* [PATCH] dm: make sure dm_table is binded before queue request
@ 2022-02-09 9:37 ` Zhang Yi
0 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-09 9:37 UTC (permalink / raw)
To: dm-devel; +Cc: linux-block, agk, snitzer, axboe, yi.zhang, yukuai3
We found a NULL pointer dereference problem when using dm-mpath target.
The problem is if we submit IO between loading and binding the table,
we could neither get a valid dm_target nor a valid dm table when
submitting request in dm_mq_queue_rq(). BIO based dm target could
handle this case in dm_submit_bio(). This patch fix this by checking
the mapping table before submitting request.
Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
---
drivers/md/dm-rq.c | 11 +++++++++--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
index 579ab6183d4d..af2cf71519e9 100644
--- a/drivers/md/dm-rq.c
+++ b/drivers/md/dm-rq.c
@@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
if (unlikely(!ti)) {
int srcu_idx;
- struct dm_table *map = dm_get_live_table(md, &srcu_idx);
-
+ struct dm_table *map;
+
+ map = dm_get_live_table(md, &srcu_idx);
+ if (!map) {
+ DMERR_LIMIT("%s: mapping table unavailable, erroring io",
+ dm_device_name(md));
+ dm_put_live_table(md, srcu_idx);
+ return BLK_STS_IOERR;
+ }
ti = dm_table_find_target(map, 0);
dm_put_live_table(md, srcu_idx);
}
--
2.31.1
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [dm-devel] [PATCH] dm: make sure dm_table is binded before queue request
@ 2022-02-09 9:37 ` Zhang Yi
0 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-09 9:37 UTC (permalink / raw)
To: dm-devel; +Cc: axboe, snitzer, yi.zhang, linux-block, yukuai3, agk
We found a NULL pointer dereference problem when using dm-mpath target.
The problem is if we submit IO between loading and binding the table,
we could neither get a valid dm_target nor a valid dm table when
submitting request in dm_mq_queue_rq(). BIO based dm target could
handle this case in dm_submit_bio(). This patch fix this by checking
the mapping table before submitting request.
Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
---
drivers/md/dm-rq.c | 11 +++++++++--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
index 579ab6183d4d..af2cf71519e9 100644
--- a/drivers/md/dm-rq.c
+++ b/drivers/md/dm-rq.c
@@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
if (unlikely(!ti)) {
int srcu_idx;
- struct dm_table *map = dm_get_live_table(md, &srcu_idx);
-
+ struct dm_table *map;
+
+ map = dm_get_live_table(md, &srcu_idx);
+ if (!map) {
+ DMERR_LIMIT("%s: mapping table unavailable, erroring io",
+ dm_device_name(md));
+ dm_put_live_table(md, srcu_idx);
+ return BLK_STS_IOERR;
+ }
ti = dm_table_find_target(map, 0);
dm_put_live_table(md, srcu_idx);
}
--
2.31.1
--
dm-devel mailing list
dm-devel@redhat.com
https://listman.redhat.com/mailman/listinfo/dm-devel
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH] dm: make sure dm_table is binded before queue request
2022-02-09 9:37 ` [dm-devel] " Zhang Yi
@ 2022-02-14 8:29 ` Zhang Yi
-1 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-14 8:29 UTC (permalink / raw)
To: dm-devel; +Cc: linux-block, agk, snitzer, axboe, yukuai3
Friendly ping.
On 2022/2/9 17:37, Zhang Yi wrote:
> We found a NULL pointer dereference problem when using dm-mpath target.
> The problem is if we submit IO between loading and binding the table,
> we could neither get a valid dm_target nor a valid dm table when
> submitting request in dm_mq_queue_rq(). BIO based dm target could
> handle this case in dm_submit_bio(). This patch fix this by checking
> the mapping table before submitting request.
