Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5333672yba; Wed, 8 May 2019 11:30:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqwGp3/FlbHzrR10qTgSPCS+aK68Au7yLDLYtAeFPqKGYf4emQG+pCLRw62Zrz3vDSdFCN79 X-Received: by 2002:a65:534b:: with SMTP id w11mr49031704pgr.210.1557340220523; Wed, 08 May 2019 11:30:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557340220; cv=none; d=google.com; s=arc-20160816; b=tjpKVoSaJPhaa9fX37jlsENGPH8WGTWqHGv2gSu2O9M4UKtrzKtLhApQenWrjjpvhE hfV49KQA4v1r5rUmsPwAfX/7d75eyGRV0A40FcRlxadfjAzkpUxa1YW5ReC5g7T/CQ/C vNS4G9u4+1KtjWD5L9i0cTREWj3mkBI3XauUjn4t+CLheR9JFgp6Jf0kQDgrldxzhG6D Vh5vXh902tUeuHOnXEbtIotKC0/IQyANLraeeDy5RfMU72MXiSGbE7wvOU4bLOIjDeB8 LEeA+BgW8OOmwYPEy43QRQbl7fHOLui1kJkL4+JEVPiEkiH/XsFjwkwIdWMR/vuRBLO9 BwAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=v+XidUzDwEoCRnKxO4nXAyKwLNLkO6eCp1SF7LbNx1M=; b=gSsrNU45M/HCIGib0v2l41PnLutt3dTVT0ki2SZ8MJiDFkxskjA2taYx+tSeLskDp+ UZwL5hndgNfWhEsBWdvllRCqvARVxvFMTIO2MhVLucE6ayOsatMlm+OhZxbUYAiLkn3x gccFUedV/gTY0Fv5f0+Fuf2JelsMnXgEUSy2GNQk30HAbMFG9R9rHyCwRCQ5f/q95aR5 EJamh4i+DjyhL02AfTB3XPE+/YWm4trcVWUSv2Y4sR3WUIPKI3E7271dfR1lOIMJ8mCY N59fAihD4tKZWLqOcw7xU4B9XAG6mWydkqB4fd9CiIOYMnHnLr/lHb/ss98CLhawShJB cmKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si21988472pgp.118.2019.05.08.11.29.55; Wed, 08 May 2019 11:30:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727771AbfEHSSr (ORCPT + 99 others); Wed, 8 May 2019 14:18:47 -0400 Received: from out30-56.freemail.mail.aliyun.com ([115.124.30.56]:44726 "EHLO out30-56.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727352AbfEHSSr (ORCPT ); Wed, 8 May 2019 14:18:47 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=wuyihao@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0TRCTQGt_1557339523; Received: from ali-186590dcce93-2.local(mailfrom:wuyihao@linux.alibaba.com fp:SMTPD_---0TRCTQGt_1557339523) by smtp.aliyun-inc.com(127.0.0.1); Thu, 09 May 2019 02:18:44 +0800 Subject: Re: [PATCH 1/2] NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter To: Jeff Layton , linux-nfs@vger.kernel.org, "J. Bruce Fields" Cc: stable@vger.kernel.org, Joseph Qi , caspar@linux.alibaba.com References: <2a1cebca-1efb-1686-475b-a581e50e61b4@linux.alibaba.com> <84addb90fc41372ad723d469a00bbb4cce2c9c55.camel@kernel.org> From: Yihao Wu Message-ID: <0f965495-9bb7-e35e-696b-5115f561366c@linux.alibaba.com> Date: Thu, 9 May 2019 02:18:46 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <84addb90fc41372ad723d469a00bbb4cce2c9c55.camel@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 2019/5/8 8:24 PM, Jeff Layton wrote: > On Wed, 2019-05-08 at 17:13 +0800, Yihao Wu wrote: >> Commit b7dbcc0e433f ""NFSv4.1: Fix a race where CB_NOTIFY_LOCK fails >> to wake a waiter" found this bug. However it didn't fix it. This can >> be fixed by adding memory barrier pair. >> >> Specifically, if any CB_NOTIFY_LOCK should be handled between unlocking >> the wait queue and freezable_schedule_timeout, only two cases are >> possible. So CB_NOTIFY_LOCK will not be dropped unexpectly. >> >> 1. The callback thread marks the NFS client as waked. Then NFS client >> noticed that itself is waked, so it don't goes to sleep. And it cleans >> its wake mark. >> >> 2. The NFS client noticed that itself is not waked yet, so it goes to >> sleep. No modification will ever happen to the wake mark in between. >> > > It's not clear to me what you mean by "wake mark" here. Do you mean the > "notified" flag? This could use a better description. Yes. I mean "notified flag" by "wake mark". I will clear these ambiguities. Thanks > >> Fixes: a1d617d ("nfs: allow blocking locks to be awoken by lock callbacks") >> Signed-off-by: Yihao Wu >> --- >> fs/nfs/nfs4proc.c | 21 +++++---------------- >> 1 file changed, 5 insertions(+), 16 deletions(-) >> >> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c >> index 741ff8c..f13ea09 100644 >> --- a/fs/nfs/nfs4proc.c >> +++ b/fs/nfs/nfs4proc.c >> @@ -6867,7 +6867,6 @@ struct nfs4_lock_waiter { >> struct task_struct *task; >> struct inode *inode; >> struct nfs_lowner *owner; >> - bool notified; >> }; >> >> static int >> @@ -6889,13 +6888,13 @@ struct nfs4_lock_waiter { >> /* Make sure it's for the right inode */ >> if (nfs_compare_fh(NFS_FH(waiter->inode), &cbnl->cbnl_fh)) >> return 0; >> - >> - waiter->notified = true; >> } >> >> /* override "private" so we can use default_wake_function */ >> wait->private = waiter->task; >> - ret = autoremove_wake_function(wait, mode, flags, key); >> + ret = woken_wake_function(wait, mode, flags, key); >> + if (ret) >> + list_del_init(&wait->entry); >> wait->private = waiter; >> return ret; >> } >> @@ -6914,8 +6913,7 @@ struct nfs4_lock_waiter { >> .s_dev = server->s_dev }; >> struct nfs4_lock_waiter waiter = { .task = current, >> .inode = state->inode, >> - .owner = &owner, >> - .notified = false }; >> + .owner = &owner}; >> wait_queue_entry_t wait; >> >> /* Don't bother with waitqueue if we don't expect a callback */ >> @@ -6928,21 +6926,12 @@ struct nfs4_lock_waiter { >> add_wait_queue(q, &wait); >> >> while(!signalled()) { >> - waiter.notified = false; >> status = nfs4_proc_setlk(state, cmd, request); >> if ((status != -EAGAIN) || IS_SETLK(cmd)) >> break; >> >> status = -ERESTARTSYS; >> - spin_lock_irqsave(&q->lock, flags); >> - if (waiter.notified) { >> - spin_unlock_irqrestore(&q->lock, flags); >> - continue; >> - } >> - set_current_state(TASK_INTERRUPTIBLE); >> - spin_unlock_irqrestore(&q->lock, flags); >> - >> - freezable_schedule_timeout(NFS4_LOCK_MAXTIMEOUT); >> + wait_woken(&wait, TASK_INTERRUPTIBLE, NFS4_LOCK_MAXTIMEOUT); > > This seems to have dropped the "freezable" part above, such that waiting > on a file lock will prevent (e.g.) a laptop from suspending. I think > that needs to be in here as those waits can be quite long. > You're right. I overlooked this. This will be fixed. Thanks >> } >> >> finish_wait(q, &wait); >