Hi Dmitry,
I've added a debug printk call to see whether the devices are enabled
concurrently:
---
drivers/target/target_core_device.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/target/target_core_device.c
b/drivers/target/target_core_device.c
index 5054b647dd0b..f594ee86a986 100644
--- a/drivers/target/target_core_device.c
+++ b/drivers/target/target_core_device.c
@@ -910,6 +910,8 @@ int target_configure_device(struct se_device *dev)
return -EEXIST;
}
+ pr_err("Configuring %p device", dev);
+
/*
* Add early so modules like tcmu can use during its
* configuration.
--
2.40.0
It turns out that even when the flags are set atomically it seems that
there is either no mutex protecting the setup or concurrent kzalloc
calls returned the same address:
[ 3179.785908] kobject: 'maps' (000000000fdf10fd): calling ktype release
[ 3179.785910] kobject: (000000000fdf10fd): dynamic_kobj_release
[ 3179.785912] kobject: 'maps': free name
[ 3179.785953] tcmu nl cmd 2/0 completion could not find device with dev
id 87.
[ 3179.786015] kobject: 'uio8' (000000001b25d2de): kobject_uevent_env
[ 3179.786315] kobject: 'uio8' (000000001b25d2de): fill_kobj_path: path
= '/devices/tcm_user/uio/uio8'
[ 3179.786315] tcmu nl cmd 2/0 completion could not find device with dev
id 87.
[ 3179.786322] tcmu nl cmd 2/0 completion could not find device with dev
id 87.
[ 3179.786557] kobject: 'uio8' (000000001b25d2de): kobject_cleanup,
parent 0000000000000000
[ 3179.786902] kobject: 'uio8' (000000001b25d2de): calling ktype release
[ 3179.786904] kobject: 'uio8': free name
[ 3179.786906] tcmu nl cmd 2/0 completion could not find device with dev
id 87.
[ 3179.787226] tcmu nl cmd 2/0 completion could not find device with dev
id 87.
[ 3179.809906] kobject: 'map0' (000000003fa04166): kobject_cleanup,
parent 00000000e5849eec
[ 3179.809914] kobject: 'map0' (000000003fa04166): auto cleanup kobject_del
[ 3179.809930] tcmu nl cmd 2/0 completion could not find device with dev
id 89.
[ 3179.809936] kobject: 'map0' (000000003fa04166): calling ktype release
[ 3179.810216] kobject: 'map0': free name
[ 3179.810218] tcmu nl cmd 2/0 completion could not find device with dev
id 89.
[ 3179.810219] kobject: 'maps' (00000000e5849eec): kobject_cleanup,
parent 00000000345aab09
[ 3179.810226] tcmu nl cmd 2/0 completion could not find device with dev
id 89.
[ 3179.810535] kobject: 'maps' (00000000e5849eec): auto cleanup kobject_del
[ 3179.810890] tcmu nl cmd 2/0 completion could not find device with dev
id 89.
[ 3179.810890] kobject: 'maps' (00000000e5849eec): calling ktype release
[ 3179.811171] kobject: (00000000e5849eec): dynamic_kobj_release
[ 3179.811174] kobject: 'maps': free name
[ 3179.811195] tcmu nl cmd 2/0 completion could not find device with dev
id 89.
