Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp934468pxb; Wed, 6 Apr 2022 04:44:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxO6G6y2u/ORSLUujm4QkwehW6oBeKWKz3zikoNA7YjMmzrDzcndbAorgK0ivxuE7mD2xfy X-Received: by 2002:a17:90b:3b8c:b0:1c6:ed78:67e2 with SMTP id pc12-20020a17090b3b8c00b001c6ed7867e2mr9574377pjb.163.1649245469478; Wed, 06 Apr 2022 04:44:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649245469; cv=none; d=google.com; s=arc-20160816; b=QrUBkC5yW6Bmgppa82WhH8CW/QfmDZuDsQrirD7bynljHqG4j3s/mYV1so7sBivs3Z Wsgn2H9++wAwSi2xKmxtafDmH5ShAGiqD3WBeyputt9vwp0EtKADSdz6BCKGzYCxkQmn hpYkEg5RQV1i4fGKq0QvYDavntGtwaMKMMVyDdnwxFxsnTFe1dcvp4m2dWes67SvQ2AG 7T7KJudVErHANT3mqPJ0Ui8dbUROsP7eUSNIuNXriahUmeU+jWCMUJFe15Lts6syR85w wfFnuYv24O0MlDjMu97bNL+DYlsik2/U2UnWkbyQI2WPuvWpkg4Kn1E8DW9cMNTvavxg YQUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kl17oBksMxQCCILlDAjqr7c/mF5Xu9ayU3hW2BQ2Qzg=; b=A8gw6tk1DZhiVf1gMq8WfHDLoTII09EXkvZn9vuwHtOezUhKrQ9TIUZG6WWAdoQpVK 4iWA/S5uPTFTgojopK467WaHX1i5VSM4poDxWNLVgOq94hN9vgTuN/MjJZH8SyD87QtC YL7pTPbgDAcwe0pR+/NeSr4azhYIh12SlHWSupQWHvvwYLbts8Uw5ayMQRJsPLXYNwUB 1j5PUtbVgY7kKCW/ktMnN5M0xjSN/ksAs4t24mB8VU+NwdGVXtrsTab2i9HGGRnvf/DQ u8aEciB+EYGXlFQJqgf7tU1x754ypFcpWUyLJVw3aJFPtQLWd/SIwPmBnS+egTpapAll +1SA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NzYbWlbV; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id k9-20020a056a00134900b004fabd831538si1853041pfu.196.2022.04.06.04.44.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 04:44:29 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NzYbWlbV; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7775F39889A; Wed, 6 Apr 2022 03:01:13 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1840405AbiDFBJ7 (ORCPT + 99 others); Tue, 5 Apr 2022 21:09:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1356019AbiDEKWq (ORCPT ); Tue, 5 Apr 2022 06:22:46 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64C13AC049; Tue, 5 Apr 2022 03:05:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1B7BDB81C83; Tue, 5 Apr 2022 10:05:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7EFC2C385A2; Tue, 5 Apr 2022 10:05:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649153134; bh=ZAmbnSi66YJBiK3yZR8/bo7oAsS7FS1Ko/w5oHmOhSE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NzYbWlbVKWvukKj07INWpbLNuyZcuw4W18FRXQmoBoUX4rux3cJAhhqfbgqPXV/ts Bu5yLlP0s4MpDMxAIZOQcqGE5NgsJHZTUJBvZF+wFB/7S7B0yjPMgCZ5YIB4FX+XAG b01m4GX5eYU7IT5l5DddDpeL2TxE/BnTHovo3oQk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mingzhe Zou , Coly Li Subject: [PATCH 5.10 113/599] bcache: fixup multiple threads crash Date: Tue, 5 Apr 2022 09:26:47 +0200 Message-Id: <20220405070302.200363585@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070258.802373272@linuxfoundation.org> References: <20220405070258.802373272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mingzhe Zou commit 887554ab96588de2917b6c8c73e552da082e5368 upstream. When multiple threads to check btree nodes in parallel, the main thread wait for all threads to stop or CACHE_SET_IO_DISABLE flag: wait_event_interruptible(check_state->wait, atomic_read(&check_state->started) == 0 || test_bit(CACHE_SET_IO_DISABLE, &c->flags)); However, the bch_btree_node_read and bch_btree_node_read_done maybe call bch_cache_set_error, then the CACHE_SET_IO_DISABLE will be set. If the flag already set, the main thread return error. At the same time, maybe some threads still running and read NULL pointer, the kernel will crash. This patch change the event wait condition, the main thread must wait for all threads to stop. Fixes: 8e7102273f597 ("bcache: make bch_btree_check() to be multithreaded") Signed-off-by: Mingzhe Zou Cc: stable@vger.kernel.org # v5.7+ Signed-off-by: Coly Li Signed-off-by: Greg Kroah-Hartman --- drivers/md/bcache/btree.c | 6 ++++-- drivers/md/bcache/writeback.c | 6 ++++-- 2 files changed, 8 insertions(+), 4 deletions(-) --- a/drivers/md/bcache/btree.c +++ b/drivers/md/bcache/btree.c @@ -2060,9 +2060,11 @@ int bch_btree_check(struct cache_set *c) } } + /* + * Must wait for all threads to stop. + */ wait_event_interruptible(check_state->wait, - atomic_read(&check_state->started) == 0 || - test_bit(CACHE_SET_IO_DISABLE, &c->flags)); + atomic_read(&check_state->started) == 0); for (i = 0; i < check_state->total_threads; i++) { if (check_state->infos[i].result) { --- a/drivers/md/bcache/writeback.c +++ b/drivers/md/bcache/writeback.c @@ -952,9 +952,11 @@ void bch_sectors_dirty_init(struct bcach } } + /* + * Must wait for all threads to stop. + */ wait_event_interruptible(state->wait, - atomic_read(&state->started) == 0 || - test_bit(CACHE_SET_IO_DISABLE, &c->flags)); + atomic_read(&state->started) == 0); out: kfree(state);