Patch "block: Fix potential deadlock while freezing queue and acquiring sysfs_lock" has been added to the 6.12-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    block: Fix potential deadlock while freezing queue and acquiring sysfs_lock

to the 6.12-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     block-fix-potential-deadlock-while-freezing-queue-an.patch
and it can be found in the queue-6.12 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit 1c427ba428d7f4a51f1d5a99a1630de483029251
Author: Nilay Shroff <nilay@xxxxxxxxxxxxx>
Date:   Tue Dec 10 20:11:43 2024 +0530

    block: Fix potential deadlock while freezing queue and acquiring sysfs_lock
    
    [ Upstream commit be26ba96421ab0a8fa2055ccf7db7832a13c44d2 ]
    
    For storing a value to a queue attribute, the queue_attr_store function
    first freezes the queue (->q_usage_counter(io)) and then acquire
    ->sysfs_lock. This seems not correct as the usual ordering should be to
    acquire ->sysfs_lock before freezing the queue. This incorrect ordering
    causes the following lockdep splat which we are able to reproduce always
    simply by accessing /sys/kernel/debug file using ls command:
    
    [   57.597146] WARNING: possible circular locking dependency detected
    [   57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: G        W
    [   57.597162] ------------------------------------------------------
    [   57.597168] ls/4605 is trying to acquire lock:
    [   57.597176] c00000003eb56710 (&mm->mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0
    [   57.597200]
                   but task is already holding lock:
    [   57.597207] c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, at: iterate_dir+0x94/0x1d4
    [   57.597226]
                   which lock already depends on the new lock.
    