[ 3179.811292] kobject: 'uio9' (00000000345aab09): kobject_uevent_env
[ 3179.811546] kobject: 'uio9' (00000000345aab09): fill_kobj_path: path
= '/devices/tcm_user/uio/uio9'
[ 3179.811576] kobject: 'uio9' (00000000345aab09): kobject_cleanup,
parent 0000000000000000
[ 3179.811578] kobject: 'uio9' (00000000345aab09): calling ktype release
[ 3179.811581] kobject: 'uio9': free name
[ 3179.829730] kobject: '0' (00000000981718a9): kobject_cleanup, parent
0000000000000000
[ 3179.829736] kobject: '0' (00000000981718a9): calling ktype release
[ 3179.829740] kobject: '0': free name
[ 3179.829743] kobject: 'cpu0' (00000000155d52b3): kobject_cleanup,
parent 0000000000000000
[ 3179.829744] kobject: 'cpu0' (00000000155d52b3): calling ktype release
[ 3179.829746] kobject: 'cpu0': free name
[ 3179.829751] kobject: 'cpu1' (0000000050648bc7): kobject_cleanup,
parent 0000000000000000
[ 3179.829753] kobject: 'cpu1' (0000000050648bc7): calling ktype release
[ 3179.829754] kobject: 'cpu1': free name
[ 3179.829755] kobject: 'cpu2' (00000000f0e72c5c): kobject_cleanup,
parent 0000000000000000
[ 3179.829757] kobject: 'cpu2' (00000000f0e72c5c): calling ktype release
[ 3179.829758] kobject: 'cpu2': free name
[ 3179.829759] kobject: 'cpu3' (000000000b256e81): kobject_cleanup,
parent 0000000000000000
[ 3179.829760] kobject: 'cpu3' (000000000b256e81): calling ktype release
[ 3179.829761] kobject: 'cpu3': free name
[ 3179.829762] kobject: 'cpu4' (000000008d489b4f): kobject_cleanup,
parent 0000000000000000
[ 3179.829764] kobject: 'cpu4' (000000008d489b4f): calling ktype release
[ 3179.829765] kobject: 'cpu4': free name
[ 3179.829766] kobject: 'cpu5' (00000000f2e35ad0): kobject_cleanup,
parent 0000000000000000
[ 3179.829767] kobject: 'cpu5' (00000000f2e35ad0): calling ktype release
[ 3179.829768] kobject: 'cpu5': free name
[ 3179.829769] kobject: 'cpu6' (00000000ecbd8737): kobject_cleanup,
parent 0000000000000000
[ 3179.829771] kobject: 'cpu6' (00000000ecbd8737): calling ktype release
[ 3179.829772] kobject: 'cpu6': free name
[ 3179.829773] kobject: 'cpu7' (00000000813ca063): kobject_cleanup,
parent 0000000000000000
[ 3179.829774] kobject: 'cpu7' (00000000813ca063): calling ktype release
[ 3179.829775] kobject: 'cpu7': free name
[ 3179.829776] kobject: 'mq' (0000000062154d34): kobject_cleanup, parent
0000000000000000
[ 3179.829778] kobject: 'mq' (0000000062154d34): calling ktype release
[ 3179.829781] kobject: 'mq': free name
[ 3179.937204] tcmu daemon: command reply support 1.
[ 3180.242175] Configuring 0000000048576d33 device
[ 3180.242191] Configuring 00000000a24b9f12 device
[ 3180.243085] Configuring 0000000048576d33 device
[ 3180.243097] Configuring 0000000048576d33 device
[ 3180.243195] kobject: 'uio8' (00000000d48cde09): kobject_add_internal:
parent: 'uio', set: 'devices'
[ 3180.243293] kobject: 'uio8' (00000000d48cde09): kobject_uevent_env
[ 3180.243325] kobject: 'uio9' (0000000025c5cb20): kobject_add_internal:
parent: 'uio', set: 'devices'
[ 3180.243388] kobject: 'uio9' (0000000025c5cb20): kobject_uevent_env
[ 3180.243392] kobject: 'uio9' (0000000025c5cb20): fill_kobj_path: path
= '/devices/tcm_user/uio/uio9'
[ 3180.243419] kobject: 'maps' (000000007f057cf5): kobject_add_internal:
parent: 'uio9', set: '<NULL>'
[ 3180.243424] kobject: 'map0' (00000000f663b250): kobject_add_internal:
parent: 'maps', set: '<NULL>'
[ 3180.243432] kobject: 'map0' (00000000f663b250): kobject_uevent_env
[ 3180.243433] kobject: 'map0' (00000000f663b250): kobject_uevent_env:
filter function caused the event to drop!
