[Devel] [PATCH rh7 v2] cgroup: rework reference acquisition for cgroup_find_inode

Kirill Tkhai ktkhai at virtuozzo.com
Thu Nov 12 18:17:43 MSK 2020


On 12.11.2020 18:08, Andrey Zhadchenko wrote:
> On Thu, 12 Nov 2020 17:29:21 +0300
> Kirill Tkhai <ktkhai at virtuozzo.com> wrote:
> 
> Hi, Kirill,
> 
>> Hi, Andrey,
>>
>> On 11.11.2020 10:32, Andrey Zhadchenko wrote:
>>> Use more generic igrab instead of atomic inc. Move cgroup_hash_del
>>> to eviction stage to avoid deadlock.
>>>
>>> Signed-off-by: Andrey Zhadchenko <andrey.zhadchenko at virtuozzo.com>
>>> ---
>>>
>>> v2: adjusted function call order in cgroup_evict_inode to match
>>> existing code
>>>
>>>  kernel/cgroup.c | 25 ++++++++-----------------
>>>  1 file changed, 8 insertions(+), 17 deletions(-)
>>>
>>> diff --git a/kernel/cgroup.c b/kernel/cgroup.c
>>> index 27d7a5e..8c2cef8 100644
>>> --- a/kernel/cgroup.c
>>> +++ b/kernel/cgroup.c
>>> @@ -1522,21 +1522,10 @@ static struct inode
>>> *cgroup_find_inode(unsigned long fh[2], char take_ref) struct inode
>>> *ret = NULL; 
>>>  	spin_lock(&cgroup_inode_table_lock);
>>> -	item = cgroup_find_item_no_lock(fh);
>>>  
>>> -	/*
>>> -	 * If we need to increase refcount, we should be aware of
>>> possible
>>> -	 * deadlock. Another thread may have started deleting this
>>> inode:
>>> -	 * iput->iput_final->cgroup_delete_inode->cgroup_hash_del
>>> -	 * If we just call igrab, it will try to take i_lock and
>>> this will
>>> -	 * result in deadlock, because deleting thread has already
>>> taken it
>>> -	 * and waits on cgroup_inode_table_lock to find inode in
>>> hashtable.
>>> -	 *
>>> -	 * If i_count is zero, someone is deleting it -> skip.
>>> -	 */
>>> -	if (take_ref && item)
>>> -		if (!atomic_inc_not_zero(&item->inode->i_count))
>>> -			item = NULL;
>>> +	item = cgroup_find_item_no_lock(fh);
>>> +	if (item && take_ref && !igrab(item->inode))
>>> +		item = NULL;  
>>
>> Here you call igrab() under cgroup_inode_table_lock, so the check for
>> (inode->i_state & I_FREEING|I_WILL_FREE) is done under that lock and
>> i_lock.
>>
>> But clear_inode() sets "inode->i_state = I_FREEING | I_CLEAR" without
>> any lock. This place does not look obvious. Isn't there some problem? 
>>
> 
> iput_final() sets inode to I_FREEING under i_lock, release it and calls
> evict(), which calls cgroup_evict_inode() via
> inode->i_sb->s_op->evict().

What is about inodes in LRU?

Say, iput_final() moves inode to LRU with zero counter. I_FREEING is not
set there. Later prune_icache_sb() operates with that inode with zero counter.

Doesn't dispose_list()->evict()->cgroup_evict_inode() race with cgroup_find_inode()?

> If I get it right, this seems to be fine. As soon as iput_final starts
> working igrab shouldn't be able to take ref on this inode.
> 
>>>  
>>>  	spin_unlock(&cgroup_inode_table_lock);
>>>  
>>> @@ -1634,15 +1623,17 @@ static const struct export_operations
>>> cgroup_export_ops = { .fh_to_dentry	= cgroup_fh_to_dentry,
>>>  };
>>>  
>>> -static int cgroup_delete_inode(struct inode *inode)
>>> +static void cgroup_evict_inode(struct inode *inode)
>>>  {
>>> +	truncate_inode_pages_final(&inode->i_data);
>>> +	clear_inode(inode);
>>>  	cgroup_hash_del(inode);
>>> -	return generic_delete_inode(inode);
>>>  }
>>>  
>>>  static const struct super_operations cgroup_ops = {
>>>  	.statfs = simple_statfs,
>>> -	.drop_inode = cgroup_delete_inode,
>>> +	.drop_inode = generic_delete_inode,
>>> +	.evict_inode = cgroup_evict_inode,
>>>  	.show_options = cgroup_show_options,
>>>  #ifdef CONFIG_VE
>>>  	.show_path = cgroup_show_path,
>>>   
>>
> 



More information about the Devel mailing list