Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp690741imj; Wed, 13 Feb 2019 15:49:52 -0800 (PST) X-Google-Smtp-Source: AHgI3IZeNlbJ+OeT6eDyONKscQM+PV/6hwAWbFkEDspmtnSdYqlHGmF9TaFP/cU9oXxnKFClQlUf X-Received: by 2002:a17:902:ba8e:: with SMTP id k14mr832745pls.219.1550101791942; Wed, 13 Feb 2019 15:49:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550101791; cv=none; d=google.com; s=arc-20160816; b=Dkh70BnGu5BCkZ/wSLipTG8HT4DvBuq3MomUFbxv+5h98KdjjaktZ2neLarAeAorYT Ua1o7xOPF1agXaPc6aWwgYhcp7n9GbHRVodUqs7lLantyYhzaS6dWrF6nPC7cIlr7XKY Rh0w8PsyrtArL0NbkG1i1iTNImELu1T7FW2eQPLklCxH9Z6hhe9IQooFkxkR4uP+s0DH zlkrUHHj87t9ueAC0jHds3WEQz3x51y1tV+1auRhZ+hheUxnOL1NNK4KNSv0tVzJDXb4 pi+WjDOLWUS//bLpn0vUOCoEDNAAuUXr/9LwxGce8j/uE/o3o48dWDHVwhupXzgWW6ZK SnXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rE28SN5oAeqqX7dt3rqVoLdjlvWOSoS9mip1JVsGDSU=; b=cVc/5w07S7CmjYlNUheAL+Of+QEz1Tl2Zjhndv9A/gN1GQm/hBv1/PMF5VQZgIxWz3 qBpk6rI1h8Dt9bA4IGTuosc8E/jBnr6YvqlEaOAGlTwQ7Snzaizxw8aL5GgSkrbCfQ8b FYyQt1LEs0cjzC8rm5OW8DmVdQTVlweSX0C9gjsAOO6ADm17vwi2KHCvNeG6NoC0xu9l 51LgiN3W/oZHcjFAjatPc//v6ixYbBXunijdLuAhAQGv++WHdyev3WKf84XVYUP9gJL6 ZbVBac7zw4CiAWB1i8UHGwZl+M9eVucHhKShWZUwkgYyxGtEdlfJYKMezyugI82Sky5Q xxqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lO++kFMh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r5si634206pgr.482.2019.02.13.15.49.36; Wed, 13 Feb 2019 15:49:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lO++kFMh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393834AbfBMSlZ (ORCPT + 99 others); Wed, 13 Feb 2019 13:41:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:39720 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730678AbfBMSlX (ORCPT ); Wed, 13 Feb 2019 13:41:23 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 04AF2222D5; Wed, 13 Feb 2019 18:41:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550083282; bh=qPxhzocgGE4rYqbE5S8Yr5qGjhURbsTSEnWbioPWrwA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lO++kFMhplmd/H05exmm187CN0KgmbEKAjClNjTkau8UQ0gWcEyNYy5gGtLO4Tpjs ZBV/zW2agVyd3dxGSu0tP12dsCEp1OiDvIlPem0dUOe3iKvwxE/eUZGxksxq6n7lbB 2DnuU2a9NKHVA0arGY55IJ7yow9dxGCLzSOqhipw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+acdeb633f6211ccdf886@syzkaller.appspotmail.com, Ilya Dryomov , Myungho Jung Subject: [PATCH 4.14 21/35] libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() Date: Wed, 13 Feb 2019 19:38:16 +0100 Message-Id: <20190213183707.102744334@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190213183706.176685027@linuxfoundation.org> References: <20190213183706.176685027@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ilya Dryomov commit 4aac9228d16458cedcfd90c7fb37211cf3653ac3 upstream. con_fault() can transition the connection into STANDBY right after ceph_con_keepalive() clears STANDBY in clear_standby(): libceph user thread ceph-msgr worker ceph_con_keepalive() mutex_lock(&con->mutex) clear_standby(con) mutex_unlock(&con->mutex) mutex_lock(&con->mutex) con_fault() ... if KEEPALIVE_PENDING isn't set set state to STANDBY ... mutex_unlock(&con->mutex) set KEEPALIVE_PENDING set WRITE_PENDING This triggers warnings in clear_standby() when either ceph_con_send() or ceph_con_keepalive() get to clearing STANDBY next time. I don't see a reason to condition queue_con() call on the previous value of KEEPALIVE_PENDING, so move the setting of KEEPALIVE_PENDING into the critical section -- unlike WRITE_PENDING, KEEPALIVE_PENDING could have been a non-atomic flag. Reported-by: syzbot+acdeb633f6211ccdf886@syzkaller.appspotmail.com Signed-off-by: Ilya Dryomov Tested-by: Myungho Jung Signed-off-by: Greg Kroah-Hartman --- net/ceph/messenger.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/net/ceph/messenger.c +++ b/net/ceph/messenger.c @@ -3210,9 +3210,10 @@ void ceph_con_keepalive(struct ceph_conn dout("con_keepalive %p\n", con); mutex_lock(&con->mutex); clear_standby(con); + con_flag_set(con, CON_FLAG_KEEPALIVE_PENDING); mutex_unlock(&con->mutex); - if (con_flag_test_and_set(con, CON_FLAG_KEEPALIVE_PENDING) == 0 && - con_flag_test_and_set(con, CON_FLAG_WRITE_PENDING) == 0) + + if (con_flag_test_and_set(con, CON_FLAG_WRITE_PENDING) == 0) queue_con(con); } EXPORT_SYMBOL(ceph_con_keepalive);