Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4481174ybx; Mon, 4 Nov 2019 14:08:49 -0800 (PST) X-Google-Smtp-Source: APXvYqx0mLCIYY/k4PGB2A3ciApe/uA/4WSyHW6Lz1UizQzTP9FkF3eR6IlfUkfvE2fB+xrEf1iM X-Received: by 2002:a50:a697:: with SMTP id e23mr18026399edc.264.1572905329868; Mon, 04 Nov 2019 14:08:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572905329; cv=none; d=google.com; s=arc-20160816; b=k23+y8ZHec8GFv8hCudBsmdReCQOF6xLpmHz2TDAybE4SRSWpaViVNlj2lhBsf5WMc q0diuRDJHZdUFjZ+bI6r8CaJvYuwhJdsF6Bcv/bMLXtCt3/NIoG6inrbmRxZPrukQa43 3LZmHVIqw3fWaYAxHLuNoRt0TOMnHyVVND5g/WAuHU1/YhV9nx8qqciMPlxGcT8swxEa mXxdfvYuTyzUkneFMSzSQvjcwsqgESxiWuoKIvaasuo7SNHT54MypAJmmJd4kE0rRrl0 inKwG3BvAXKscg/Pb9gO3f/ni1jtzIDF2yjSDozSPwLn6/qF3QymuGYR58mXUPJ/ybq9 6KUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fru8X0bCONlQpsQc2CUsGz8q6ULhuYfS3HxfUTGg7gg=; b=ZU0yq+d6i5UUxdIIApXyslSiLFkj+KJeLu6sC2YlN4RyVeriNI/GwP95f2d/dCYHu/ 0NOagvzKF2xNSKRwkz+uZVJN9ZoqLHXJBLYJz1aGKf8hhNIO0aH708iZHrQ0ybf3/Uxr anTx4iYAWU2PDy/aJ4XPIggrWPNgT0lKFIjCMteAIBGunJw4J9MuSIgFxArT2yH5D4GQ ODzXKHIPnBmKcOmupElSOY4DAl13uIcaacTHcCZLY34APLgx4JENXLh/eHwfnjEHSC+o c09GLtkiy5t6e4ibzi6fhh6yGWyC7iLM7yq1D0xPdSrKv+9J4M+wWAg/EXibrbNs0jeJ 16eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tYNd4knR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x37si9268334edd.228.2019.11.04.14.08.24; Mon, 04 Nov 2019 14:08:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tYNd4knR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390141AbfKDWHe (ORCPT + 99 others); Mon, 4 Nov 2019 17:07:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:40080 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389306AbfKDWHd (ORCPT ); Mon, 4 Nov 2019 17:07:33 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0270E2084D; Mon, 4 Nov 2019 22:07:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572905252; bh=vk8+b7SiuqvG0ZON2WuQ93hgwJbDz+Km6Ck2/nY0Gbk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tYNd4knRHVwZIaNWgxZSaTXcZ1vZL9XCOcT5zaRCGA08pYE4Km4cti5NB18sy9joX KKUZzg94TolUXGJHbjILkhBLRep0pFsr894IvkpSfdTOYc3bj59RgycEeAg/wjVzxL xwR0I0QI6uo0AMLsJkh6r2B8XEu2CVs7OzSPvVoc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Benjamin Coddington , Anna Schumaker , Sasha Levin Subject: [PATCH 5.3 080/163] SUNRPC: fix race to sk_err after xs_error_report Date: Mon, 4 Nov 2019 22:44:30 +0100 Message-Id: <20191104212146.103618988@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191104212140.046021995@linuxfoundation.org> References: <20191104212140.046021995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Benjamin Coddington [ Upstream commit af84537dbd1b39505d1f3d8023029b4a59666513 ] Since commit 4f8943f80883 ("SUNRPC: Replace direct task wakeups from softirq context") there has been a race to the value of the sk_err if both XPRT_SOCK_WAKE_ERROR and XPRT_SOCK_WAKE_DISCONNECT are set. In that case, we may end up losing the sk_err value that existed when xs_error_report was called. Fix this by reverting to the previous behavior: instead of using SO_ERROR to retrieve the value at a later time (which might also return sk_err_soft), copy the sk_err value onto struct sock_xprt, and use that value to wake pending tasks. Signed-off-by: Benjamin Coddington Fixes: 4f8943f80883 ("SUNRPC: Replace direct task wakeups from softirq context") Signed-off-by: Anna Schumaker Signed-off-by: Sasha Levin --- include/linux/sunrpc/xprtsock.h | 1 + net/sunrpc/xprtsock.c | 17 ++++++++--------- 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/include/linux/sunrpc/xprtsock.h b/include/linux/sunrpc/xprtsock.h index 7638dbe7bc500..a940de03808dd 100644 --- a/include/linux/sunrpc/xprtsock.h +++ b/include/linux/sunrpc/xprtsock.h @@ -61,6 +61,7 @@ struct sock_xprt { struct mutex recv_mutex; struct sockaddr_storage srcaddr; unsigned short srcport; + int xprt_err; /* * UDP socket buffer size parameters diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c index e2176c167a579..4e0b5bed6c737 100644 --- a/net/sunrpc/xprtsock.c +++ b/net/sunrpc/xprtsock.c @@ -1243,19 +1243,21 @@ static void xs_error_report(struct sock *sk) { struct sock_xprt *transport; struct rpc_xprt *xprt; - int err; read_lock_bh(&sk->sk_callback_lock); if (!(xprt = xprt_from_sock(sk))) goto out; transport = container_of(xprt, struct sock_xprt, xprt); - err = -sk->sk_err; - if (err == 0) + transport->xprt_err = -sk->sk_err; + if (transport->xprt_err == 0) goto out; dprintk("RPC: xs_error_report client %p, error=%d...\n", - xprt, -err); - trace_rpc_socket_error(xprt, sk->sk_socket, err); + xprt, -transport->xprt_err); + trace_rpc_socket_error(xprt, sk->sk_socket, transport->xprt_err); + + /* barrier ensures xprt_err is set before XPRT_SOCK_WAKE_ERROR */ + smp_mb__before_atomic(); xs_run_error_worker(transport, XPRT_SOCK_WAKE_ERROR); out: read_unlock_bh(&sk->sk_callback_lock); @@ -2470,7 +2472,6 @@ static void xs_wake_write(struct sock_xprt *transport) static void xs_wake_error(struct sock_xprt *transport) { int sockerr; - int sockerr_len = sizeof(sockerr); if (!test_bit(XPRT_SOCK_WAKE_ERROR, &transport->sock_state)) return; @@ -2479,9 +2480,7 @@ static void xs_wake_error(struct sock_xprt *transport) goto out; if (!test_and_clear_bit(XPRT_SOCK_WAKE_ERROR, &transport->sock_state)) goto out; - if (kernel_getsockopt(transport->sock, SOL_SOCKET, SO_ERROR, - (char *)&sockerr, &sockerr_len) != 0) - goto out; + sockerr = xchg(&transport->xprt_err, 0); if (sockerr < 0) xprt_wake_pending_tasks(&transport->xprt, sockerr); out: -- 2.20.1