When the checker thread enqueues paths for the io_err_stat thread to
check, it calls enqueue_io_err_stat_by_path() with the vecs lock held.
start_io_err_stat_thread() is also called with the vecs lock held.
These two functions both lock io_err_pathvec_lock. When the io_err_stat
thread updates the p
The checker thread is reponsible for enqueueing paths for the
io_err_stat thread to check. During shutdown, the io_err_stat thread is
shut down and cleaned up before the checker thread. There is no code
to make sure that the checker thread isn't accessing the io_err_stat
pathvec or its mutex while
I found an ABBA deadlock in the io_err_stat marginal path code, and in
the process of fixing it, noticed a potential crash on shutdown. This
patchset addresses both of the issues.
Benjamin Marzinski (3):
libmultipath: make find_err_path_by_dev() static
multipathd: avoid io_err_stat crash durin
Signed-off-by: Benjamin Marzinski
---
libmultipath/io_err_stat.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/libmultipath/io_err_stat.c b/libmultipath/io_err_stat.c
index 5363049d..2e48ee81 100644
--- a/libmultipath/io_err_stat.c
+++ b/libmultipath/io_err_stat.c
@@ -88,7 +
Hi Tushar,
...
> +++ b/testcases/kernel/security/integrity/ima/tests/ima_dm_crypt.sh
> @@ -0,0 +1,60 @@
> +#!/bin/sh
> +# SPDX-License-Identifier: GPL-2.0-or-later
> +# Copyright (c) 2020 Microsoft Corporation
> +# Author: Tushar Sugandhi
> +#
> +# Verify that DM target dm-crypt are measured corr
On Tue, 12 Jan 2021, Mike Snitzer wrote:
> On Tue, Jan 12 2021 at 2:54pm -0500,
> Mikulas Patocka wrote:
>
> > Advance the maximum number of arguments to 15.
> >
> > Signed-off-by: Mikulas Patocka
> > Cc: sta...@vger.kernel.org # v4.19+
> >
> > ---
> > drivers/md/dm-integrity.c |2 +
On Tue, Jan 12 2021 at 2:54pm -0500,
Mikulas Patocka wrote:
> Advance the maximum number of arguments to 15.
>
> Signed-off-by: Mikulas Patocka
> Cc: sta...@vger.kernel.org# v4.19+
>
> ---
> drivers/md/dm-integrity.c |2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> Index:
Advance the maximum number of arguments to 15.
Signed-off-by: Mikulas Patocka
Cc: sta...@vger.kernel.org # v4.19+
---
drivers/md/dm-integrity.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: linux-2.6/drivers/md/dm-integrity.c
=
On Thu, Jan 7, 2021 at 11:07 PM Tushar Sugandhi
wrote:
> From: Lakshmi Ramasubramanian
>
> SELinux stores the active policy in memory, so the changes to this data
> at runtime would have an impact on the security guarantees provided
> by SELinux. Measuring in-memory SELinux policy through IMA su
On Tue, Jan 12 2021 at 12:46am -0500,
JeffleXu wrote:
>
>
> On 1/9/21 1:26 AM, Mike Snitzer wrote:
> > On Thu, Jan 07 2021 at 10:08pm -0500,
> > JeffleXu wrote:
> >
> >> Thanks for reviewing.
> >>
> >>
> >> On 1/8/21 6:18 AM, Mike Snitzer wrote:
> >>> On Wed, Dec 23 2020 at 6:26am -0500,
> >
Actually I'm thinking why the first RFC version [1] I implemented can't
work.
Indeed iterating all hw queues of all target devices may not work well
as for performance. Then since we have an array of struct blk_mq_hw_ctx
* in struct dm_table now, we can also maintain a bitmap or something to
track
On 1/9/21 1:26 AM, Mike Snitzer wrote:
> On Thu, Jan 07 2021 at 10:08pm -0500,
> JeffleXu wrote:
>
>> Thanks for reviewing.
>>
>>
>> On 1/8/21 6:18 AM, Mike Snitzer wrote:
>>> On Wed, Dec 23 2020 at 6:26am -0500,
>>> Jeffle Xu wrote:
>>>
This is actuaaly the core when supporting iopoll
Add two helper macros calculating the offset of bio in struct dm_io and
struct dm_target_io respectively.
Besides, simplify the front padding calculation in
dm_alloc_md_mempools().
Signed-off-by: Jeffle Xu
---
drivers/md/dm.c | 16 ++--
1 file changed, 10 insertions(+), 6 deletions(
From: Colin Ian King
There is a spelling mistake in a dm_integrity_io_error error
message. Fix it.
Signed-off-by: Colin Ian King
---
drivers/md/dm-integrity.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/md/dm-integrity.c b/drivers/md/dm-integrity.c
index 11c7c53
14 matches
Mail list logo