Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp405847pxu; Tue, 1 Dec 2020 14:27:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJzsRDGyqqo93R9/yuUwwLLXpfzjHYo83PCA13UigomlLpempcQpfmLCxGLD0gT3FooDLAus X-Received: by 2002:a17:906:d28f:: with SMTP id ay15mr5104110ejb.327.1606861623023; Tue, 01 Dec 2020 14:27:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606861623; cv=none; d=google.com; s=arc-20160816; b=L57eWbqG/4KScnQF84It+gWdBFMLVIxXwKx1FvwoJSZ81AirYqzehK/2iRnTMD+UAR b632L9ayIbZ7dllT8CS8tgf0HxRUBlgn2tD15dQPVv64ykPcHFXQDPLjMosqCzG2oRkb 6/9yOxLIOm/EukevCW2bi1DC0DWkcgevtqNPe4RjmfFYMQmGP2rSrGWTNfjTTnFJtjM6 5LQC/y0kaxuasH8r/CW1YF7esPkkNAzDUPNaEPKrSUOz5IRrhvG+0pwEhbySLdmORuQP vMQyqqxlzihFPyXJZjjowtnbP1OSQfU0m9c/kyxoeaHnO5Tojq+QGCj8fguSR8xRVUk3 clvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=J9lsA//TEaqFxMmVUekHdr4sO5ESrlxpPm1mC+1liiQ=; b=fvGSfyh/G/M8aOGwSvoWtQX/Pn0hbJKAzKku7TPRAAQLBIbW5jDI2Dx+wV2UkQJY6S SLryXJUqPxJjI8SIi3QscqQOfOf6Y3VLV5Y+thh/Dp4Msw6j3IuKiPRcvLF+QXD/CxC8 PXMO8T52AXaZPKZwnBv3qzCwIPR5tMSEjQYhZ4v9XH/bHgfiyfbhmz8oJ8OnZKUmtBm5 STKMVh4v1NZLpHY5ved5CrPRQUz5qgkuEl07H1+L9O/BaKvTXWCyhNe7tANeupIeN4vE UzubhWFol9oDaiP3TlQ58Xb/71ObJZsO7BEqmZL13ZCMJy97cVaq1p1RtPE3xMNXsX33 I5/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vrzK2tsj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo5si791314ejb.102.2020.12.01.14.26.40; Tue, 01 Dec 2020 14:27:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vrzK2tsj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389720AbgLAJKd (ORCPT + 99 others); Tue, 1 Dec 2020 04:10:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:48134 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389692AbgLAJK0 (ORCPT ); Tue, 1 Dec 2020 04:10:26 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 363A420809; Tue, 1 Dec 2020 09:09:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606813785; bh=HViE9c8brhrjU3l7RPPt1FUV46WqjkcfRXug6evrFyA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vrzK2tsjEMMqi3r8k+KQIaX5V33oryACBNahZwRCvcDZnXkRfCcjQ+6JiO0G6e+zG bMn5Nzh7Qjbsvnf/HxSpMyi43HhMe3PguhMUKFKLgyMb6OQ7tx67ozFjHUrpDYnfjL mMYF1AjPdjn+WeRr9SgnwbA2JMYxV1gI6Epoar9w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mike Christie , Maurizio Lombardi , "Michael S. Tsirkin" , Stefan Hajnoczi , Sasha Levin Subject: [PATCH 5.9 059/152] vhost scsi: fix cmd completion race Date: Tue, 1 Dec 2020 09:52:54 +0100 Message-Id: <20201201084719.660923627@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201201084711.707195422@linuxfoundation.org> References: <20201201084711.707195422@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mike Christie [ Upstream commit 47a3565e8bb14ec48a75b48daf57aa830e2691f8 ] We might not do the final se_cmd put from vhost_scsi_complete_cmd_work. When the last put happens a little later then we could race where vhost_scsi_complete_cmd_work does vhost_signal, the guest runs and sends more IO, and vhost_scsi_handle_vq runs but does not find any free cmds. This patch has us delay completing the cmd until the last lio core ref is dropped. We then know that once we signal to the guest that the cmd is