>
> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
> ---
> drivers/md/dm-rq.c | 11 +++++++++--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 579ab6183d4d..af2cf71519e9 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> -
> + struct dm_table *map;
> +
> + map = dm_get_live_table(md, &srcu_idx);
> + if (!map) {
> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> + dm_device_name(md));
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_IOERR;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dm-devel] [PATCH] dm: make sure dm_table is binded before queue request
@ 2022-02-14 8:29 ` Zhang Yi
0 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-14 8:29 UTC (permalink / raw)
To: dm-devel; +Cc: linux-block, axboe, snitzer, agk, yukuai3
Friendly ping.
On 2022/2/9 17:37, Zhang Yi wrote:
> We found a NULL pointer dereference problem when using dm-mpath target.
> The problem is if we submit IO between loading and binding the table,
> we could neither get a valid dm_target nor a valid dm table when
> submitting request in dm_mq_queue_rq(). BIO based dm target could
> handle this case in dm_submit_bio(). This patch fix this by checking
> the mapping table before submitting request.
>
> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
> ---
> drivers/md/dm-rq.c | 11 +++++++++--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 579ab6183d4d..af2cf71519e9 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> -
> + struct dm_table *map;
> +
> + map = dm_get_live_table(md, &srcu_idx);
> + if (!map) {
> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> + dm_device_name(md));
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_IOERR;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
>
--
dm-devel mailing list
dm-devel@redhat.com
https://listman.redhat.com/mailman/listinfo/dm-devel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: dm: make sure dm_table is binded before queue request
2022-02-09 9:37 ` [dm-devel] " Zhang Yi
@ 2022-02-22 18:27 ` Mike Snitzer
-1 siblings, 0 replies; 8+ messages in thread
From: Mike Snitzer @ 2022-02-22 18:27 UTC (permalink / raw)
To: Zhang Yi; +Cc: dm-devel, linux-block, agk, axboe, yukuai3
On Wed, Feb 09 2022 at 4:37P -0500,
Zhang Yi <yi.zhang@huawei.com> wrote:
> We found a NULL pointer dereference problem when using dm-mpath target.
> The problem is if we submit IO between loading and binding the table,
> we could neither get a valid dm_target nor a valid dm table when
> submitting request in dm_mq_queue_rq(). BIO based dm target could
> handle this case in dm_submit_bio(). This patch fix this by checking
> the mapping table before submitting request.
>
> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
> ---
> drivers/md/dm-rq.c | 11 +++++++++--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 579ab6183d4d..af2cf71519e9 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> -
> + struct dm_table *map;
> +
> + map = dm_get_live_table(md, &srcu_idx);
> + if (!map) {
> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> + dm_device_name(md));
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_IOERR;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
> --
> 2.31.1
>
I think both dm_submit_bio() and now dm_mq_queue_rq() should _not_
error the IO. This is such a narrow race during device setup that it
best to requeue the IO.
