On 12/12/2013 12:44 AM, Nicholas A. Bellinger wrote:
> Hi Hannes,
> 
> Btw, apologies for the delayed response on this..  Comments are below.
> 
> On Thu, 2013-12-05 at 14:54 +0100, Hannes Reinecke wrote:
>> When shutting down a target there is a race condition between
>> iscsit_del_np() and __iscsi_target_login_thread().
>> The latter sets the thread pointer to NULL, and the former
>> tries to issue kthread_stop() on that pointer without any
>> synchronization.
>>
>> This patchs adds proper synchronization pointer between those
>> calls to ensure that a) the thread is correctly terminate and
>> b) kthread_stop() isn't called with a NULL pointer.
>>
>> In the long run iscsi_target_login_thread() should be converted
>> into a workqueue.
>>
>> Signed-off-by: Hannes Reinecke <[email protected]>
>> ---
>>  drivers/target/iscsi/iscsi_target.c       | 12 +++++++++---
>>  drivers/target/iscsi/iscsi_target_login.c |  9 ++++++---
>>  2 files changed, 15 insertions(+), 6 deletions(-)
>>
>> diff --git a/drivers/target/iscsi/iscsi_target.c 
>> b/drivers/target/iscsi/iscsi_target.c
>> index bf76fc4..c7bf3c9 100644
>> --- a/drivers/target/iscsi/iscsi_target.c
>> +++ b/drivers/target/iscsi/iscsi_target.c
>> @@ -457,15 +457,21 @@ int iscsit_del_np(struct iscsi_np *np)
>>      }
>>      np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
>>      spin_unlock_bh(&np->np_thread_lock);
>> -
>> -    if (np->np_thread) {
>> +    /* Give __iscsi_target_login_thread() a chance to run */
>> +    schedule();
>> +    spin_lock_bh(&np->np_thread_lock);
>> +    if ((np->np_thread_state == ISCSI_NP_THREAD_SHUTDOWN)
>> +        && np->np_thread) {
>> +            np->np_thread_state = ISCSI_NP_THREAD_EXIT;
>> +            spin_unlock_bh(&np->np_thread_lock);
>>              /*
>>               * We need to send the signal to wakeup Linux/Net
>>               * which may be sleeping in sock_accept()..
>>               */
>>              send_sig(SIGINT, np->np_thread, 1);
>>              kthread_stop(np->np_thread);
>> -    }
>> +    } else
>> +            spin_unlock_bh(&np->np_thread_lock);
>>  
>>      np->np_transport->iscsit_free_np(np);
>>  
>> diff --git a/drivers/target/iscsi/iscsi_target_login.c 
>> b/drivers/target/iscsi/iscsi_target_login.c
>> index 4eb93b2..b375d26 100644
>> --- a/drivers/target/iscsi/iscsi_target_login.c
>> +++ b/drivers/target/iscsi/iscsi_target_login.c
>> @@ -1405,7 +1405,8 @@ out:
>>      stop = kthread_should_stop();
>>      if (!stop && signal_pending(current)) {
>>              spin_lock_bh(&np->np_thread_lock);
>> -            stop = (np->np_thread_state == ISCSI_NP_THREAD_SHUTDOWN);
>> +            stop = (np->np_thread_state == ISCSI_NP_THREAD_SHUTDOWN ||
>> +                    np->np_thread_state == ISCSI_NP_THREAD_EXIT);
>>              spin_unlock_bh(&np->np_thread_lock);
>>      }
>>      /* Wait for another socket.. */
>> @@ -1414,8 +1415,10 @@ out:
>>  exit:
>>      iscsi_stop_login_thread_timer(np);
>>      spin_lock_bh(&np->np_thread_lock);
>> -    np->np_thread_state = ISCSI_NP_THREAD_EXIT;
>> -    np->np_thread = NULL;
>> +    if (np->np_thread_state != ISCSI_NP_THREAD_EXIT) {
>> +            np->np_thread_state = ISCSI_NP_THREAD_EXIT;
>> +            np->np_thread = NULL;
>> +    }
>>      spin_unlock_bh(&np->np_thread_lock);
>>  
>>      return 0;
> 
> I'm not sure this extra logic is necessary.  How about just clearing
> np->np_thread in iscsit_del_np instead..?
> 
> Care to verify on your side with the following patch..?
> 
> --nab
> 
> diff --git a/drivers/target/iscsi/iscsi_target.c 
> b/drivers/target/iscsi/iscsi_target.c
> index 02182ab..0086719 100644
> --- a/drivers/target/iscsi/iscsi_target.c
> +++ b/drivers/target/iscsi/iscsi_target.c
> @@ -465,6 +465,7 @@ int iscsit_del_np(struct iscsi_np *np)
>                  */
>                 send_sig(SIGINT, np->np_thread, 1);
>                 kthread_stop(np->np_thread);
> +               np->np_thread = NULL;
>         }
>  
>         np->np_transport->iscsit_free_np(np);
> diff --git a/drivers/target/iscsi/iscsi_target_login.c 
> b/drivers/target/iscsi/iscsi_target_login.c
> index 4eb93b2..6ab43b6 100644
> --- a/drivers/target/iscsi/iscsi_target_login.c
> +++ b/drivers/target/iscsi/iscsi_target_login.c
> @@ -1415,7 +1415,6 @@ exit:
>         iscsi_stop_login_thread_timer(np);
>         spin_lock_bh(&np->np_thread_lock);
>         np->np_thread_state = ISCSI_NP_THREAD_EXIT;
> -       np->np_thread = NULL;
>         spin_unlock_bh(&np->np_thread_lock);
>  
>         return 0;
> 
> 
The problem here is that 'kthread_stop()' is supposed to be called
with a _valid_ task structure.

There is this race window:

        np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
        spin_unlock_bh(&np->np_thread_lock);
here ->
        if (np->np_thread) {
                /*

If the login thread exits before we evaluate 'np->np_thread'
the pointer is stale and kthread_stop will be called with
an invalid task structure.

So at the very least we need to check the thread_state before
evaluating 'np->np_thread' (which will evaluate to 'true' anyway if
we were to follow up with your patch).
But in doing so we would need to protect is by the thread_lock
to synchronize the state.
And we'll end up with quite the same patch as I've send originally.

In fact, it was an invalid call to kthread_stop() which triggered
the whole patch in the first place :-)

I would love to be proven wrong, as I'm not keen on the 'schedule()'
in there. But I fail to see another way out here, short of
converting the entire kthread into a workqueue item ...

Cheers,

Hannes
-- 
Dr. Hannes Reinecke                   zSeries & Storage
[email protected]                          +49 911 74053 688
SUSE LINUX Products GmbH, Maxfeldstr. 5, 90409 Nürnberg
GF: J. Hawn, J. Guild, F. Imendörffer, HRB 16746 (AG Nürnberg)
--
To unsubscribe from this list: send the line "unsubscribe linux-scsi" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to