    [   57.597233]
                   the existing dependency chain (in reverse order) is:
    [   57.597241]
                   -> #5 (&sb->s_type->i_mutex_key#3){++++}-{4:4}:
    [   57.597255]        down_write+0x6c/0x18c
    [   57.597264]        start_creating+0xb4/0x24c
    [   57.597274]        debugfs_create_dir+0x2c/0x1e8
    [   57.597283]        blk_register_queue+0xec/0x294
    [   57.597292]        add_disk_fwnode+0x2e4/0x548
    [   57.597302]        brd_alloc+0x2c8/0x338
    [   57.597309]        brd_init+0x100/0x178
    [   57.597317]        do_one_initcall+0x88/0x3e4
    [   57.597326]        kernel_init_freeable+0x3cc/0x6e0
    [   57.597334]        kernel_init+0x34/0x1cc
    [   57.597342]        ret_from_kernel_user_thread+0x14/0x1c
    [   57.597350]
                   -> #4 (&q->debugfs_mutex){+.+.}-{4:4}:
    [   57.597362]        __mutex_lock+0xfc/0x12a0
    [   57.597370]        blk_register_queue+0xd4/0x294
    [   57.597379]        add_disk_fwnode+0x2e4/0x548
    [   57.597388]        brd_alloc+0x2c8/0x338
    [   57.597395]        brd_init+0x100/0x178
    [   57.597402]        do_one_initcall+0x88/0x3e4
    [   57.597410]        kernel_init_freeable+0x3cc/0x6e0
    [   57.597418]        kernel_init+0x34/0x1cc
    [   57.597426]        ret_from_kernel_user_thread+0x14/0x1c
    [   57.597434]
                   -> #3 (&q->sysfs_lock){+.+.}-{4:4}:
    [   57.597446]        __mutex_lock+0xfc/0x12a0
    [   57.597454]        queue_attr_store+0x9c/0x110
    [   57.597462]        sysfs_kf_write+0x70/0xb0
    [   57.597471]        kernfs_fop_write_iter+0x1b0/0x2ac
    [   57.597480]        vfs_write+0x3dc/0x6e8
    [   57.597488]        ksys_write+0x84/0x140
    [   57.597495]        system_call_exception+0x130/0x360
    [   57.597504]        system_call_common+0x160/0x2c4
    [   57.597516]
                   -> #2 (&q->q_usage_counter(io)#21){++++}-{0:0}:
    [   57.597530]        __submit_bio+0x5ec/0x828
    [   57.597538]        submit_bio_noacct_nocheck+0x1e4/0x4f0
    [   57.597547]        iomap_readahead+0x2a0/0x448
    [   57.597556]        xfs_vm_readahead+0x28/0x3c
    [   57.597564]        read_pages+0x88/0x41c
    [   57.597571]        page_cache_ra_unbounded+0x1ac/0x2d8
    [   57.597580]        filemap_get_pages+0x188/0x984
    [   57.597588]        filemap_read+0x13c/0x4bc
    [   57.597596]        xfs_file_buffered_read+0x88/0x17c
    [   57.597605]        xfs_file_read_iter+0xac/0x158
    [   57.597614]        vfs_read+0x2d4/0x3b4
    [   57.597622]        ksys_read+0x84/0x144
    [   57.597629]        system_call_exception+0x130/0x360
    [   57.597637]        system_call_common+0x160/0x2c4
    [   57.597647]
                   -> #1 (mapping.invalidate_lock#2){++++}-{4:4}:
    [   57.597661]        down_read+0x6c/0x220
    [   57.597669]        filemap_fault+0x870/0x100c
    [   57.597677]        xfs_filemap_fault+0xc4/0x18c
    [   57.597684]        __do_fault+0x64/0x164
    [   57.597693]        __handle_mm_fault+0x1274/0x1dac
    [   57.597702]        handle_mm_fault+0x248/0x484
    [   57.597711]        ___do_page_fault+0x428/0xc0c
    [   57.597719]        hash__do_page_fault+0x30/0x68
    [   57.597727]        do_hash_fault+0x90/0x35c
    [   57.597736]        data_access_common_virt+0x210/0x220
    [   57.597745]        _copy_from_user+0xf8/0x19c
    [   57.597754]        sel_write_load+0x178/0xd54
    [   57.597762]        vfs_write+0x108/0x6e8
    [   57.597769]        ksys_write+0x84/0x140
    [   57.597777]        system_call_exception+0x130/0x360
    [   57.597785]        system_call_common+0x160/0x2c4
    [   57.597794]
                   -> #0 (&mm->mmap_lock){++++}-{4:4}:
    [   57.597806]        __lock_acquire+0x17cc/0x2330
    [   57.597814]        lock_acquire+0x138/0x400
    [   57.597822]        __might_fault+0x7c/0xc0
    [   57.597830]        filldir64+0xe8/0x390
    [   57.597839]        dcache_readdir+0x80/0x2d4
    [   57.597846]        iterate_dir+0xd8/0x1d4
    [   57.597855]        sys_getdents64+0x88/0x2d4
    [   57.597864]        system_call_exception+0x130/0x360
    [   57.597872]        system_call_common+0x160/0x2c4
    [   57.597881]
                   other info that might help us debug this:
    
    [   57.597888] Chain exists of:
                     &mm->mmap_lock --> &q->debugfs_mutex --> &sb->s_type->i_mutex_key#3
    
    [   57.597905]  Possible unsafe locking scenario:
    
    [   57.597911]        CPU0                    CPU1
    [   57.597917]        ----                    ----
    [   57.597922]   rlock(&sb->s_type->i_mutex_key#3);
    [   57.597932]                                lock(&q->debugfs_mutex);
    [   57.597940]                                lock(&sb->s_type->i_mutex_key#3);
    [   57.597950]   rlock(&mm->mmap_lock);
    [   57.597958]
                    *** DEADLOCK ***
    
    [   57.597965] 2 locks held by ls/4605:
    [   57.597971]  #0: c0000000137c12f8 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0xcc/0x154
    [   57.597989]  #1: c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, at: iterate_dir+0x94/0x1d4
    
    Prevent the above lockdep warning by acquiring ->sysfs_lock before
    freezing the queue while storing a queue attribute in queue_attr_store
    function. Later, we also found[1] another function __blk_mq_update_nr_
    hw_queues where we first freeze queue and then acquire the ->sysfs_lock.
    So we've also updated lock ordering in __blk_mq_update_nr_hw_queues
    function and ensured that in all code paths we follow the correct lock
    ordering i.e. acquire ->sysfs_lock before freezing the queue.
    