I'll queue this for 5.18:
diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
index 6948d5db9092..3dd040a56318 100644
--- a/drivers/md/dm-rq.c
+++ b/drivers/md/dm-rq.c
@@ -491,8 +491,13 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
if (unlikely(!ti)) {
int srcu_idx;
- struct dm_table *map = dm_get_live_table(md, &srcu_idx);
+ struct dm_table *map;
+ map = dm_get_live_table(md, &srcu_idx);
+ if (unlikely(!map)) {
+ dm_put_live_table(md, srcu_idx);
+ return BLK_STS_RESOURCE;
+ }
ti = dm_table_find_target(map, 0);
dm_put_live_table(md, srcu_idx);
}
diff --git a/drivers/md/dm.c b/drivers/md/dm.c
index 082366d0ad49..c70be6e5ed55 100644
--- a/drivers/md/dm.c
+++ b/drivers/md/dm.c
@@ -1533,15 +1533,10 @@ static void dm_submit_bio(struct bio *bio)
struct dm_table *map;
map = dm_get_live_table(md, &srcu_idx);
- if (unlikely(!map)) {
- DMERR_LIMIT("%s: mapping table unavailable, erroring io",
- dm_device_name(md));
- bio_io_error(bio);
- goto out;
- }
- /* If suspended, queue this IO for later */
- if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags))) {
+ /* If suspended, or map not yet available, queue this IO for later */
+ if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
+ unlikely(!map)) {
if (bio->bi_opf & REQ_NOWAIT)
bio_wouldblock_error(bio);
else if (bio->bi_opf & REQ_RAHEAD)
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [dm-devel] dm: make sure dm_table is binded before queue request
@ 2022-02-22 18:27 ` Mike Snitzer
0 siblings, 0 replies; 8+ messages in thread
From: Mike Snitzer @ 2022-02-22 18:27 UTC (permalink / raw)
To: Zhang Yi; +Cc: linux-block, axboe, dm-devel, agk, yukuai3
On Wed, Feb 09 2022 at 4:37P -0500,
Zhang Yi <yi.zhang@huawei.com> wrote:
> We found a NULL pointer dereference problem when using dm-mpath target.
> The problem is if we submit IO between loading and binding the table,
> we could neither get a valid dm_target nor a valid dm table when
> submitting request in dm_mq_queue_rq(). BIO based dm target could
> handle this case in dm_submit_bio(). This patch fix this by checking
> the mapping table before submitting request.
>
> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
> ---
> drivers/md/dm-rq.c | 11 +++++++++--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 579ab6183d4d..af2cf71519e9 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> -
> + struct dm_table *map;
> +
> + map = dm_get_live_table(md, &srcu_idx);
> + if (!map) {
> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> + dm_device_name(md));
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_IOERR;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
> --
> 2.31.1
>
I think both dm_submit_bio() and now dm_mq_queue_rq() should _not_
error the IO. This is such a narrow race during device setup that it
best to requeue the IO.
I'll queue this for 5.18:
diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
index 6948d5db9092..3dd040a56318 100644
--- a/drivers/md/dm-rq.c
+++ b/drivers/md/dm-rq.c
@@ -491,8 +491,13 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
if (unlikely(!ti)) {
int srcu_idx;
- struct dm_table *map = dm_get_live_table(md, &srcu_idx);
+ struct dm_table *map;
+ map = dm_get_live_table(md, &srcu_idx);
+ if (unlikely(!map)) {
+ dm_put_live_table(md, srcu_idx);
+ return BLK_STS_RESOURCE;
+ }
ti = dm_table_find_target(map, 0);
dm_put_live_table(md, srcu_idx);
}
diff --git a/drivers/md/dm.c b/drivers/md/dm.c
index 082366d0ad49..c70be6e5ed55 100644
--- a/drivers/md/dm.c
+++ b/drivers/md/dm.c
@@ -1533,15 +1533,10 @@ static void dm_submit_bio(struct bio *bio)
struct dm_table *map;
map = dm_get_live_table(md, &srcu_idx);
- if (unlikely(!map)) {
- DMERR_LIMIT("%s: mapping table unavailable, erroring io",
- dm_device_name(md));
- bio_io_error(bio);
- goto out;
- }
- /* If suspended, queue this IO for later */
- if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags))) {
+ /* If suspended, or map not yet available, queue this IO for later */
+ if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
+ unlikely(!map)) {
if (bio->bi_opf & REQ_NOWAIT)
bio_wouldblock_error(bio);
else if (bio->bi_opf & REQ_RAHEAD)
--
dm-devel mailing list
dm-devel@redhat.com
https://listman.redhat.com/mailman/listinfo/dm-devel
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: dm: make sure dm_table is binded before queue request
2022-02-22 18:27 ` [dm-devel] " Mike Snitzer
@ 2022-02-23 12:34 ` Zhang Yi
-1 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-23 12:34 UTC (permalink / raw)
To: Mike Snitzer; +Cc: dm-devel, linux-block, agk, axboe, yukuai3
On 2022/2/23 2:27, Mike Snitzer wrote:
> On Wed, Feb 09 2022 at 4:37P -0500,
> Zhang Yi <yi.zhang@huawei.com> wrote:
>
>> We found a NULL pointer dereference problem when using dm-mpath target.