[ 3180.243565] Configuring 0000000048576d33 device
[ 3180.243598] tcmu nl cmd 1/-2 completion could not find device with
dev id 91.
[ 3180.243606] tcmu nl cmd 1/-2 completion could not find device with
dev id 91.
[ 3180.243618] kobject: 'uio8' (00000000d48cde09): fill_kobj_path: path
= '/devices/tcm_user/uio/uio8'
[ 3180.243622] tcmu nl cmd 1/-2 completion could not find device with
dev id 91.
[ 3180.243640] kobject: 'maps' (00000000592a7aac): kobject_add_internal:
parent: 'uio8', set: '<NULL>'
[ 3180.243646] kobject: 'map0' (0000000009bdede6): kobject_add_internal:
parent: 'maps', set: '<NULL>'
[ 3180.243656] kobject: 'map0' (0000000009bdede6): kobject_uevent_env
[ 3180.243658] kobject: 'map0' (0000000009bdede6): kobject_uevent_env:
filter function caused the event to drop!
[ 3180.243726] se_dev->se_dev_ptr already set for storage object
[ 3180.243731] se_dev->se_dev_ptr already set for storage object
[ 3180.243735] se_dev->se_dev_ptr already set for storage object
[ 3180.243738] se_dev->se_dev_ptr already set for storage object
[ 3180.243742] se_dev->se_dev_ptr already set for storage object
[ 3180.243746] se_dev->se_dev_ptr already set for storage object
[ 3180.243749] se_dev->se_dev_ptr already set for storage object
[ 3180.243760] se_dev->se_dev_ptr already set for storage object
[ 3180.243763] se_dev->se_dev_ptr already set for storage object
[ 3180.243767] se_dev->se_dev_ptr already set for storage object
[ 3180.243777] se_dev->se_dev_ptr already set for storage object
[ 3180.243780] se_dev->se_dev_ptr already set for storage object
[ 3180.243784] se_dev->se_dev_ptr already set for storage object
[ 3180.243788] se_dev->se_dev_ptr already set for storage object
[ 3180.244302] kobject: 'uio10' (000000001e7fdf06):
kobject_add_internal: parent: 'uio', set: 'devices'
[ 3180.244472] tcmu nl cmd 1/-2 completion could not find device with
dev id 93.
[ 3180.244628] kobject: 'uio11' (00000000a5f1af78):
kobject_add_internal: parent: 'uio', set: 'devices'
[ 3180.244738] kobject: 'uio11' (00000000a5f1af78): kobject_uevent_env
[ 3180.244746] kobject: 'uio10' (000000001e7fdf06): kobject_uevent_env
[ 3180.244753] kobject: 'uio10' (000000001e7fdf06): fill_kobj_path: path
= '/devices/tcm_user/uio/uio10'
[ 3180.244781] kobject: 'maps' (00000000def336c9): kobject_add_internal:
parent: 'uio10', set: '<NULL>'
[ 3180.244787] kobject: 'map0' (0000000026045935): kobject_add_internal:
parent: 'maps', set: '<NULL>'
[ 3180.244797] kobject: 'map0' (0000000026045935): kobject_uevent_env
[ 3180.244798] kobject: 'map0' (0000000026045935): kobject_uevent_env:
filter function caused the event to drop!
[ 3180.244820] kobject: 'uio12' (00000000768952da):
kobject_add_internal: parent: 'uio', set: 'devices'
[ 3180.244837] list_add double add: new=ffff888017480000,
prev=ffffffff82e35ba0, next=ffff888017480000.
[ 3180.244855] tcmu nl cmd 1/-2 completion could not find device with
dev id 93.
