Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2912636ybx; Fri, 8 Nov 2019 11:10:48 -0800 (PST) X-Google-Smtp-Source: APXvYqx38Y4EsGKqqAmsSUVWTgsxKGGMcUAvBmh8XAY9pZjTBwGDDF+WRrIRNLuuYjG78jt9wHEb X-Received: by 2002:a05:6402:883:: with SMTP id e3mr12169164edy.32.1573240248481; Fri, 08 Nov 2019 11:10:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240248; cv=none; d=google.com; s=arc-20160816; b=SfUwc5Wcfk8BC/ZSmhyPDXZdfLGuzIwMAVA07E6+nRlJQIr5jaj8653zD7qpH82QFD fjMe/UabG5vRX5kDspB+6kXxROTfw6H5Pt6w4YRISYUUtlCqoVyy+G9v/zfUdKMHPyLm gNegsMzpSmddFenAscj/Ds4ecyLXWJ0JcyRjZ5EPCmys3r+hf/dkQENzpUGTexOD2v3x PcMNJ19AHc8P8e9JhORh8ploJZrxLR9eWp5rrLNv9mX9f93MDC169vQA20/CoweTWpVX M8WNpM1tOVZXUJJ34QEnclrUDJbPSngAJFA2O1iRgpeqkhnH8wB4yZzNfsCqGfC7/w4a DHug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=lQDvJp5GVHKu4EZNIq96JF/1KkbOCEUltG5FkqaIELk=; b=FCXrT4hGLGdoLhxTd09VUiGzAX8/h4Qymk7yjZfpRlLIDfBN8BG+Z88BqMeguoQ6gm 1+S4rX8qCJ7Uop0u96x67xXvfQ0xGSiEyLVRJjDK2W03Tf/1P/F7ImnZWYK9v/7Y3px3 LT0mF+uUF5XqQVWgZbUcp3C4ZZ/V8UObZAFmaSSGf8EarWWGS3bUI1Qnk8R15Rxewr2M xfH2rippSO2jDbQ0RaeRWYYSV6BowkJ82QA6Let227ZFEf4nqc5O8Ryw5ZOCTNGaF2pb cQSD4jyvIYXZtLOoccqfVtSCX1tuyU0B9CdrzeP/85+FURECAXpr5STkTUxdowi2Vavr D4Eg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=elMmlWr6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d28si4870149edb.10.2019.11.08.11.10.23; Fri, 08 Nov 2019 11:10:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=elMmlWr6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391795AbfKHTJz (ORCPT + 99 others); Fri, 8 Nov 2019 14:09:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:41740 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732947AbfKHTJt (ORCPT ); Fri, 8 Nov 2019 14:09:49 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 847BE206A3; Fri, 8 Nov 2019 19:09:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573240189; bh=9r8zL6sSvPcpJIggKFfnzpnK5oCqK/XRjrW9dKyEW+Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=elMmlWr65SKOQ9Rnwk2KXikOK237PMKpDhC6uOpkL+P+cV+fU2zC5aDeINtWsEyQA EKl1Xn0tcKT857HHO3GuAEE+GNgiRHhfdCoUq5MNKF2Vq2i+1mUSMMa7ZFjTAMDZFO RmQb0oby7J+j2gyibxcx5hkw7+Mp8TJrJkFAPRxk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mike Christie , Josef Bacik , Jens Axboe , Sasha Levin Subject: [PATCH 5.3 077/140] nbd: protect cmd->status with cmd->lock Date: Fri, 8 Nov 2019 19:50:05 +0100 Message-Id: <20191108174909.960322693@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174900.189064908@linuxfoundation.org> References: <20191108174900.189064908@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit de6346ecbc8f5591ebd6c44ac164e8b8671d71d7 ] We already do this for the most part, except in timeout and clear_req. For the timeout case we take the lock after we grab a ref on the config, but that isn't really necessary because we're safe to touch the cmd at this point, so just move the order around. For the clear_req cause this is initiated by the user, so again is safe. Reviewed-by: Mike Christie Signed-off-by: Josef Bacik Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/block/nbd.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/drivers/block/nbd.c b/drivers/block/nbd.c index 9650777d0aaf1..7301fe55084bf 100644 --- a/drivers/block/nbd.c +++ b/drivers/block/nbd.c @@ -351,17 +351,16 @@ static enum blk_eh_timer_return nbd_xmit_timeout(struct request *req, struct nbd_device *nbd = cmd->nbd; struct nbd_config *config; + if (!mutex_trylock(&cmd->lock)) + return BLK_EH_RESET_TIMER; + if (!refcount_inc_not_zero(&nbd->config_refs)) { cmd->status = BLK_STS_TIMEOUT; + mutex_unlock(&cmd->lock); goto done; } config = nbd->config; - if (!mutex_trylock(&cmd->lock)) { - nbd_config_put(nbd); - return BLK_EH_RESET_TIMER; - } - if (config->num_connections > 1) { dev_err_ratelimited(nbd_to_dev(nbd), "Connection timed out, retrying (%d/%d alive)\n", @@ -755,7 +754,10 @@ static bool nbd_clear_req(struct request *req, void *data, bool reserved) { struct nbd_cmd *cmd = blk_mq_rq_to_pdu(req); + mutex_lock(&cmd->lock); cmd->status = BLK_STS_IOERR; + mutex_unlock(&cmd->lock); + blk_mq_complete_request(req); return true; } -- 2.20.1