    [1] https://lore.kernel.org/all/CAFj5m9Ke8+EHKQBs_Nk6hqd=LGXtk4mUxZUN5==ZcCjnZSBwHw@xxxxxxxxxxxxxx/
    
    Reported-by: kjain@xxxxxxxxxxxxx
    Fixes: af2814149883 ("block: freeze the queue in queue_attr_store")
    Tested-by: kjain@xxxxxxxxxxxxx
    Cc: hch@xxxxxx
    Cc: axboe@xxxxxxxxx
    Cc: ritesh.list@xxxxxxxxx
    Cc: ming.lei@xxxxxxxxxx
    Cc: gjoyce@xxxxxxxxxxxxx
    Signed-off-by: Nilay Shroff <nilay@xxxxxxxxxxxxx>
    Reviewed-by: Ming Lei <ming.lei@xxxxxxxxxx>
    Link: https://lore.kernel.org/r/20241210144222.1066229-1-nilay@xxxxxxxxxxxxx
    Signed-off-by: Jens Axboe <axboe@xxxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/block/blk-mq-sysfs.c b/block/blk-mq-sysfs.c
index 156e9bb07abf..cd5ea6eaa76b 100644
--- a/block/blk-mq-sysfs.c
+++ b/block/blk-mq-sysfs.c
@@ -275,15 +275,13 @@ void blk_mq_sysfs_unregister_hctxs(struct request_queue *q)
 	struct blk_mq_hw_ctx *hctx;
 	unsigned long i;
 
-	mutex_lock(&q->sysfs_dir_lock);
+	lockdep_assert_held(&q->sysfs_dir_lock);
+
 	if (!q->mq_sysfs_init_done)
-		goto unlock;
+		return;
 
 	queue_for_each_hw_ctx(q, hctx, i)
 		blk_mq_unregister_hctx(hctx);
-
-unlock:
-	mutex_unlock(&q->sysfs_dir_lock);
 }
 
 int blk_mq_sysfs_register_hctxs(struct request_queue *q)
@@ -292,9 +290,10 @@ int blk_mq_sysfs_register_hctxs(struct request_queue *q)
 	unsigned long i;
 	int ret = 0;
 
-	mutex_lock(&q->sysfs_dir_lock);
+	lockdep_assert_held(&q->sysfs_dir_lock);
+
 	if (!q->mq_sysfs_init_done)
-		goto unlock;
+		return ret;
 
 	queue_for_each_hw_ctx(q, hctx, i) {
 		ret = blk_mq_register_hctx(hctx);
@@ -302,8 +301,5 @@ int blk_mq_sysfs_register_hctxs(struct request_queue *q)
 			break;
 	}
 
-unlock:
-	mutex_unlock(&q->sysfs_dir_lock);
-
 	return ret;
 }
diff --git a/block/blk-mq.c b/block/blk-mq.c
index 1030875a3e95..cc1b32023838 100644
--- a/block/blk-mq.c
+++ b/block/blk-mq.c
@@ -4462,7 +4462,8 @@ static void blk_mq_realloc_hw_ctxs(struct blk_mq_tag_set *set,
 	unsigned long i, j;
 
 	/* protect against switching io scheduler  */
-	mutex_lock(&q->sysfs_lock);
+	lockdep_assert_held(&q->sysfs_lock);
+
 	for (i = 0; i < set->nr_hw_queues; i++) {
 		int old_node;
 		int node = blk_mq_get_hctx_node(set, i);
@@ -4495,7 +4496,6 @@ static void blk_mq_realloc_hw_ctxs(struct blk_mq_tag_set *set,
 
 	xa_for_each_start(&q->hctx_table, j, hctx, j)
 		blk_mq_exit_hctx(q, set, hctx, j);
-	mutex_unlock(&q->sysfs_lock);
 
 	/* unregister cpuhp callbacks for exited hctxs */
 	blk_mq_remove_hw_queues_cpuhp(q);
@@ -4527,10 +4527,14 @@ int blk_mq_init_allocated_queue(struct blk_mq_tag_set *set,
 
 	xa_init(&q->hctx_table);
 
+	mutex_lock(&q->sysfs_lock);
+
 	blk_mq_realloc_hw_ctxs(set, q);
 	if (!q->nr_hw_queues)
 		goto err_hctxs;
 
