Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1102021rwd; Wed, 31 May 2023 09:28:35 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7UPHbLpHCfwtti41nyUkyj+rsrraG82PbqFjdPMaDwKWfybR3LPspEjeslNHZqsxNnGzO8 X-Received: by 2002:a05:6a00:1593:b0:64c:9972:f74b with SMTP id u19-20020a056a00159300b0064c9972f74bmr8280176pfk.12.1685550515311; Wed, 31 May 2023 09:28:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685550515; cv=none; d=google.com; s=arc-20160816; b=fOl578JPoH8XPIp8/gB8RFLMtSAY8TJ4ork5/y1s1YAQspVFIIL/LHB+DBxtOPqC2/ YHfdHQspqR+ajPWB3Vh5deeC/gBlFdKx1w4+Zuu3O7GA2tKXNjCdF9E5oazbrBcsY2kA IWay4vN5SMb3hvaVXVPHfpsiarZt7+Fm5RLqwaUTFbXyYYSHe6mENwocPfx8tAjYD0iy PgjyUKY3FWJ+DkL/t1XT2dSp31Clw/I6GTPQjIp4aVnS3ViJkeM0DbM7cK5SHgcYk1ll /FUmxa3cvKHBjSx4gYG0WCQK3aWhMFEF3h2DJPh4v8cw+QCnUW+R8Es+VwkNuJ4ykv7n 6Jng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from:dkim-signature; bh=gCNYIZMh0VCAQl5u0ro+C+7Me91NUFmJ7xbiQ3ZleV8=; b=U8qe9aFK2p4vkyRPhHqiD+L2wQ4TFMaoqqg7jaqUUFGyT88tYw2Lw6K5fVvQXymN24 qa9SG6+j7ZcGu3O1jenukZQ1CZtDP9Oan3RrhQyoQH4W6N00Cbstx0zA8f+mb5XdXD26 HkVPA49dFM0/aUC6gkpwtPT2UB3rS5PegjvhoeQjqL8/i/9hLkK8tHdQ1mnO8neU/t00 FrkCOZPM7ZK4d7sXjH5TSriQtP5J6ZmW9vajGaOuGih4k92qcbGgiypu/hmU5ve/OPq7 b/NwhPjL81tuPXChuvqSlWGtX8BVQ65UAs22r0DX5NQogEcupjGHGPVnY91AyYdmKkgQ NT7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20221208.gappssmtp.com header.s=20221208 header.b=MqO0Qkc6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 8-20020a621708000000b0064d6252d204si3761745pfx.360.2023.05.31.09.28.21; Wed, 31 May 2023 09:28:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20221208.gappssmtp.com header.s=20221208 header.b=MqO0Qkc6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229499AbjEaQVR (ORCPT + 99 others); Wed, 31 May 2023 12:21:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49688 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229455AbjEaQVQ (ORCPT ); Wed, 31 May 2023 12:21:16 -0400 Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E717911F for ; Wed, 31 May 2023 09:21:14 -0700 (PDT) Received: by mail-io1-xd2e.google.com with SMTP id ca18e2360f4ac-7748ca56133so25041939f.0 for ; Wed, 31 May 2023 09:21:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20221208.gappssmtp.com; s=20221208; t=1685550074; x=1688142074; h=content-transfer-encoding:mime-version:date:message-id:subject :references:in-reply-to:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=gCNYIZMh0VCAQl5u0ro+C+7Me91NUFmJ7xbiQ3ZleV8=; b=MqO0Qkc6Sft8fEB3qZM360EkSqalNMCwvMjFTbWOGu66sPWBuCG5IJgUXUuZ5m2V8S 5PeBprTTw2d0Da2qtV58unpQ7f9FO/BUa82lSVHAQzdNMW+8kFvKzDmmaww6X8ZqSP0s uNLgEMu/qCTy3U08EbCHMrAbqBC2Mamt+yjUMM7Los7dvOCzJgoVaCitstuvw10w0xmu 9krP9H4u9CNElc5lhDagCUGt5eUTX4LrtZjiNV4SKETk92bdBtOStUMvc4+MKVX39D9D yyqBygfsY43tDmnu4rgMG0TjVbSK0X9dC8c6BhgXoYpPSRzhswbxVwK04BBd7g9wE0Fo bVmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685550074; x=1688142074; h=content-transfer-encoding:mime-version:date:message-id:subject :references:in-reply-to:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=gCNYIZMh0VCAQl5u0ro+C+7Me91NUFmJ7xbiQ3ZleV8=; b=OE+Zc7lao7KiAWhBPAbVGK/14xJgXnEdE+GHhqnUkIoe+jlZxbn3EMvnTtldexM5IK Yf53c/onpB0/ZHnZftFe7ETU2Aai35dnpggDCUYVUL4dxxbrWpp/02QLDtX3GMaoILGu S5kb1mHqy1J/1R8mL/ToTGldD81y3evc4aIwyYQrsaLld52aGk0hSkIfUzhPb5Gj0MH0 meNyK0MMa5EFTgAk+11RwQ/BnM3mQmZD3UrrOKRmAd8lVBeI+MeVO/lPET9+tSeYziC+ BSK5EpvoTxCfrB56glkfJMbaiZ5Ag7eSnE0XtvsCu14C3Y4qRDhC51CcchXxaSfqPCh2 T/eQ== X-Gm-Message-State: AC+VfDy2ts/acMvjcFcVpTroVK7+Ueq04fe9br6eQlrLMEfxb6An5sc9 o0LBeS/0S47yBCPn8rU5Qqk6Yg== X-Received: by 2002:a6b:5f1d:0:b0:774:9499:6590 with SMTP id t29-20020a6b5f1d000000b0077494996590mr2005418iob.2.1685550074318; Wed, 31 May 2023 09:21:14 -0700 (PDT) Received: from [127.0.0.1] ([96.43.243.2]) by smtp.gmail.com with ESMTPSA id w13-20020a022a0d000000b0041669a9fb62sm1486855jaw.131.2023.05.31.09.21.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 31 May 2023 09:21:13 -0700 (PDT) From: Jens Axboe To: hch@lst.de, dlemoal@kernel.org, quic_pragalla@quicinc.com, Yu Kuai Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, yukuai3@huawei.com, yi.zhang@huawei.com, yangerkun@huawei.com In-Reply-To: <20230531073435.2923422-1-yukuai1@huaweicloud.com> References: <20230531073435.2923422-1-yukuai1@huaweicloud.com> Subject: Re: [PATCH] blk-ioc: protect ioc_destroy_icq() by 'queue_lock' Message-Id: <168555007304.194776.14532611731698933970.b4-ty@kernel.dk> Date: Wed, 31 May 2023 10:21:13 -0600 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Mailer: b4 0.13-dev-00303 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 31 May 2023 15:34:35 +0800, Yu Kuai wrote: > Currently, icq is tracked by both request_queue(icq->q_node) and > task(icq->ioc_node), and ioc_clear_queue() from elevator exit is not > safe because it can access the list without protection: > > ioc_clear_queue ioc_release_fn > lock queue_lock > list_splice > /* move queue list to a local list */ > unlock queue_lock > /* > * lock is released, the local list > * can be accessed through task exit. > */ > > [...] Applied, thanks! [1/1] blk-ioc: protect ioc_destroy_icq() by 'queue_lock' commit: 2dea233fdc6a00e53bf2ee5cd4b6fca353fd81f8 Best regards, -- Jens Axboe