Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp436464imu; Wed, 12 Dec 2018 20:52:14 -0800 (PST) X-Google-Smtp-Source: AFSGD/VNFGWj2OIJQf/QUFGb17HmXcCG0hXcnHUFDK2TV9U/IS5ABnLMTTzKf/mGRepuDzpJhgvM X-Received: by 2002:a17:902:7c82:: with SMTP id y2mr22053128pll.33.1544676733997; Wed, 12 Dec 2018 20:52:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544676733; cv=none; d=google.com; s=arc-20160816; b=B82z9AaLWIX92QKlf5e62XyGmXACLfefAFyU5NxvDfuw/4Je5C41b3CuFj7uLLcrx7 pGbI0+RvhIzQ12Vm9jCUskdEJZ6txUD3rXoibYfIrBEsKL6NnLBfsszv/X9YjYYcq4oo ccouaFvUhF3svcLFcWRvLBWZnFA1KkHoKHr95wpY1SxfzjV+huHk0xWrUbEVKySyE5F0 /OsTtl9QGmGjMYs3UrETuR37KxE8pmlUxSb+LygPpqkBSw2XPWYpnWLMqJ2QGBYePb7O 4nO6oKMZmkUzYiQRoav846j2xQGMJuRus+oIjbQGF5PMyZOCUT6pKTGwjcvYYYrOn9P+ YjVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=p5A20Fyv69lWctW/TVHJkIzGeDCG2drF3uCOYtAlIHc=; b=aH9Ko5HboJ7xwtSyvwzFsA1j+JxB/nLuPhG1EpQZXMhPkgd6u1+xdsStpciotZtFeb pljJm9Wwz0s4+yC3OwIdIkH0SRYmJ6YJ88qtqZdZVI/foiWhf7F+KoZ3XPw1X/wP1H8v WWsFdvaORINJcgIuIOBKN0t0UnVA3E0ylRZr/f/CEJ2WUt37Et3Kt8anbkPqutU7jMP5 LArHwr1c9hpvFWI7Y/BrLYhAw0BrHWuakOVKkILArX/mV2tv0/5t66aoMW65d8b4d6dZ PZW7txhb4UYTeIlgS6GPcFEN7efljFAM/C29QHOakADWEaVwm29DDlzHa4Vzu1C9YLfS gO1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2btjotIt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id be11si661052plb.134.2018.12.12.20.51.59; Wed, 12 Dec 2018 20:52:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2btjotIt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728767AbeLMEuY (ORCPT + 99 others); Wed, 12 Dec 2018 23:50:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:42410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727426AbeLME3X (ORCPT ); Wed, 12 Dec 2018 23:29:23 -0500 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 75CC920882; Thu, 13 Dec 2018 04:29:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544675362; bh=JwY5q9Wh3lcDg+zkBdLLX94yQlZG9cGGsvt695CwlGs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2btjotItXJC5nWOjHEti74CEv40ZbwdAPYILKa6fuKacTob1xyf6hiYA2WVIgON5i j49yiKukL9K4ZHY7u016t6CQf6Y+MJpGqy/UrL5VzxIF4174DWFU9KMOdHKJg8lTGO zzayBPKIjsEOxBDnJ7xeUyPsbH/qss0pRCOIjWEk= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Trond Myklebust , Sasha Levin , linux-nfs@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH AUTOSEL 4.19 27/73] SUNRPC: Fix a potential race in xprt_connect() Date: Wed, 12 Dec 2018 23:27:52 -0500 Message-Id: <20181213042838.75160-27-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181213042838.75160-1-sashal@kernel.org> References: <20181213042838.75160-1-sashal@kernel.org> MIME-Version: 1.0 X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Trond Myklebust [ Upstream commit 0a9a4304f3614e25d9de9b63502ca633c01c0d70 ] If an asynchronous connection attempt completes while another task is in xprt_connect(), then the call to rpc_sleep_on() could end up racing with the call to xprt_wake_pending_tasks(). So add a second test of the connection state after we've put the task to sleep and set the XPRT_CONNECTING flag, when we know that there can be no asynchronous connection attempts still in progress. Fixes: 0b9e79431377d ("SUNRPC: Move the test for XPRT_CONNECTING into...") Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin --- net/sunrpc/xprt.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/net/sunrpc/xprt.c b/net/sunrpc/xprt.c index a8db2e3f8904..d066aae3cb6d 100644 --- a/net/sunrpc/xprt.c +++ b/net/sunrpc/xprt.c @@ -781,8 +781,15 @@ void xprt_connect(struct rpc_task *task) return; if (xprt_test_and_set_connecting(xprt)) return; - xprt->stat.connect_start = jiffies; - xprt->ops->connect(xprt, task); + /* Race breaker */ + if (!xprt_connected(xprt)) { + xprt->stat.connect_start = jiffies; + xprt->ops->connect(xprt, task); + } else { + xprt_clear_connecting(xprt); + task->tk_status = 0; + rpc_wake_up_queued_task(&xprt->pending, task); + } } xprt_release_write(xprt, task); } -- 2.19.1