Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3696934pxv; Mon, 26 Jul 2021 09:37:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCGd0KIyWgI9wxYtzuXxyNu38SOKvcb8vRCUYRiIrKrvZ5N3OTJlKm7Ajefjsg493naaEd X-Received: by 2002:a6b:f704:: with SMTP id k4mr15670902iog.191.1627317463104; Mon, 26 Jul 2021 09:37:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627317463; cv=none; d=google.com; s=arc-20160816; b=0QmrKXUOvv5dFdIYrA57K1ohpgFTUgcImIzPCYb6zvt4q7utE0mXk46qZ5akAyfpM9 Ug5duh2EJmLVC+IrW/73013Du+wRdwGCbayfN+PsQy6sk5aQZqb4baZS3V4EJZ0j6Tmv PVQVusQX+G2uxpisBQT1gAqTuFY31zAjdjcdlULdLmvYdpyzVx+N5ol4hmXklEZTw8gi +JE0GA7GOSlNj40jMIv4xbI9RPcZdQhw+x2aGXHpALEFONOMX4PBJn46Y3uIbCj2cQa7 8eaXICwccADB5ixiHnlbV/pTw9z2dDC5pmI/r0jOWecEXMUFuIq6AwpG6d1WoUVKTgco 5Snw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=H3KzK2OjPwMmx9GN63ziS4o5kWmNPtgoTpndtlXiqA4=; b=buYQKIaDUt5GlCUr7Egzba5HmT/+XgySpZHhvp5WNMlMKGi+98Ur6eUKpAc0xpkuJ7 hzlDoQJ6/Diiob1xrPt/Cz76GIPIz1kVlrElzedfXgeVsCrYbM1S2y64HZUVuts2Tjb3 OtxP+hv/Jlnk9xWXTy6XG+rCInVudP0ACr9+08QAlGSKGB3GwlnRLO05ktyuHIgNzUrH Y7VTtHBwbRUq2QtN9n6Kq+++3uiKVtBg5HztKJyLx369VyelGkN4Jfy2ovIT4RYMc75Q YAgc0y6P2BTbOAxH629pX8TtoRAoWL7emK15I756qjkCxXtYKruZpiyyoxiiEnyrKals Pv5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sXqmvq6s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s22si470531iow.33.2021.07.26.09.37.31; Mon, 26 Jul 2021 09:37:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sXqmvq6s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240624AbhGZPzt (ORCPT + 99 others); Mon, 26 Jul 2021 11:55:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:52660 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233829AbhGZPfO (ORCPT ); Mon, 26 Jul 2021 11:35:14 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8800360FDA; Mon, 26 Jul 2021 16:15:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627316141; bh=MEJHq/SKopmXcuLagfFWfaOFyUiAuIfkbUbDQ1LTcz8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sXqmvq6s930t/tdSMBaZNQBIStYUlPo6yLttyKVvPud/FVdZDa1eQmW8Wh5Q3JSlJ Y1SSwkzIPfbIoqdQtYYetGltJpZXULaz9IC3cZRjI4udZCcIiUNMYDkPWaShfhnjLS x5qTtjDh3PCF3u07S1K3SGxfNU1aoVkM5PYOpTCI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ilya Dryomov , Robin Geuze Subject: [PATCH 5.13 204/223] rbd: always kick acquire on "acquired" and "released" notifications Date: Mon, 26 Jul 2021 17:39:56 +0200 Message-Id: <20210726153852.865597181@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210726153846.245305071@linuxfoundation.org> References: <20210726153846.245305071@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ilya Dryomov commit 8798d070d416d18a75770fc19787e96705073f43 upstream. Skipping the "lock has been released" notification if the lock owner is not what we expect based on owner_cid can lead to I/O hangs. One example is our own notifications: because owner_cid is cleared in rbd_unlock(), when we get our own notification it is processed as unexpected/duplicate and maybe_kick_acquire() isn't called. If a peer that requested the lock then doesn't go through with acquiring it, I/O requests that came in while the lock was being quiesced would be stalled until another I/O request is submitted and kicks acquire from rbd_img_exclusive_lock(). This makes the comment in rbd_release_lock() actually true: prior to this change the canceled work was being requeued in response to the "lock has been acquired" notification from rbd_handle_acquired_lock(). Cc: stable@vger.kernel.org # 5.3+ Signed-off-by: Ilya Dryomov Tested-by: Robin Geuze Signed-off-by: Greg Kroah-Hartman --- drivers/block/rbd.c | 20 +++++++------------- 1 file changed, 7 insertions(+), 13 deletions(-) --- a/drivers/block/rbd.c +++ b/drivers/block/rbd.c @@ -4201,15 +4201,11 @@ static void rbd_handle_acquired_lock(str if (!rbd_cid_equal(&cid, &rbd_empty_cid)) { down_write(&rbd_dev->lock_rwsem); if (rbd_cid_equal(&cid, &rbd_dev->owner_cid)) { - /* - * we already know that the remote client is - * the owner - */ - up_write(&rbd_dev->lock_rwsem); - return; + dout("%s rbd_dev %p cid %llu-%llu == owner_cid\n", + __func__, rbd_dev, cid.gid, cid.handle); + } else { + rbd_set_owner_cid(rbd_dev, &cid); } - - rbd_set_owner_cid(rbd_dev, &cid); downgrade_write(&rbd_dev->lock_rwsem); } else { down_read(&rbd_dev->lock_rwsem); @@ -4234,14 +4230,12 @@ static void rbd_handle_released_lock(str if (!rbd_cid_equal(&cid, &rbd_empty_cid)) { down_write(&rbd_dev->lock_rwsem); if (!rbd_cid_equal(&cid, &rbd_dev->owner_cid)) { - dout("%s rbd_dev %p unexpected owner, cid %llu-%llu != owner_cid %llu-%llu\n", + dout("%s rbd_dev %p cid %llu-%llu != owner_cid %llu-%llu\n", __func__, rbd_dev, cid.gid, cid.handle, rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle); - up_write(&rbd_dev->lock_rwsem); - return; + } else { + rbd_set_owner_cid(rbd_dev, &rbd_empty_cid); } - - rbd_set_owner_cid(rbd_dev, &rbd_empty_cid); downgrade_write(&rbd_dev->lock_rwsem); } else { down_read(&rbd_dev->lock_rwsem);