Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp714314imj; Wed, 13 Feb 2019 16:20:50 -0800 (PST) X-Google-Smtp-Source: AHgI3IbyiBCy/CuEqSO8F2P/VJkz1lNAlDj+3GCkJHODRO8Qy04BQvcJAOyhyvKGdlg4SrxPzH4T X-Received: by 2002:a65:6684:: with SMTP id b4mr902353pgw.55.1550103650321; Wed, 13 Feb 2019 16:20:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550103650; cv=none; d=google.com; s=arc-20160816; b=VxThEqB15Qgn0u7JdSTI6CP7Av+xfkI24gMCfqiFabHWy5fP48BbjkDGD3o99m7sks T0Lyi5hb76Ev9eU8g+NWuTIVZyBBRdMUlg6q7JMrFuuctGLfZVVnJ78mqZOZgNkZQlHq R2Ls+exrG9DJqd8XnkSyXrY5+gIXbAH8MSecsTatWqFt6Wve0v/UoEa4oKQJ265pgsxv fACJb0zNBTLihPR3EAlYX8adJaJ7vN5EFaIo7hdJ/TIJSbHG1aTFPMAQYfrwTaO4tXUX pyFo0SXXEYIHAygjYfnCTx6OOthhQRPoaYo190osiH9yvLOfvgu9cg1l+0I1THTRLOkf lpDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+LDWr0v+8jp4RAuTxR7+AIIuyhblyhqXQ+KGwJLYwZE=; b=0+Vxg/g9YHUnw6KkVopSs7Vttll/I6Sayqu7tdhpd/wN5vLcQE8XQl1IqKxrjZsg8S sYYIIDlcJ6tk8XFH3Jqjzj289rK0FARjT89FdbucNy29qHe7qaWqVS1msSw7NIM1Nt4Y 5rUuVqS8T42/tmED3jTkY529y8h1C8mfZyFEpdB/NT1eAL5UMg2YyjvS20SRc1tKwHAH VJsh9xE7cPPmmMJBIQ3j1ohnRMjYw4Y8fOSM36an48ZjE0QJJWaOAjNxqTOpJS/0rAiE QVJrPa4gMDwO/X0H3jPJxcrx69y/C+g2iPBNQ7Z+JvuK9e3okFzI4GNmbRiFrpbcbo+0 vLCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hbs2K7W+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f128si816853pfb.30.2019.02.13.16.20.34; Wed, 13 Feb 2019 16:20:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hbs2K7W+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726030AbfBMSqw (ORCPT + 99 others); Wed, 13 Feb 2019 13:46:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:45326 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2406508AbfBMSqq (ORCPT ); Wed, 13 Feb 2019 13:46:46 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A8DB20811; Wed, 13 Feb 2019 18:46:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550083605; bh=3q93zkdMWFHjvzgRIhRz2ulE7/6uiGcMs/3cPd+7j+c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hbs2K7W+Vr57PVo/s44dGyO8V8s1yFy8oNyNAKiYf25lCxA7TTtEslxuvXKIPyl0w m9I+nqn6/mJ8HsHDZDuz1N0ntyxzgsuGCZw9U9vAdFM+te8Jyid1Ht1kcKkRcdllym o5I0F2Al7DtWNNw65vb46NKWAbuUx0JBfE/eHGqg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+acdeb633f6211ccdf886@syzkaller.appspotmail.com, Ilya Dryomov , Myungho Jung Subject: [PATCH 4.20 47/50] libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() Date: Wed, 13 Feb 2019 19:38:52 +0100 Message-Id: <20190213183659.389268899@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190213183655.747168774@linuxfoundation.org> References: <20190213183655.747168774@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ilya Dryomov commit 4aac9228d16458cedcfd90c7fb37211cf3653ac3 upstream. con_fault() can transition the connection into STANDBY right after ceph_con_keepalive() clears STANDBY in clear_standby(): libceph user thread ceph-msgr worker ceph_con_keepalive() mutex_lock(&con->mutex) clear_standby(con) mutex_unlock(&con->mutex) mutex_lock(&con->mutex) con_fault() ... if KEEPALIVE_PENDING isn't set set state to STANDBY ... mutex_unlock(&con->mutex) set KEEPALIVE_PENDING set WRITE_PENDING This triggers warnings in clear_standby() when either ceph_con_send() or ceph_con_keepalive() get to clearing STANDBY next time. I don't see a reason to condition queue_con() call on the previous value of KEEPALIVE_PENDING, so move the setting of KEEPALIVE_PENDING into the critical section -- unlike WRITE_PENDING, KEEPALIVE_PENDING could have been a non-atomic flag. Reported-by: syzbot+acdeb633f6211ccdf886@syzkaller.appspotmail.com Signed-off-by: Ilya Dryomov Tested-by: Myungho Jung Signed-off-by: Greg Kroah-Hartman --- net/ceph/messenger.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/net/ceph/messenger.c +++ b/net/ceph/messenger.c @@ -3219,9 +3219,10 @@ void ceph_con_keepalive(struct ceph_conn dout("con_keepalive %p\n", con); mutex_lock(&con->mutex); clear_standby(con); + con_flag_set(con, CON_FLAG_KEEPALIVE_PENDING); mutex_unlock(&con->mutex); - if (con_flag_test_and_set(con, CON_FLAG_KEEPALIVE_PENDING) == 0 && - con_flag_test_and_set(con, CON_FLAG_WRITE_PENDING) == 0) + + if (con_flag_test_and_set(con, CON_FLAG_WRITE_PENDING) == 0) queue_con(con); } EXPORT_SYMBOL(ceph_con_keepalive);