>> The problem is if we submit IO between loading and binding the table,
>> we could neither get a valid dm_target nor a valid dm table when
>> submitting request in dm_mq_queue_rq(). BIO based dm target could
>> handle this case in dm_submit_bio(). This patch fix this by checking
>> the mapping table before submitting request.
>>
>> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
>> ---
>> drivers/md/dm-rq.c | 11 +++++++++--
>> 1 file changed, 9 insertions(+), 2 deletions(-)
>>
>> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
>> index 579ab6183d4d..af2cf71519e9 100644
>> --- a/drivers/md/dm-rq.c
>> +++ b/drivers/md/dm-rq.c
>> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>>
>> if (unlikely(!ti)) {
>> int srcu_idx;
>> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
>> -
>> + struct dm_table *map;
>> +
>> + map = dm_get_live_table(md, &srcu_idx);
>> + if (!map) {
>> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
>> + dm_device_name(md));
>> + dm_put_live_table(md, srcu_idx);
>> + return BLK_STS_IOERR;
>> + }
>> ti = dm_table_find_target(map, 0);
>> dm_put_live_table(md, srcu_idx);
>> }
>> --
>> 2.31.1
>>
>
> I think both dm_submit_bio() and now dm_mq_queue_rq() should _not_
> error the IO. This is such a narrow race during device setup that it
> best to requeue the IO.
>
Yes,make sense, thanks for the fix.
Thanks,
Yi.
> I'll queue this for 5.18:
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 6948d5db9092..3dd040a56318 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -491,8 +491,13 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> + struct dm_table *map;
>
> + map = dm_get_live_table(md, &srcu_idx);
> + if (unlikely(!map)) {
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_RESOURCE;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
> diff --git a/drivers/md/dm.c b/drivers/md/dm.c
> index 082366d0ad49..c70be6e5ed55 100644
> --- a/drivers/md/dm.c
> +++ b/drivers/md/dm.c
> @@ -1533,15 +1533,10 @@ static void dm_submit_bio(struct bio *bio)
> struct dm_table *map;
>
> map = dm_get_live_table(md, &srcu_idx);
> - if (unlikely(!map)) {
> - DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> - dm_device_name(md));
> - bio_io_error(bio);
> - goto out;
> - }
>
> - /* If suspended, queue this IO for later */
> - if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags))) {
> + /* If suspended, or map not yet available, queue this IO for later */
> + if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
> + unlikely(!map)) {
> if (bio->bi_opf & REQ_NOWAIT)
> bio_wouldblock_error(bio);
> else if (bio->bi_opf & REQ_RAHEAD)
>
> .
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dm-devel] dm: make sure dm_table is binded before queue request
@ 2022-02-23 12:34 ` Zhang Yi
0 siblings, 0 replies; 8+ messages in thread
From: Zhang Yi @ 2022-02-23 12:34 UTC (permalink / raw)
To: Mike Snitzer; +Cc: linux-block, axboe, dm-devel, agk, yukuai3
On 2022/2/23 2:27, Mike Snitzer wrote:
> On Wed, Feb 09 2022 at 4:37P -0500,
> Zhang Yi <yi.zhang@huawei.com> wrote:
>
>> We found a NULL pointer dereference problem when using dm-mpath target.
>> The problem is if we submit IO between loading and binding the table,
>> we could neither get a valid dm_target nor a valid dm table when
>> submitting request in dm_mq_queue_rq(). BIO based dm target could
>> handle this case in dm_submit_bio(). This patch fix this by checking
>> the mapping table before submitting request.
