On 01/12/2019 01:17 AM, fdman...@kernel.org wrote:
From: Filipe Manana <fdman...@suse.com>

In a few places we are allocating a device using the GFP_KERNEL flag when
it is not safe to do so, because if reclaim is triggered it can cause a
transaction commit while we are holding the device list mutex. This mutex
is required in the transaction commit path (at write_all_supers() and
btrfs_update_commit_device_size()).

So fix this by setting up a nofs memory allocation context in those cases.

Fixes: 78f2c9e6dbb14 ("btrfs: device add and remove: use GFP_KERNEL")
Fixes: e0ae999414238 ("btrfs: preallocate device flush bio")
Signed-off-by: Filipe Manana <fdman...@suse.com>
---

V2: Change the approach to fix the problem by setting up nofs contextes
     where needed.

  fs/btrfs/volumes.c | 33 ++++++++++++++++++++++++++++++---
  1 file changed, 30 insertions(+), 3 deletions(-)

diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c
index 2576b1a379c9..663566baae78 100644
--- a/fs/btrfs/volumes.c
+++ b/fs/btrfs/volumes.c
@@ -14,6 +14,7 @@
  #include <linux/semaphore.h>
  #include <linux/uuid.h>
  #include <linux/list_sort.h>
+#include <linux/sched/mm.h>
  #include "ctree.h"
  #include "extent_map.h"
  #include "disk-io.h"
@@ -988,20 +989,29 @@ static noinline struct btrfs_device 
*device_list_add(const char *path,
        }
if (!device) {
+               unsigned int nofs_flag;
+
                if (fs_devices->opened) {
                        mutex_unlock(&fs_devices->device_list_mutex);
                        return ERR_PTR(-EBUSY);
                }
+ /*
+                * Setup nofs context because we are holding the device list
+                * mutex, which is required for a transaction commit.
+                */

I wonder if there is a bug due to GFP_KERNEL in device_list_add()?
as device_list_add() can only be called only when the FSID is not yet
mounted. OR if its done for the sake of consistency when calling\
btrfs_alloc_device().

Thanks, Anand


+               nofs_flag = memalloc_nofs_save();
                device = btrfs_alloc_device(NULL, &devid,
                                            disk_super->dev_item.uuid);
                if (IS_ERR(device)) {
+                       memalloc_nofs_restore(nofs_flag);
                        mutex_unlock(&fs_devices->device_list_mutex);
                        /* we can safely leave the fs_devices entry around */
                        return device;
                }
- name = rcu_string_strdup(path, GFP_NOFS);
+               name = rcu_string_strdup(path, GFP_KERNEL);
+               memalloc_nofs_restore(nofs_flag);
                if (!name) {
                        btrfs_free_device(device);
                        mutex_unlock(&fs_devices->device_list_mutex);
@@ -1137,11 +1147,19 @@ static struct btrfs_fs_devices *clone_fs_devices(struct 
btrfs_fs_devices *orig)
        /* We have held the volume lock, it is safe to get the devices. */
        list_for_each_entry(orig_dev, &orig->devices, dev_list) {
                struct rcu_string *name;
+               unsigned int nofs_flag;
+ /*
+                * Setup nofs context because we are holding the device list
+                * mutex, which is required for a transaction commit.
+                */
+               nofs_flag = memalloc_nofs_save();
                device = btrfs_alloc_device(NULL, &orig_dev->devid,
                                            orig_dev->uuid);
-               if (IS_ERR(device))
+               if (IS_ERR(device)) {
+                       memalloc_nofs_restore(nofs_flag);
                        goto error;
+               }
/*
                 * This is ok to do without rcu read locked because we hold the
@@ -1151,12 +1169,14 @@ static struct btrfs_fs_devices *clone_fs_devices(struct 
btrfs_fs_devices *orig)
                        name = rcu_string_strdup(orig_dev->name->str,
                                        GFP_KERNEL);
                        if (!name) {
+                               memalloc_nofs_restore(nofs_flag);
                                btrfs_free_device(device);
                                goto error;
                        }
                        rcu_assign_pointer(device->name, name);
                }
+ memalloc_nofs_restore(nofs_flag);
                list_add(&device->dev_list, &fs_devices->devices);
                device->fs_devices = fs_devices;
                fs_devices->num_devices++;
@@ -1262,6 +1282,7 @@ static void btrfs_close_one_device(struct btrfs_device 
*device)
        struct btrfs_fs_devices *fs_devices = device->fs_devices;
        struct btrfs_device *new_device;
        struct rcu_string *name;
+       unsigned int nofs_flag;
if (device->bdev)
                fs_devices->open_devices--;
@@ -1277,17 +1298,23 @@ static void btrfs_close_one_device(struct btrfs_device 
*device)
btrfs_close_bdev(device); + /*
+        * Setup nofs context because we are holding the device list
+        * mutex, which is required for a transaction commit.
+        */
+       nofs_flag = memalloc_nofs_save();
        new_device = btrfs_alloc_device(NULL, &device->devid,
                                        device->uuid);
        BUG_ON(IS_ERR(new_device)); /* -ENOMEM */
/* Safe because we are under uuid_mutex */
        if (device->name) {
-               name = rcu_string_strdup(device->name->str, GFP_NOFS);
+               name = rcu_string_strdup(device->name->str, GFP_KERNEL);
                BUG_ON(!name); /* -ENOMEM */
                rcu_assign_pointer(new_device->name, name);
        }
+ memalloc_nofs_restore(nofs_flag);
        list_replace_rcu(&device->dev_list, &new_device->dev_list);
        new_device->fs_devices = device->fs_devices;

Reply via email to