+	mutex_unlock(&q->sysfs_lock);
+
 	INIT_WORK(&q->timeout_work, blk_mq_timeout_work);
 	blk_queue_rq_timeout(q, set->timeout ? set->timeout : 30 * HZ);
 
@@ -4549,6 +4553,7 @@ int blk_mq_init_allocated_queue(struct blk_mq_tag_set *set,
 	return 0;
 
 err_hctxs:
+	mutex_unlock(&q->sysfs_lock);
 	blk_mq_release(q);
 err_exit:
 	q->mq_ops = NULL;
@@ -4929,12 +4934,12 @@ static bool blk_mq_elv_switch_none(struct list_head *head,
 		return false;
 
 	/* q->elevator needs protection from ->sysfs_lock */
-	mutex_lock(&q->sysfs_lock);
+	lockdep_assert_held(&q->sysfs_lock);
 
 	/* the check has to be done with holding sysfs_lock */
 	if (!q->elevator) {
 		kfree(qe);
-		goto unlock;
+		goto out;
 	}
 
 	INIT_LIST_HEAD(&qe->node);
@@ -4944,9 +4949,7 @@ static bool blk_mq_elv_switch_none(struct list_head *head,
 	__elevator_get(qe->type);
 	list_add(&qe->node, head);
 	elevator_disable(q);
-unlock:
-	mutex_unlock(&q->sysfs_lock);
-
+out:
 	return true;
 }
 
@@ -4975,11 +4978,9 @@ static void blk_mq_elv_switch_back(struct list_head *head,
 	list_del(&qe->node);
 	kfree(qe);
 
-	mutex_lock(&q->sysfs_lock);
 	elevator_switch(q, t);
 	/* drop the reference acquired in blk_mq_elv_switch_none */
 	elevator_put(t);
-	mutex_unlock(&q->sysfs_lock);
 }
 
 static void __blk_mq_update_nr_hw_queues(struct blk_mq_tag_set *set,
@@ -4999,8 +5000,11 @@ static void __blk_mq_update_nr_hw_queues(struct blk_mq_tag_set *set,
 	if (set->nr_maps == 1 && nr_hw_queues == set->nr_hw_queues)
 		return;
 
-	list_for_each_entry(q, &set->tag_list, tag_set_list)
+	list_for_each_entry(q, &set->tag_list, tag_set_list) {
+		mutex_lock(&q->sysfs_dir_lock);
+		mutex_lock(&q->sysfs_lock);
 		blk_mq_freeze_queue(q);
+	}
 	/*
 	 * Switch IO scheduler to 'none', cleaning up the data associated
 	 * with the previous scheduler. We will switch back once we are done
@@ -5056,8 +5060,11 @@ static void __blk_mq_update_nr_hw_queues(struct blk_mq_tag_set *set,
 	list_for_each_entry(q, &set->tag_list, tag_set_list)
 		blk_mq_elv_switch_back(&head, q);
 
-	list_for_each_entry(q, &set->tag_list, tag_set_list)
+	list_for_each_entry(q, &set->tag_list, tag_set_list) {
 		blk_mq_unfreeze_queue(q);
+		mutex_unlock(&q->sysfs_lock);
+		mutex_unlock(&q->sysfs_dir_lock);
+	}
 
 	/* Free the excess tags when nr_hw_queues shrink. */
 	for (i = set->nr_hw_queues; i < prev_nr_hw_queues; i++)
diff --git a/block/blk-sysfs.c b/block/blk-sysfs.c
index 207577145c54..42c2cb97d778 100644
--- a/block/blk-sysfs.c
+++ b/block/blk-sysfs.c
@@ -690,11 +690,11 @@ queue_attr_store(struct kobject *kobj, struct attribute *attr,
 			return res;
 	}
 
-	blk_mq_freeze_queue(q);
 	mutex_lock(&q->sysfs_lock);
+	blk_mq_freeze_queue(q);
 	res = entry->store(disk, page, length);
-	mutex_unlock(&q->sysfs_lock);
 	blk_mq_unfreeze_queue(q);
+	mutex_unlock(&q->sysfs_lock);
 	return res;
 }
 




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux