Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp2012167imc; Fri, 22 Feb 2019 15:56:15 -0800 (PST) X-Google-Smtp-Source: AHgI3IZpyYIFau52nb8hc67t6xaFiUTYWYkuRI5kGnLgxSZYnFGKFa4DWjmCTJJYZUU2zegsO3Yk X-Received: by 2002:a63:2004:: with SMTP id g4mr6403898pgg.337.1550879775648; Fri, 22 Feb 2019 15:56:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550879775; cv=none; d=google.com; s=arc-20160816; b=xSHxiFlnQDKAV+9QUYgJIwyRakAEmwOAsUXa+ynlrhKb69ktHsPLQmVRyK4jl+Hc5N xZIe+x65I+zZdiJTsnLKBujLVgEVPUJN6GRmBsvoPHYGHg3O2Q7Gpq2RprOR3mg6snVm NGoKZKscNUTWEKBxKvSR5IVhXiBqiLbhpkgbiYc/+/jnD1pLlY0lQrlKW02MKzaxaiTH yYlHd4m13flXlhbhWT359REZSHh8qqFzOBjCdEraH/w8WMHw5TjIKalbv1+hSMwb1pKz jYHIe8UdM43B4RJTYk5t7eGqkewpsaXiaTYoqqCu6R3XDvCZEB8gDDXr8qqOAEXIyu7f EjVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=wK1u2r563LOigIVK07IWriBYPXjsqehaYcGZC9X/1us=; b=GbE1VatBCyJdsG00vnNClYlQARSYYYLfUiYk5hkKNH8zddQuN4XOHYSn7aulHtjrxJ A+LR9+vcaWHqHz7KRRzJvMihw0jccPR2UGsZi0tHBgKbwsJIZPVTJ68cYBTfNQMNYCCP kvo9fOQuZrgoIDTXWybLzrsXf/3/6c3rjEDGA5GK4wWlrepVztg3kDWPs06kzgPoZROY Ih0f+cyKAnJZVPPJtBpr+3U+XHrVtUVh2ykg9QEftzt+DG168vfyBgulN4zRPQT7o6CW KaaOT+wIemIRokUWdacnHL44WsPcqalZ7VK1SvY6nzsEaOXpYBD73KA2Wya9QDIk3nyH v67A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 61si2547138plz.177.2019.02.22.15.55.46; Fri, 22 Feb 2019 15:56:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727254AbfBVXzD (ORCPT + 99 others); Fri, 22 Feb 2019 18:55:03 -0500 Received: from mx1.redhat.com ([209.132.183.28]:51598 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725821AbfBVXzD (ORCPT ); Fri, 22 Feb 2019 18:55:03 -0500 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 155DD15D6; Fri, 22 Feb 2019 23:55:03 +0000 (UTC) Received: from localhost (unknown [10.18.25.174]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C2959600C5; Fri, 22 Feb 2019 23:55:00 +0000 (UTC) Date: Fri, 22 Feb 2019 18:55:00 -0500 From: Mike Snitzer To: Jens Axboe Cc: NeilBrown , linux-block@vger.kernel.org, device-mapper development , Milan Broz , Linux Kernel Mailing List Subject: Re: block: be more careful about status in __bio_chain_endio Message-ID: <20190222235459.GA11726@redhat.com> References: <70cda2a3-f246-d45b-f600-1f9d15ba22ff@gmail.com> <87eflmpqkb.fsf@notabene.neil.brown.name> <20190222211006.GA10987@redhat.com> <7f0aeb7b-fdaa-0625-f785-05c342047550@kernel.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7f0aeb7b-fdaa-0625-f785-05c342047550@kernel.dk> User-Agent: Mutt/1.5.21 (2010-09-15) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 22 Feb 2019 23:55:03 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 22 2019 at 5:46pm -0500, Jens Axboe wrote: > On 2/22/19 2:10 PM, Mike Snitzer wrote: > > On Thu, Feb 15 2018 at 4:09am -0500, > > NeilBrown wrote: > > > >> > >> If two bios are chained under the one parent (with bio_chain()) > >> it is possible that one will succeed and the other will fail. > >> __bio_chain_endio must ensure that the failure error status > >> is reported for the whole, rather than the success. > >> > >> It currently tries to be careful, but this test is racy. > >> If both children finish at the same time, they might both see that > >> parent->bi_status as zero, and so will assign their own status. > >> If the assignment to parent->bi_status by the successful bio happens > >> last, the error status will be lost which can lead to silent data > >> corruption. > >> > >> Instead, __bio_chain_endio should only assign a non-zero status > >> to parent->bi_status. There is then no need to test the current > >> value of parent->bi_status - a test that would be racy anyway. > >> > >> Note that this bug hasn't been seen in practice. It was only discovered > >> by examination after a similar bug was found in dm.c > >> > >> Signed-off-by: NeilBrown > >> --- > >> block/bio.c | 2 +- > >> 1 file changed, 1 insertion(+), 1 deletion(-) > >> > >> diff --git a/block/bio.c b/block/bio.c > >> index e1708db48258..ad77140edc6f 100644 > >> --- a/block/bio.c > >> +++ b/block/bio.c > >> @@ -312,7 +312,7 @@ static struct bio *__bio_chain_endio(struct bio *bio) > >> { > >> struct bio *parent = bio->bi_private; > >> > >> - if (!parent->bi_status) > >> + if (bio->bi_status) > >> parent->bi_status = bio->bi_status; > >> bio_put(bio); > >> return parent; > >> -- > >> 2.14.0.rc0.dirty > >> > > > > Reviewed-by: Mike Snitzer > > > > Jens, this one slipped through the crack just over a year ago. > > It is available in patchwork here: > > https://patchwork.kernel.org/patch/10220727/ > > Should this be: > > if (!parent->bi_status && bio->bi_status) > parent->bi_status = bio->bi_status; > > perhaps? Yeap, even better. Not seeing any reason to have the last error win, the first in the chain is likely the most important.