Netdev Archive mirror
 help / color / mirror / Atom feed
* [PATCH net v2 0/3] net/smc: Fixes for race in smc link group termination
@ 2022-01-13  8:36 Wen Gu
  2022-01-13  8:36 ` [PATCH net v2 1/3] net/smc: Resolve the race between link group access and termination Wen Gu
                   ` (3 more replies)
  0 siblings, 4 replies; 5+ messages in thread
From: Wen Gu @ 2022-01-13  8:36 UTC (permalink / raw
  To: kgraul, davem, kuba; +Cc: linux-s390, netdev, linux-kernel

We encountered some crashes recently and they are caused by the
race between the access and free of link/link group in abnormal
smc link group termination. The crashes can be reproduced in
frequent abnormal link group termination, like setting RNICs up/down.

This set of patches tries to fix this by extending the life cycle
of link/link group to ensure that they won't be referred to after
cleared or freed.

v1 -> v2:
- Improve some comments.

- Move codes of waking up lgrs_deleted wait queue from smc_lgr_free()
  to __smc_lgr_free().

- Move codes of waking up links_deleted wait queue from smcr_link_clear()
  to __smcr_link_clear().

- Move codes of smc_ibdev_cnt_dec() and put_device() from smcr_link_clear()
  to __smcr_link_clear()

- Move smc_lgr_put() to the end of __smcr_link_clear().

- Call smc_lgr_put() after 'out' tag in smcr_link_init() when link
  initialization fails.

- Modify the location where smc connection holds the lgr or link.

    before:
      * hold lgr in smc_lgr_register_conn().
      * hold link in smcr_lgr_conn_assign_link().
    after:
      * hold both lgr and link in smc_conn_create().

  Modify the location to symmetrical with the place where smc connections
  put the lgr or link, which is smc_conn_free().

- Initialize conn->freed as zero in smc_conn_create().

Wen Gu (3):
  net/smc: Resolve the race between link group access and termination
  net/smc: Introduce a new conn->lgr validity check helper
  net/smc: Resolve the race between SMC-R link access and clear

 net/smc/af_smc.c   |   6 ++-
 net/smc/smc.h      |   1 +
 net/smc/smc_cdc.c  |   3 +-
 net/smc/smc_clc.c  |   2 +-
 net/smc/smc_core.c | 120 +++++++++++++++++++++++++++++++++++++++++------------
 net/smc/smc_core.h |  12 ++++++
 net/smc/smc_diag.c |   6 +--
 7 files changed, 118 insertions(+), 32 deletions(-)

-- 
1.8.3.1


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2022-01-13 19:10 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-01-13  8:36 [PATCH net v2 0/3] net/smc: Fixes for race in smc link group termination Wen Gu
2022-01-13  8:36 ` [PATCH net v2 1/3] net/smc: Resolve the race between link group access and termination Wen Gu
2022-01-13  8:36 ` [PATCH net v2 2/3] net/smc: Introduce a new conn->lgr validity check helper Wen Gu
2022-01-13  8:36 ` [PATCH net v2 3/3] net/smc: Resolve the race between SMC-R link access and clear Wen Gu
2022-01-13 19:10 ` [PATCH net v2 0/3] net/smc: Fixes for race in smc link group termination Jakub Kicinski

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).