From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8717222F77B; Mon, 2 Jun 2025 14:52:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748875973; cv=none; b=KWMUYLQWemwmGx1Fb9sAqqmQ1blAgpim2vH4IRBanB7As+R2qnS7E23EK6j9gp1X+pmzZgWm+M/JGwP1ECFE00rE63wr0jMQ6AekWc0zbEYmUHRZDIAl3Ow0hAZtgIIXfIU+Tp+eujPS7riHl4x3vqouV7vlTjx17cmQe75d2jw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748875973; c=relaxed/simple; bh=siEr7+QyDtuv3N7/Uu/uz8DGH8BCKKqK1WH1D6zHifs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=HncD/JmZcCYfHLzvQgfgysrNtGxiwZZhW8nXMhE2UNXzXtT3VJ4NCrMI9evF/CD5nGXeLUA3BXIlsZxjdriYwkZkw/g8tVmX/fufSoWZxuFAJJXNS26sNi+bYL7ZSG4ZAwot7BU1xv0+5KKF5eerjiuMVjxe6MXZ2Xb3s4S3TPk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=odMjrBy6; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="odMjrBy6" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B3DC6C4CEEE; Mon, 2 Jun 2025 14:52:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1748875973; bh=siEr7+QyDtuv3N7/Uu/uz8DGH8BCKKqK1WH1D6zHifs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=odMjrBy6PBjAfvh4DZ5/dDHWDxAcEURP8b81r+CqJQG+ErpLmiGSvTB6/9e9vgizo AeLcdFUMqsRF6CuIbl2V6MualoqzksDgbbz9wTjMX1E+8yZOBr9DfaUmLLGW24KS65 4A+cYl7vRRc3wGF6NB8U4qVktWovgeidBddJ3bmk= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Johannes Thumshirn , Filipe Manana , David Sterba , Sasha Levin Subject: [PATCH 5.15 032/207] btrfs: get zone unusable bytes while holding lock at btrfs_reclaim_bgs_work() Date: Mon, 2 Jun 2025 15:46:44 +0200 Message-ID: <20250602134300.022937748@linuxfoundation.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250602134258.769974467@linuxfoundation.org> References: <20250602134258.769974467@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 5.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Filipe Manana [ Upstream commit 1283b8c125a83bf7a7dbe90c33d3472b6d7bf612 ] At btrfs_reclaim_bgs_work(), we are grabbing a block group's zone unusable bytes while not under the protection of the block group's spinlock, so this can trigger race reports from KCSAN (or similar tools) since that field is typically updated while holding the lock, such as at __btrfs_add_free_space_zoned() for example. Fix this by grabbing the zone unusable bytes while we are still in the critical section holding the block group's spinlock, which is right above where we are currently grabbing it. Reviewed-by: Johannes Thumshirn Signed-off-by: Filipe Manana Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/block-group.c | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/fs/btrfs/block-group.c b/fs/btrfs/block-group.c index 2c5bd2ad69f35..614917cac0e7e 100644 --- a/fs/btrfs/block-group.c +++ b/fs/btrfs/block-group.c @@ -1543,6 +1543,17 @@ void btrfs_reclaim_bgs_work(struct work_struct *work) up_write(&space_info->groups_sem); goto next; } + + /* + * Cache the zone_unusable value before turning the block group + * to read only. As soon as the block group is read only it's + * zone_unusable value gets moved to the block group's read-only + * bytes and isn't available for calculations anymore. We also + * cache it before unlocking the block group, to prevent races + * (reports from KCSAN and such tools) with tasks updating it. + */ + zone_unusable = bg->zone_unusable; + spin_unlock(&bg->lock); /* @@ -1558,13 +1569,6 @@ void btrfs_reclaim_bgs_work(struct work_struct *work) goto next; } - /* - * Cache the zone_unusable value before turning the block group - * to read only. As soon as the blog group is read only it's - * zone_unusable value gets moved to the block group's read-only - * bytes and isn't available for calculations anymore. - */ - zone_unusable = bg->zone_unusable; ret = inc_block_group_ro(bg, 0); up_write(&space_info->groups_sem); if (ret < 0) -- 2.39.5