diff options
author | Alex Elder <elder@inktank.com> | 2013-05-15 16:28:33 -0500 |
---|---|---|
committer | Alex Elder <elder@inktank.com> | 2013-05-17 12:45:40 -0500 |
commit | 14d2f38df67fadee34625fcbd282ee22514c4846 (patch) | |
tree | 2e381f21620e0b9ec38f8c7bc94fc0b183d7a3c3 /net | |
parent | 638f5abed3f7d8a7fc24087bd760fa3d99f68a39 (diff) | |
download | linux-14d2f38df67fadee34625fcbd282ee22514c4846.tar.gz linux-14d2f38df67fadee34625fcbd282ee22514c4846.tar.bz2 linux-14d2f38df67fadee34625fcbd282ee22514c4846.zip |
libceph: must hold mutex for reset_changed_osds()
An osd client has a red-black tree describing its osds, and
occasionally we would get crashes due to one of these trees tree
becoming corrupt somehow.
The problem turned out to be that reset_changed_osds() was being
called without protection of the osd client request mutex. That
function would call __reset_osd() for any osd that had changed, and
__reset_osd() would call __remove_osd() for any osd with no
outstanding requests, and finally __remove_osd() would remove the
corresponding entry from the red-black tree. Thus, the tree was
getting modified without having any lock protection, and was
vulnerable to problems due to concurrent updates.
This appears to be the only osd tree updating path that has this
problem. It can be fairly easily fixed by moving the call up
a few lines, to just before the request mutex gets dropped
in kick_requests().
This resolves:
http://tracker.ceph.com/issues/5043
Cc: stable@vger.kernel.org # 3.4+
Signed-off-by: Alex Elder <elder@inktank.com>
Reviewed-by: Sage Weil <sage@inktank.com>
Diffstat (limited to 'net')
-rw-r--r-- | net/ceph/osd_client.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ceph/osd_client.c b/net/ceph/osd_client.c index d5953b87918c..3a246a6cab47 100644 --- a/net/ceph/osd_client.c +++ b/net/ceph/osd_client.c @@ -1675,13 +1675,13 @@ static void kick_requests(struct ceph_osd_client *osdc, int force_resend) __register_request(osdc, req); __unregister_linger_request(osdc, req); } + reset_changed_osds(osdc); mutex_unlock(&osdc->request_mutex); if (needmap) { dout("%d requests for down osds, need new map\n", needmap); ceph_monc_request_next_osdmap(&osdc->client->monc); } - reset_changed_osds(osdc); } |