Return-Path: linux-nfs-owner@vger.kernel.org Received: from mail-wi0-f179.google.com ([209.85.212.179]:35342 "EHLO mail-wi0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161872AbaKNVgT (ORCPT ); Fri, 14 Nov 2014 16:36:19 -0500 Received: by mail-wi0-f179.google.com with SMTP id ex7so4004137wid.6 for ; Fri, 14 Nov 2014 13:36:18 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: Date: Fri, 14 Nov 2014 16:36:18 -0500 Message-ID: Subject: Re: calls to rpc_peeraddr2str() From: Trond Myklebust To: Olga Kornievskaia Cc: linux-nfs Content-Type: text/plain; charset=UTF-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: Hi Olga, On Fri, Nov 14, 2014 at 11:12 AM, Olga Kornievskaia wrote: > Should all calls to rpc_peeraddr2str() be protected with > rcu_read_lock(). callback_proc.c makes calls to rpc_peeraddr2str() > without acquiring such lock. Can somebody comment if this is a bug? > Those calls are made from inside the dprintk_rcu() macro, so they should be safely protected by the rcu lock taken there. Cheers Trond -- Trond Myklebust Linux NFS client maintainer, PrimaryData trond.myklebust@primarydata.com