From: Michael Wu <michael@allwinnertech.com>
To: axboe@kernel.dk
Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: [PATCH] block: fix deadlock between blk_mq_freeze_queue and blk_mq_dispatch_list
Date: Fri, 17 Apr 2026 16:27:44 +0800 [thread overview]
Message-ID: <20260417082744.30124-1-michael@allwinnertech.com> (raw)
Kernel: Linux version 6.18.16
Platform: Android
A three-way deadlock can occur between blk_mq_freeze_queue and
blk_mq_dispatch_list involving percpu_ref reference counting and rwsem
synchronization:
- Task A holds io_rwsem (e.g., F2FS write path) and enters __bio_queue_enter(),
where it acquires percpu_ref and waits for mq_freeze_depth==0
- Task B holds mq_freeze_depth=1 (elevator_change) and waits for
q_usage_counter to reach zero in blk_mq_freeze_queue_wait()
- Task C is scheduled out via schedule() while waiting for io_rwsem.
Before switching, __blk_flush_plug() triggers blk_mq_dispatch_list()
which acquires percpu_ref via percpu_ref_get(). If preempt_schedule_notrace()
is triggered before percpu_ref_put(), Task C holds the reference while
blocked on the rwsem.
Since Task C cannot release its percpu_ref while blocked, Task B cannot
unfreeze the queue, and Task A cannot proceed to release the io_rwsem,
creating a circular dependency deadlock.
Change:
Fix by disabling preemption in blk_mq_dispatch_list() when called from
schedule() (from_sched=true), ensuring percpu_ref_get() and percpu_ref_put()
are atomic with respect to context switches. With from_sched=true,
blk_mq_run_hw_queue() dispatches asynchronously via kblockd, so no driver
callbacks run in this context and preempt_disable() is safe.
Detailed scenario description:
When process 1838 performs f2fs_submit_page_write, it obtains io_rwsem via
f2fs_down_write_trace. When process 1865 performs f2fs_down_write_trace and
wants to obtain io_rwsem, it needs to wait for process 1838 to release it,
so it can only be scheduled out via schedule. Before being scheduled out,
it clears the plug via __blk_flush_plug, so it will run to blk_mq_dispatch_list.
Process 619 is modifying the I/O scheduling algorithm, calling elevator_change
to set mq_freeze_depth=1. After that, blk_mq_freeze_queue_wait will wait for
the reference count of q_usage_counter to return to zero. Coincidentally,
process 1838 needs to wait for mq_freeze_depth=0 when it reaches
__bio_queue_enter, so it can only wait to be woken up after q_freeze_depth=0.
At this time, process 1865, when blk_mq_dispatch_list reaches the point where
percpu_ref_get increments the q_usage_counter reference, and before
percpu_ref_put, it calls preempt_schedule_notrace to schedule the process out
due to preemption, causing q_usage_counter to never reach zero.
At this point, process 1865 depends on io_rwsem to wake up, process 1838
depends on mq_freeze_depth=0 to wake up, and process 619 depends on
q_usage_counter being zero to wake up and unfreeze (setting mq_freeze_depth=0),
resulting in a deadlock between these three processes.
