* [PATCH] iscsi: Fix a sleep-in-atomic bug
@ 2017-05-31 3:26 Jia-Ju Bai
2017-06-01 6:21 ` Nicholas A. Bellinger
0 siblings, 1 reply; 4+ messages in thread
From: Jia-Ju Bai @ 2017-05-31 3:26 UTC (permalink / raw)
To: nab, bart.vanassche, davem, hare, elfring
Cc: linux-scsi, target-devel, linux-kernel, Jia-Ju Bai
The driver may sleep under a spin lock, and the function call path is:
iscsit_tpg_enable_portal_group (acquire the lock by spin_lock)
iscsi_update_param_value
kstrdup(GFP_KERNEL) --> may sleep
To fix it, the "GFP_KERNEL" is replaced with "GFP_ATOMIC".
Signed-off-by: Jia-Ju Bai <baijiaju1990@163.com>
---
drivers/target/iscsi/iscsi_target_parameters.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/target/iscsi/iscsi_target_parameters.c b/drivers/target/iscsi/iscsi_target_parameters.c
index fce6276..8768916 100644
--- a/drivers/target/iscsi/iscsi_target_parameters.c
+++ b/drivers/target/iscsi/iscsi_target_parameters.c
@@ -702,7 +702,7 @@ int iscsi_update_param_value(struct iscsi_param *param, char *value)
{
kfree(param->value);
- param->value = kstrdup(value, GFP_KERNEL);
+ param->value = kstrdup(value, GFP_ATOMIC);
if (!param->value) {
pr_err("Unable to allocate memory for value.\n");
return -ENOMEM;
--
1.7.9.5
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] iscsi: Fix a sleep-in-atomic bug
2017-05-31 3:26 [PATCH] iscsi: Fix a sleep-in-atomic bug Jia-Ju Bai
@ 2017-06-01 6:21 ` Nicholas A. Bellinger
2017-06-02 1:13 ` Jia-Ju Bai
0 siblings, 1 reply; 4+ messages in thread
From: Nicholas A. Bellinger @ 2017-06-01 6:21 UTC (permalink / raw)
To: Jia-Ju Bai
Cc: bart.vanassche, davem, hare, elfring, linux-scsi, target-devel,
linux-kernel
Hi Jia-Ju,
On Wed, 2017-05-31 at 11:26 +0800, Jia-Ju Bai wrote:
> The driver may sleep under a spin lock, and the function call path is:
> iscsit_tpg_enable_portal_group (acquire the lock by spin_lock)
> iscsi_update_param_value
> kstrdup(GFP_KERNEL) --> may sleep
>
> To fix it, the "GFP_KERNEL" is replaced with "GFP_ATOMIC".
>
> Signed-off-by: Jia-Ju Bai <baijiaju1990@163.com>
> ---
> drivers/target/iscsi/iscsi_target_parameters.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Btw, the use of tpg->tpg_state_lock in iscsit_tpg_enable_portal_group()
while checking existing state and calling iscsi_update_param_value() is
not necessary, since lio_target_tpg_enable_store() is already holding
iscsit_get_tpg() -> tpg->tpg_access_lock.
How about the following instead to only take tpg->tpg_state_lock when
updating tpg->tpg_state instead..?
diff --git a/drivers/target/iscsi/iscsi_target_tpg.c b/drivers/target/iscsi/iscsi_target_tpg.c
index 2e7e08d..abaabba 100644
--- a/drivers/target/iscsi/iscsi_target_tpg.c
+++ b/drivers/target/iscsi/iscsi_target_tpg.c
@@ -311,11 +311,9 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
int ret;
- spin_lock(&tpg->tpg_state_lock);
if (tpg->tpg_state == TPG_STATE_ACTIVE) {
pr_err("iSCSI target portal group: %hu is already"
" active, ignoring request.\n", tpg->tpgt);
- spin_unlock(&tpg->tpg_state_lock);
return -EINVAL;
}
/*
@@ -324,10 +322,8 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
* is enforced (as per default), and remove the NONE option.
