trans, > * see record_root_in_trans for comments about IN_TRANS_SETUP usage > * and barriers > */ > + last_trans = READ_ONCE(root->last_trans); > smp_rmb(); > - if (root->last_trans == trans->transid && > + if (last_trans == trans->transid && > !test_bit(BTRFS_ROOT_IN_TRANS_SETUP, &root->state)) Aren't the smp_rmb barriers supposed to be used before the condition?