Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2506740pxb; Thu, 11 Feb 2021 14:20:33 -0800 (PST) X-Google-Smtp-Source: ABdhPJxp0CZkKd35IpR2AY9rCO22bYNRXN9JE808V05n3yJ7FXAylkLX0hqnAAYXtVG0CFdshlwv X-Received: by 2002:a17:906:3f96:: with SMTP id b22mr10417248ejj.478.1613082033664; Thu, 11 Feb 2021 14:20:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613082033; cv=none; d=google.com; s=arc-20160816; b=lArcJLjjvQhnceEZfwCowRUkgieR6uWCJBLzKI/DNtYd2My6tMBwy3F/pU38SVVSyo zBAqRYLNnCU2CbC+QpDy2yVeRIF9hou3wsbP9FKhA9l8FqM5enrPhVCpymKKp/ewSX/u TA9O64Cwwxn1sQkDXdDI3GOC29DN0Dk2SPGU5mQvO8VcV98UGOzK4jvHZL/r4hQo5t0L cYIfX0EUX8JRlrFm3LtqGrlfFT8pud77P1dstDA6tLfNoEGTXsWNCpbPs7PJ8ia7IXES WdDDmjqirXnjtP3Nx1TvJk7fG4YKfG0IigK9FeXgZJ4Xdq5FCuBOmHQmiFZIrwD63W0Q 00xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:to:from:subject; bh=Ancew8Wc6ePSigcctazgmcUBF5uQUx94CXMoZ5hmIYQ=; b=J2IB0zYNka+UyDfiWHckl7QEBSfGC8cHbc79phIn+3E+TV6g7zLznGh5rBEdBq28qS nst4iL/Pqvekz80dBT9wwIJFwVr/pT6/GDxYZzwivfmCGSAG6/h00eAr+9PpcgmaWJvX xKTaGXpq+p4yeAcFh0u6tkq2QbiNFjjI14I6q45q0FwLRKODEcojIS0VFQzZv9/dzpKs VEVmKOtBxsBn6xEn8/ncNnHJcT4XAGLRdLF4hs+Awn45UybSG10OGqzoJjaW1qHCdZad yl7Lh1CcWzzyDA0kfvDbCoy7VxMxdfX09Y3F4317CO1wDp151agi3t3Ak66TZTCkErRa Srkw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a89si4969325ede.326.2021.02.11.14.19.39; Thu, 11 Feb 2021 14:20:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229763AbhBKWQZ (ORCPT + 99 others); Thu, 11 Feb 2021 17:16:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:41668 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229936AbhBKWQP (ORCPT ); Thu, 11 Feb 2021 17:16:15 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 43D72601FF; Thu, 11 Feb 2021 22:15:32 +0000 (UTC) Subject: [PATCH v1] svcrdma: Hold private mutex while invoking rdma_accept() From: Chuck Lever To: linux-nfs@vger.kernel.org, linux-rdma@vger.kernel.org Date: Thu, 11 Feb 2021 17:15:30 -0500 Message-ID: <161308170145.1097.4777972218876421176.stgit@klimt.1015granger.net> User-Agent: StGit/1.0 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org RDMA core mutex locking was restructured by d114c6feedfe ("RDMA/cma: Add missing locking to rdma_accept()") [Aug 2020]. When lock debugging is enabled, the RPC/RDMA server trips over the new lockdep assertion in rdma_accept() because it doesn't call rdma_accept() from its CM event handler. As a temporary fix, have svc_rdma_accept() take the mutex explicitly. In the meantime, let's consider how to restructure the RPC/RDMA transport to invoke rdma_accept() from the proper context. Calls to svc_rdma_accept() are serialized with calls to svc_rdma_free() by the generic RPC server layer. Suggested-by: Jason Gunthorpe Signed-off-by: Chuck Lever --- net/sunrpc/xprtrdma/svc_rdma_transport.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/sunrpc/xprtrdma/svc_rdma_transport.c b/net/sunrpc/xprtrdma/svc_rdma_transport.c index afba4e9d5425..8d14dbd45418 100644 --- a/net/sunrpc/xprtrdma/svc_rdma_transport.c +++ b/net/sunrpc/xprtrdma/svc_rdma_transport.c @@ -498,7 +498,9 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) } conn_param.private_data = &pmsg; conn_param.private_data_len = sizeof(pmsg); + rdma_lock_handler(newxprt->sc_cm_id); ret = rdma_accept(newxprt->sc_cm_id, &conn_param); + rdma_unlock_handler(newxprt->sc_cm_id); if (ret) { trace_svcrdma_accept_err(newxprt, ret); goto errout;