*/
param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
- if (!param) {
- spin_unlock(&tpg->tpg_state_lock);
+ if (!param)
return -EINVAL;
- }
if (tpg->tpg_attrib.authentication) {
if (!strcmp(param->value, NONE)) {
@@ -341,6 +337,7 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
goto err;
}
+ spin_lock(&tpg->tpg_state_lock);
tpg->tpg_state = TPG_STATE_ACTIVE;
spin_unlock(&tpg->tpg_state_lock);
@@ -353,7 +350,6 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
return 0;
err:
- spin_unlock(&tpg->tpg_state_lock);
return ret;
}
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] iscsi: Fix a sleep-in-atomic bug
2017-06-01 6:21 ` Nicholas A. Bellinger
@ 2017-06-02 1:13 ` Jia-Ju Bai
2017-06-02 3:20 ` Nicholas A. Bellinger
0 siblings, 1 reply; 4+ messages in thread
From: Jia-Ju Bai @ 2017-06-02 1:13 UTC (permalink / raw)
To: Nicholas A. Bellinger
Cc: bart.vanassche, davem, hare, elfring, linux-scsi, target-devel,
linux-kernel
On 06/01/2017 02:21 PM, Nicholas A. Bellinger wrote:
> Hi Jia-Ju,
>
> On Wed, 2017-05-31 at 11:26 +0800, Jia-Ju Bai wrote:
>> The driver may sleep under a spin lock, and the function call path is:
>> iscsit_tpg_enable_portal_group (acquire the lock by spin_lock)
>> iscsi_update_param_value
>> kstrdup(GFP_KERNEL) --> may sleep
>>
>> To fix it, the "GFP_KERNEL" is replaced with "GFP_ATOMIC".
>>
>> Signed-off-by: Jia-Ju Bai<baijiaju1990@163.com>
>> ---
>> drivers/target/iscsi/iscsi_target_parameters.c | 2 +-
>> 1 file changed, 1 insertion(+), 1 deletion(-)
> Btw, the use of tpg->tpg_state_lock in iscsit_tpg_enable_portal_group()
> while checking existing state and calling iscsi_update_param_value() is
> not necessary, since lio_target_tpg_enable_store() is already holding
> iscsit_get_tpg() -> tpg->tpg_access_lock.
>
> How about the following instead to only take tpg->tpg_state_lock when
> updating tpg->tpg_state instead..?
>
> diff --git a/drivers/target/iscsi/iscsi_target_tpg.c b/drivers/target/iscsi/iscsi_target_tpg.c
> index 2e7e08d..abaabba 100644
> --- a/drivers/target/iscsi/iscsi_target_tpg.c
> +++ b/drivers/target/iscsi/iscsi_target_tpg.c
> @@ -311,11 +311,9 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
> int ret;
>
> - spin_lock(&tpg->tpg_state_lock);
> if (tpg->tpg_state == TPG_STATE_ACTIVE) {
> pr_err("iSCSI target portal group: %hu is already"
> " active, ignoring request.\n", tpg->tpgt);
> - spin_unlock(&tpg->tpg_state_lock);
> return -EINVAL;
> }
> /*
> @@ -324,10 +322,8 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> * is enforced (as per default), and remove the NONE option.
> */
> param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
> - if (!param) {
> - spin_unlock(&tpg->tpg_state_lock);
> + if (!param)
> return -EINVAL;
> - }
>
> if (tpg->tpg_attrib.authentication) {
> if (!strcmp(param->value, NONE)) {
> @@ -341,6 +337,7 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> goto err;
> }
>
> + spin_lock(&tpg->tpg_state_lock);
> tpg->tpg_state = TPG_STATE_ACTIVE;
> spin_unlock(&tpg->tpg_state_lock);
>
> @@ -353,7 +350,6 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> return 0;
>
> err:
> - spin_unlock(&tpg->tpg_state_lock);
> return ret;
> }
>
I think it is fine to me.
