Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6767508rwn; Tue, 13 Sep 2022 08:45:48 -0700 (PDT) X-Google-Smtp-Source: AA6agR54H0/hMENkJBk180U8nD2BE91038N1+wX0a9tFJOqAhESaW8qcmo5vLnWlFjfoXkMxqJyq X-Received: by 2002:a17:907:96a1:b0:773:c47a:ae35 with SMTP id hd33-20020a17090796a100b00773c47aae35mr19178281ejc.368.1663083948168; Tue, 13 Sep 2022 08:45:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663083948; cv=none; d=google.com; s=arc-20160816; b=Hp+DDz/91UUMFbK+zxu017Zrksf1vqKsk0BMJrSJO9UdDILwOTJvYrcx2kKxMGNcpp 96F6Xr6aid7XQHnrggBuw6JUy3RtFkfKS0xdtL4wZOXc4qOP2xSpbJ62C8+GEgjBpr+r ZZZqRq7k7vprhIJUdSwNHW5ksaas8AhiOaxludebkLs8LcCRDjoHp0hT/M9PrjXiJUQ3 lt1WCXlZxixXKNA5ArRlPb/yqhD07jcS+EZ1MelNtGjpVAdo+hJD8wglMn2sIT8nJZeF Gk9UXxiuPWM+oy+1YGMH+WF5JxtYlFwy5EpKoHTJviIrTKWvYBEVuHCyu8iuitFqcy2r k20g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pxd6DFQFVGMXQiy0smlaruGGGMT9ttjsJA/uJsmG/Fk=; b=nnuErwCp5AztIicbtp96+IQR1Duzk2++ir5/1M6IkWjGvC1M4lZA8/2Z8EHBfaNOZI jNYUfhWfFJcnUtq5PL2DnZ0PF1I88xJASWY0Zy2ELIIDeBL9afWAYnMymX9AwJzCN7gC TbRzXkKRfE6sbFG9ODAd3IoX83Zpog4oSc3Ub+nt9zYN1N6iexNJJgXdgm6a3IlN8+OG eXia1NSnVmejGfpXPyBmb4cSD/SdFaVOHQA7K0B2xayIYDmY+txshyU00whxGBS7cefY FAtw6967HLj2SBoku+7dE7s696OXQikz9EeLhalTtTZsN9VUGLp6KO03yKs34QLV3IZU uNQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=M5PYit+6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wz1-20020a170906fe4100b0077f6158823fsi3522504ejb.533.2022.09.13.08.45.11; Tue, 13 Sep 2022 08:45:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=M5PYit+6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235744AbiIMPQy (ORCPT + 99 others); Tue, 13 Sep 2022 11:16:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51832 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235892AbiIMPOG (ORCPT ); Tue, 13 Sep 2022 11:14:06 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 034B45C9D8; Tue, 13 Sep 2022 07:33:40 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1E8C7614F6; Tue, 13 Sep 2022 14:33:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 34043C433C1; Tue, 13 Sep 2022 14:33:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663079595; bh=VNkiXlupSnUv/zFQJS9XA2oRdoEVAlkzh7X/DSkhBZU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=M5PYit+6t/80U6/FCiVgULOJ5nMvT7QssOxikvoBA3qcfJj3jCmJ8Sa9h9L8ZNpm5 UwA65welr4zU1jOQ/lSIbVide8WMHjPQf/GS3mxPJqj4tCdljGcoFV5ZP1vniA3cTF fnwnWrDjEka2l4Tvb6mHczYLlgx628Q6qdCvB/r8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, NeilBrown , Eugeniu Rosca Subject: [PATCH 4.19 79/79] SUNRPC: use _bh spinlocking on ->transport_lock Date: Tue, 13 Sep 2022 16:07:37 +0200 Message-Id: <20220913140352.684003075@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220913140348.835121645@linuxfoundation.org> References: <20220913140348.835121645@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "NeilBrown" Prior to Linux 5.3, ->transport_lock in sunrpc required the _bh style spinlocks (when not called from a bottom-half handler). When upstream 3848e96edf4788f772d83990022fa7023a233d83 was backported to stable kernels, the spin_lock/unlock calls should have been changed to the _bh version, but this wasn't noted in the patch and didn't happen. So convert these lock/unlock calls to the _bh versions. This patch is required for any stable kernel prior to 5.3 to which the above mentioned patch was backported. Namely 4.9.y, 4.14.y, 4.19.y. Signed-off-by: NeilBrown Reported-by: Eugeniu Rosca Reviewed-by: Eugeniu Rosca Tested-by: Eugeniu Rosca --- net/sunrpc/xprt.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/net/sunrpc/xprt.c +++ b/net/sunrpc/xprt.c @@ -1550,9 +1550,9 @@ static void xprt_destroy(struct rpc_xprt * is cleared. We use ->transport_lock to ensure the mod_timer() * can only run *before* del_time_sync(), never after. */ - spin_lock(&xprt->transport_lock); + spin_lock_bh(&xprt->transport_lock); del_timer_sync(&xprt->timer); - spin_unlock(&xprt->transport_lock); + spin_unlock_bh(&xprt->transport_lock); /* * Destroy sockets etc from the system workqueue so they can