completed that if it queues a new command it will find a free cmd. Signed-off-by: Mike Christie Reviewed-by: Maurizio Lombardi Link: https://lore.kernel.org/r/1604986403-4931-4-git-send-email-michael.christie@oracle.com Signed-off-by: Michael S. Tsirkin Acked-by: Stefan Hajnoczi Signed-off-by: Sasha Levin --- drivers/vhost/scsi.c | 42 +++++++++++++++--------------------------- 1 file changed, 15 insertions(+), 27 deletions(-) diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c index e31339be7dd78..5d8850f5aef16 100644 --- a/drivers/vhost/scsi.c +++ b/drivers/vhost/scsi.c @@ -322,7 +322,7 @@ static u32 vhost_scsi_tpg_get_inst_index(struct se_portal_group *se_tpg) return 1; } -static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) +static void vhost_scsi_release_cmd_res(struct se_cmd *se_cmd) { struct vhost_scsi_cmd *tv_cmd = container_of(se_cmd, struct vhost_scsi_cmd, tvc_se_cmd); @@ -344,6 +344,16 @@ static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) vhost_scsi_put_inflight(inflight); } +static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) +{ + struct vhost_scsi_cmd *cmd = container_of(se_cmd, + struct vhost_scsi_cmd, tvc_se_cmd); + struct vhost_scsi *vs = cmd->tvc_vhost; + + llist_add(&cmd->tvc_completion_list, &vs->vs_completion_list); + vhost_work_queue(&vs->dev, &vs->vs_completion_work); +} + static u32 vhost_scsi_sess_get_index(struct se_session *se_sess) { return 0; @@ -366,28 +376,15 @@ static int vhost_scsi_get_cmd_state(struct se_cmd *se_cmd) return 0; } -static void vhost_scsi_complete_cmd(struct vhost_scsi_cmd *cmd) -{ - struct vhost_scsi *vs = cmd->tvc_vhost; - - llist_add(&cmd->tvc_completion_list, &vs->vs_completion_list); - - vhost_work_queue(&vs->dev, &vs->vs_completion_work); -} - static int vhost_scsi_queue_data_in(struct se_cmd *se_cmd) { - struct vhost_scsi_cmd *cmd = container_of(se_cmd, - struct vhost_scsi_cmd, tvc_se_cmd); - vhost_scsi_complete_cmd(cmd); + transport_generic_free_cmd(se_cmd, 0); return 0; } static int vhost_scsi_queue_status(struct se_cmd *se_cmd) { - struct vhost_scsi_cmd *cmd = container_of(se_cmd, - struct vhost_scsi_cmd, tvc_se_cmd); - vhost_scsi_complete_cmd(cmd); + transport_generic_free_cmd(se_cmd, 0); return 0; } @@ -433,15 +430,6 @@ vhost_scsi_allocate_evt(struct vhost_scsi *vs, return evt; } -static void vhost_scsi_free_cmd(struct vhost_scsi_cmd *cmd) -{ - struct se_cmd *se_cmd = &cmd->tvc_se_cmd; - - /* TODO locking against target/backend threads? */ - transport_generic_free_cmd(se_cmd, 0); - -} - static int vhost_scsi_check_stop_free(struct se_cmd *se_cmd) { return target_put_sess_cmd(se_cmd); @@ -560,7 +548,7 @@ static void vhost_scsi_complete_cmd_work(struct vhost_work *work) } else pr_err("Faulted on virtio_scsi_cmd_resp\n"); - vhost_scsi_free_cmd(cmd); + vhost_scsi_release_cmd_res(se_cmd); } vq = -1; @@ -1091,7 +1079,7 @@ vhost_scsi_handle_vq(struct vhost_scsi *vs, struct vhost_virtqueue *vq) &prot_iter, exp_data_len, &data_iter))) { vq_err(vq, "Failed to map iov to sgl\n"); - vhost_scsi_release_cmd(&cmd->tvc_se_cmd); + vhost_scsi_release_cmd_res(&cmd->tvc_se_cmd); goto err; } } -- 2.27.0