[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240711030624.266440-2-wangzhaolong1@huawei.com>
Date: Thu, 11 Jul 2024 11:06:24 +0800
From: Wang Zhaolong <wangzhaolong1@...wei.com>
To: <richard@....at>
CC: <linux-mtd@...ts.infradead.org>, <linux-kernel@...r.kernel.org>,
<wangzhaolong1@...wei.com>, <yi.zhang@...wei.com>, <chengzhihao1@...wei.com>
Subject: [RFC 1/1] ubifs: avoid deadlock when deleting an inode with xattr
When an inode with extended attributes is deleted, UBIFS needs to delete
the xattr inode as well. Currently, it uses ubifs_iget() to get the xattr
inode, which may block if the inode is under deletion. This can lead to
deadlocks if the inode deletion is waiting for the completion of the xattr
inode deletion.
To avoid this deadlock, this patch makes the following changes:
1. Replace ubifs_iget() with find_inode_nowait() when getting the xattr inode
in ubifs_jnl_write_inode(). find_inode_nowait() will not block if the inode
is under deletion.
2. If find_inode_nowait() finds the inode in cache, clear the nlink and pack
the inode immediately to avoid losing inode info.
3. If find_inode_nowait() cannot find the inode in cache (returns NULL), read
the inode directly from the media using ubifs_tnc_lookup(), clear the nlink,
prepare the inode and pack it.
4. Add a new function ubifs_match_ino() to be used as the match callback for
find_inode_nowait().
5. Replace ilookup() with find_inode_nowait() in ubifs_evict_xattr_inode() to
avoid subsequent blocking during inode eviction.
With the above changes, the xattr inode deletion will not block waiting for
the host inode deletion, thus avoiding the deadlock.
Signed-off-by: Wang Zhaolong <wangzhaolong1@...wei.com>
---
fs/ubifs/journal.c | 42 ++++++++++++++++++++++++++++++++++--------
fs/ubifs/super.c | 15 +++++++++++++++
fs/ubifs/ubifs.h | 1 +
fs/ubifs/xattr.c | 12 +++++++-----
4 files changed, 57 insertions(+), 13 deletions(-)
diff --git a/fs/ubifs/journal.c b/fs/ubifs/journal.c
index 74aee92433d7..7aba91d31a15 100644
--- a/fs/ubifs/journal.c
+++ b/fs/ubifs/journal.c
@@ -1007,6 +1007,8 @@ int ubifs_jnl_write_inode(struct ubifs_info *c, const struct inode *inode)
struct fscrypt_name nm = {0};
struct inode *xino;
struct ubifs_dent_node *xent, *pxent = NULL;
+ struct ubifs_ino_node *xino_node;
+ union ubifs_key xkey;
if (ui->xattr_cnt > ubifs_xattr_max_cnt(c)) {
err = -EPERM;
@@ -1029,22 +1031,46 @@ int ubifs_jnl_write_inode(struct ubifs_info *c, const struct inode *inode)
fname_name(&nm) = xent->name;
fname_len(&nm) = le16_to_cpu(xent->nlen);
- xino = ubifs_iget(c->vfs_sb, le64_to_cpu(xent->inum));
+ xino = find_inode_nowait(c->vfs_sb, le64_to_cpu(xent->inum),
+ ubifs_match_ino, NULL);
if (IS_ERR(xino)) {
err = PTR_ERR(xino);
ubifs_err(c, "dead directory entry '%s', error %d",
xent->name, err);
- ubifs_ro_mode(c, err);
kfree(pxent);
kfree(xent);
goto out_release;
+ } else if (xino) {
+ /* Found xattr inode in cache, pack it in order not to lose node info */
+ ubifs_assert(c, ubifs_inode(xino)->xattr);
+ clear_nlink(xino);
+ pack_inode(c, ino, xino, 0);
+ ino = (void *)ino + UBIFS_INO_NODE_SZ;
+ iput(xino);
+ } else {
+ /* Can't grab inode in cache, read it directly from the media */
+ xino_node = kmalloc(UBIFS_MAX_INO_NODE_SZ, GFP_NOFS);
+ if (!ino) {
+ err = -ENOMEM;
+ kfree(pxent);
+ kfree(xent);
+ goto out_release;
+ }
+ ino_key_init(c, &xkey, le64_to_cpu(xent->inum));
+ err = ubifs_tnc_lookup(c, &xkey, xino_node);
+ if (err) {
+ kfree(xino_node);
+ kfree(pxent);
+ kfree(xent);
+ goto out_release;
+ }
+
+ xino_node->nlink = cpu_to_le32(0);
+ ubifs_prep_grp_node(c, xino_node, UBIFS_INO_NODE_SZ, 0);
+ memcpy(ino, xino_node, UBIFS_INO_NODE_SZ);
+ ino = (void *)ino + UBIFS_INO_NODE_SZ;
+ kfree(xino_node);
}
- ubifs_assert(c, ubifs_inode(xino)->xattr);
-
- clear_nlink(xino);
- pack_inode(c, ino, xino, 0);
- ino = (void *)ino + UBIFS_INO_NODE_SZ;
- iput(xino);
kfree(pxent);
pxent = xent;
diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c
index 291583005dd1..1de523fb6ee6 100644
--- a/fs/ubifs/super.c
+++ b/fs/ubifs/super.c
@@ -100,6 +100,21 @@ static int validate_inode(struct ubifs_info *c, const struct inode *inode)
return err;
}
+int ubifs_match_ino(struct inode *inode, unsigned long ino, void *data)
+{
+ if (inode->i_ino != ino)
+ return 0;
+
+ inode = igrab(inode);
+ if (!inode)
+ return -1;
+
+ if (inode->i_state & I_NEW)
+ return -1;
+
+ return 1;
+}
+
struct inode *ubifs_iget(struct super_block *sb, unsigned long inum)
{
int err;
diff --git a/fs/ubifs/ubifs.h b/fs/ubifs/ubifs.h
index 1f3ea879d93a..d75bf5878515 100644
--- a/fs/ubifs/ubifs.h
+++ b/fs/ubifs/ubifs.h
@@ -2077,6 +2077,7 @@ static inline int ubifs_init_security(struct inode *dentry,
/* super.c */
struct inode *ubifs_iget(struct super_block *sb, unsigned long inum);
+int ubifs_match_ino(struct inode *inode, unsigned long ino, void *data);
/* recovery.c */
int ubifs_recover_master_node(struct ubifs_info *c);
diff --git a/fs/ubifs/xattr.c b/fs/ubifs/xattr.c
index 0847db521984..e3d001e69fdf 100644
--- a/fs/ubifs/xattr.c
+++ b/fs/ubifs/xattr.c
@@ -585,11 +585,13 @@ void ubifs_evict_xattr_inode(struct ubifs_info *c, ino_t xattr_inum)
{
struct inode *inode;
- inode = ilookup(c->vfs_sb, xattr_inum);
- if (inode) {
- clear_nlink(inode);
- iput(inode);
- }
+ inode = find_inode_nowait(c->vfs_sb, xattr_inum,
+ ubifs_match_ino, NULL);
+ if (IS_ERR_OR_NULL(inode))
+ return;
+
+ clear_nlink(inode);
+ iput(inode);
}
static int ubifs_xattr_remove(struct inode *host, const char *name)
--
2.34.3
Powered by blists - more mailing lists