Thanks,
Jia-Ju Bai
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] iscsi: Fix a sleep-in-atomic bug
2017-06-02 1:13 ` Jia-Ju Bai
@ 2017-06-02 3:20 ` Nicholas A. Bellinger
0 siblings, 0 replies; 4+ messages in thread
From: Nicholas A. Bellinger @ 2017-06-02 3:20 UTC (permalink / raw)
To: Jia-Ju Bai
Cc: bart.vanassche, davem, hare, elfring, linux-scsi, target-devel,
linux-kernel
On Fri, 2017-06-02 at 09:13 +0800, Jia-Ju Bai wrote:
> On 06/01/2017 02:21 PM, Nicholas A. Bellinger wrote:
> > Hi Jia-Ju,
> >
> > On Wed, 2017-05-31 at 11:26 +0800, Jia-Ju Bai wrote:
> >> The driver may sleep under a spin lock, and the function call path is:
> >> iscsit_tpg_enable_portal_group (acquire the lock by spin_lock)
> >> iscsi_update_param_value
> >> kstrdup(GFP_KERNEL) --> may sleep
> >>
> >> To fix it, the "GFP_KERNEL" is replaced with "GFP_ATOMIC".
> >>
> >> Signed-off-by: Jia-Ju Bai<baijiaju1990@163.com>
> >> ---
> >> drivers/target/iscsi/iscsi_target_parameters.c | 2 +-
> >> 1 file changed, 1 insertion(+), 1 deletion(-)
> > Btw, the use of tpg->tpg_state_lock in iscsit_tpg_enable_portal_group()
> > while checking existing state and calling iscsi_update_param_value() is
> > not necessary, since lio_target_tpg_enable_store() is already holding
> > iscsit_get_tpg() -> tpg->tpg_access_lock.
> >
> > How about the following instead to only take tpg->tpg_state_lock when
> > updating tpg->tpg_state instead..?
> >
> > diff --git a/drivers/target/iscsi/iscsi_target_tpg.c b/drivers/target/iscsi/iscsi_target_tpg.c
> > index 2e7e08d..abaabba 100644
> > --- a/drivers/target/iscsi/iscsi_target_tpg.c
> > +++ b/drivers/target/iscsi/iscsi_target_tpg.c
> > @@ -311,11 +311,9 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> > struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
> > int ret;
> >
> > - spin_lock(&tpg->tpg_state_lock);
> > if (tpg->tpg_state == TPG_STATE_ACTIVE) {
> > pr_err("iSCSI target portal group: %hu is already"
> > " active, ignoring request.\n", tpg->tpgt);
> > - spin_unlock(&tpg->tpg_state_lock);
> > return -EINVAL;
> > }
> > /*
> > @@ -324,10 +322,8 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> > * is enforced (as per default), and remove the NONE option.
> > */
> > param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
> > - if (!param) {
> > - spin_unlock(&tpg->tpg_state_lock);
> > + if (!param)
> > return -EINVAL;
> > - }
> >
> > if (tpg->tpg_attrib.authentication) {
> > if (!strcmp(param->value, NONE)) {
> > @@ -341,6 +337,7 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> > goto err;
> > }
> >
> > + spin_lock(&tpg->tpg_state_lock);
> > tpg->tpg_state = TPG_STATE_ACTIVE;
> > spin_unlock(&tpg->tpg_state_lock);
> >
> > @@ -353,7 +350,6 @@ int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
> > return 0;
> >
> > err:
> > - spin_unlock(&tpg->tpg_state_lock);
> > return ret;
> > }
> >
> I think it is fine to me.
>
> Thanks,
> Jia-Ju Bai
Applied with your Reported-by and Reviewed-by.
Thanks!
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-06-02 3:20 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-05-31 3:26 [PATCH] iscsi: Fix a sleep-in-atomic bug Jia-Ju Bai
2017-06-01 6:21 ` Nicholas A. Bellinger
2017-06-02 1:13 ` Jia-Ju Bai
2017-06-02 3:20 ` Nicholas A. Bellinger
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.