Stack traces from the deadlock:
Task 1838 (Back-P10-3) - holds io_rwsem, waiting for queue unfreeze:
Call trace:
__switch_to+0x1a4/0x35c
__schedule+0x8e0/0xec4
schedule+0x54/0xf8
__bio_queue_enter+0xbc/0x19c
blk_mq_submit_bio+0x118/0x814
__submit_bio+0x9c/0x234
submit_bio_noacct_nocheck+0x10c/0x2d4
submit_bio_noacct+0x354/0x544
submit_bio+0x1e8/0x208
f2fs_submit_write_bio+0x44/0xe4
__submit_merged_bio+0x40/0x114
f2fs_submit_page_write+0x3f0/0x7e0
do_write_page+0x180/0x2fc
f2fs_outplace_write_data+0x78/0x100
f2fs_do_write_data_page+0x3b8/0x500
f2fs_write_single_data_page+0x1ac/0x6e0
f2fs_write_data_pages+0x838/0xdfc
do_writepages+0xd0/0x19c
filemap_write_and_wait_range+0x204/0x274
f2fs_commit_atomic_write+0x54/0x960
__f2fs_ioctl+0x2128/0x42c8
f2fs_ioctl+0x38/0xb4
__arm64_sys_ioctl+0xa0/0xf4
Task 619 (android.hardwar) - holds mq_freeze_depth=1, waiting for percpu_ref:
Call trace:
__switch_to+0x1a4/0x35c
__schedule+0x8e0/0xec4
schedule+0x54/0xf8
blk_mq_freeze_queue_wait+0x68/0xb0
blk_mq_freeze_queue_nomemsave+0x68/0x7c
elevator_change+0x70/0x14c
elv_iosched_store+0x1b0/0x234
queue_attr_store+0xe0/0x134
sysfs_kf_write+0x98/0xbc
kernfs_fop_write_iter+0x118/0x1e8
vfs_write+0x2e8/0x448
ksys_write+0x78/0xf0
__arm64_sys_write+0x1c/0x2c
Task 1865 (sp-control-1) - holds percpu_ref, preempted in dispatch_list:
Call trace:
__switch_to+0x1a4/0x35c
__schedule+0x8e0/0xec4
preempt_schedule_notrace+0x60/0x7c
blk_mq_dispatch_list+0x5c0/0x690
blk_mq_flush_plug_list+0x13c/0x170
__blk_flush_plug+0x11c/0x17c
schedule+0x40/0xf8
schedule_preempt_disabled+0x24/0x40
rwsem_down_write_slowpath+0x61c/0xc88
down_write+0x3c/0x158
f2fs_down_write_trace+0x30/0x84
f2fs_submit_page_write+0x78/0x7e0
do_write_page+0x180/0x2fc
f2fs_outplace_write_data+0x78/0x100
f2fs_do_write_data_page+0x3b8/0x500
f2fs_write_single_data_page+0x1ac/0x6e0
f2fs_write_data_pages+0x838/0xdfc
do_writepages+0xd0/0x19c
filemap_write_and_wait_range+0x204/0x274
f2fs_commit_atomic_write+0x54/0x960
__f2fs_ioctl+0x2128/0x42c8
f2fs_ioctl+0x38/0xb4
__arm64_sys_ioctl+0xa0/0xf4
Signed-off-by: Michael Wu <michael@allwinnertech.com>
---
block/blk-mq.c | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/block/blk-mq.c b/block/blk-mq.c
index 4c5c16cce4f8f..c290bb12c1ecb 100644
--- a/block/blk-mq.c
+++ b/block/blk-mq.c
@@ -2936,6 +2936,14 @@ static void blk_mq_dispatch_list(struct rq_list *rqs, bool from_sched)
*rqs = requeue_list;
trace_block_unplug(this_hctx->queue, depth, !from_sched);
+ /*
+ * When called from schedule(), prevent preemption and interrupts between
+ * ref_get and ref_put. This ensures percpu_ref_get() and percpu_ref_put()
+ * are atomic with respect to context switches, avoiding a deadlock with
+ * blk_mq_freeze_queue where a blocked task holds a percpu_ref reference.
+ */
+ if (from_sched)
+ local_irq_disable();
percpu_ref_get(&this_hctx->queue->q_usage_counter);
/* passthrough requests should never be issued to the I/O scheduler */
if (is_passthrough) {
@@ -2951,6 +2959,8 @@ static void blk_mq_dispatch_list(struct rq_list *rqs, bool from_sched)
blk_mq_insert_requests(this_hctx, this_ctx, &list, from_sched);
}
percpu_ref_put(&this_hctx->queue->q_usage_counter);
+ if (from_sched)
+ local_irq_enable();
}
static void blk_mq_dispatch_multiple_queue_requests(struct rq_list *rqs)
--
2.29.0
next reply other threads:[~2026-04-17 8:28 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-17 8:27 Michael Wu [this message]
2026-04-17 15:15 ` [PATCH] block: fix deadlock between blk_mq_freeze_queue and blk_mq_dispatch_list Ming Lei
2026-04-20 6:31 ` Michael Wu
2026-04-20 7:02 ` Ming Lei
2026-04-23 11:28 ` Michael Wu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260417082744.30124-1-michael@allwinnertech.com \
--to=michael@allwinnertech.com \
--cc=axboe@kernel.dk \
--cc=linux-block@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.