>>
>> Signed-off-by: Zhang Yi <yi.zhang@huawei.com>
>> ---
>> drivers/md/dm-rq.c | 11 +++++++++--
>> 1 file changed, 9 insertions(+), 2 deletions(-)
>>
>> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
>> index 579ab6183d4d..af2cf71519e9 100644
>> --- a/drivers/md/dm-rq.c
>> +++ b/drivers/md/dm-rq.c
>> @@ -499,8 +499,15 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>>
>> if (unlikely(!ti)) {
>> int srcu_idx;
>> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
>> -
>> + struct dm_table *map;
>> +
>> + map = dm_get_live_table(md, &srcu_idx);
>> + if (!map) {
>> + DMERR_LIMIT("%s: mapping table unavailable, erroring io",
>> + dm_device_name(md));
>> + dm_put_live_table(md, srcu_idx);
>> + return BLK_STS_IOERR;
>> + }
>> ti = dm_table_find_target(map, 0);
>> dm_put_live_table(md, srcu_idx);
>> }
>> --
>> 2.31.1
>>
>
> I think both dm_submit_bio() and now dm_mq_queue_rq() should _not_
> error the IO. This is such a narrow race during device setup that it
> best to requeue the IO.
>
Yes,make sense, thanks for the fix.
Thanks,
Yi.
> I'll queue this for 5.18:
>
> diff --git a/drivers/md/dm-rq.c b/drivers/md/dm-rq.c
> index 6948d5db9092..3dd040a56318 100644
> --- a/drivers/md/dm-rq.c
> +++ b/drivers/md/dm-rq.c
> @@ -491,8 +491,13 @@ static blk_status_t dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx,
>
> if (unlikely(!ti)) {
> int srcu_idx;
> - struct dm_table *map = dm_get_live_table(md, &srcu_idx);
> + struct dm_table *map;
>
> + map = dm_get_live_table(md, &srcu_idx);
> + if (unlikely(!map)) {
> + dm_put_live_table(md, srcu_idx);
> + return BLK_STS_RESOURCE;
> + }
> ti = dm_table_find_target(map, 0);
> dm_put_live_table(md, srcu_idx);
> }
> diff --git a/drivers/md/dm.c b/drivers/md/dm.c
> index 082366d0ad49..c70be6e5ed55 100644
> --- a/drivers/md/dm.c
> +++ b/drivers/md/dm.c
> @@ -1533,15 +1533,10 @@ static void dm_submit_bio(struct bio *bio)
> struct dm_table *map;
>
> map = dm_get_live_table(md, &srcu_idx);
> - if (unlikely(!map)) {
> - DMERR_LIMIT("%s: mapping table unavailable, erroring io",
> - dm_device_name(md));
> - bio_io_error(bio);
> - goto out;
> - }
>
> - /* If suspended, queue this IO for later */
> - if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags))) {
> + /* If suspended, or map not yet available, queue this IO for later */
> + if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
> + unlikely(!map)) {
> if (bio->bi_opf & REQ_NOWAIT)
> bio_wouldblock_error(bio);
> else if (bio->bi_opf & REQ_RAHEAD)
>
> .
>
--
dm-devel mailing list
dm-devel@redhat.com
https://listman.redhat.com/mailman/listinfo/dm-devel
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2022-02-28 6:25 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-02-09 9:37 [PATCH] dm: make sure dm_table is binded before queue request Zhang Yi
2022-02-09 9:37 ` [dm-devel] " Zhang Yi
2022-02-14 8:29 ` Zhang Yi
2022-02-14 8:29 ` [dm-devel] " Zhang Yi
2022-02-22 18:27 ` Mike Snitzer
2022-02-22 18:27 ` [dm-devel] " Mike Snitzer
2022-02-23 12:34 ` Zhang Yi
2022-02-23 12:34 ` [dm-devel] " Zhang Yi
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.