[ 3180.244883] kobject: 'uio12' (00000000768952da): kobject_uevent_env
[ 3180.244888] kobject: 'uio12' (00000000768952da): fill_kobj_path: path
= '/devices/tcm_user/uio/uio12'
[ 3180.244894] ------------[ cut here ]------------
[ 3180.244897] kernel BUG at lib/list_debug.c:33!
[ 3180.244901] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 3180.244902] kobject: 'maps' (000000008b3ebaee): kobject_add_internal:
parent: 'uio12', set: '<NULL>'
[ 3180.244903] CPU: 5 PID: 240588 Comm: node Not tainted
6.4.0-rc2hocus-00247-g02bf964976ef-dirty #11
1a56ed25763fc52a0220ba3bab2f1b70cacabece
[ 3180.244905] kobject: 'map0' (0000000012d7aa89): kobject_add_internal:
parent: 'maps', set: '<NULL>'
[ 3180.244908] kobject: 'map0' (0000000012d7aa89): kobject_uevent_env
[ 3180.244909] kobject: 'map0' (0000000012d7aa89): kobject_uevent_env:
filter function caused the event to drop!
[ 3180.244906] RIP: 0010:__list_add_valid+0x94/0xa0
[ 3180.244917] Code: d1 48 89 c6 4c 89 c2 48 c7 c7 38 e1 4b 82 e8 63 25
b3 ff 0f 0b 48 89 f2 48 89 c1 48 89 fe 48 c7 c7 90 e1 4b 82 e8 4c 25 b3
ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90
[ 3180.244918] RSP: 0018:ffffc90002e7fd68 EFLAGS: 00010246
[ 3180.244919] RAX: 0000000000000058 RBX: ffff888017480018 RCX:
0000000000000000
[ 3180.244919] RDX: 0000000000000000 RSI: ffffffff824440d9 RDI:
00000000ffffffff
[ 3180.244920] RBP: ffffc90002e7fd68 R08: 0000000000000001 R09:
0000000000000001
[ 3180.244921] R10: 000000001b629664 R11: 0000000000000005 R12:
0000000000000000
[ 3180.244921] R13: ffff888017480000 R14: ffff888017480000 R15:
ffff888017480010
[ 3180.244924] FS: 00007f26e5a526c0(0000) GS:ffff88841fc80000(0000)
knlGS:0000000000000000
[ 3180.244924] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3180.244925] CR2: 00007f0104208440 CR3: 000000032af22000 CR4:
00000000003506a0
[ 3180.244926] Call Trace:
[ 3180.244926] <TASK>
[ 3180.244927] tcmu_configure_device+0x29f/0x3a0
[ 3180.244933] target_configure_device+0x8c/0x2f0
[ 3180.244936] target_dev_enable_store+0x32/0x60
[ 3180.244940] configfs_write_iter+0xd5/0x140
[ 3180.244944] vfs_write+0x1ed/0x4f0
[ 3180.244948] ksys_write+0x70/0xf0
[ 3180.244949] __x64_sys_write+0x18/0x20
[ 3180.244950] do_syscall_64+0x3e/0x90
[ 3180.244956] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 3180.244962] RIP: 0033:0x7f26e875611f
[ 3180.244963] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 39 d5 f8
ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f
05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 8c d5 f8 ff 48
[ 3180.244963] RSP: 002b:00007f26e5a51cf0 EFLAGS: 00000293 ORIG_RAX:
0000000000000001
[ 3180.244966] RAX: ffffffffffffffda RBX: 0000000000000000 RCX:
00007f26e875611f
[ 3180.244966] RDX: 0000000000000001 RSI: 00007f26be6549f0 RDI:
0000000000000030
[ 3180.244967] RBP: 00007f26e5a51e20 R08: 0000000000000000 R09:
00000000ffffffff
[ 3180.244967] R10: 0000000000000000 R11: 0000000000000293 R12:
00007f26e5a525c0
[ 3180.244968] R13: 00007f26e5cab8a8 R14: 0000000000000001 R15:
0000000000000400
[ 3180.244968] </TASK>
[ 3180.244969] ---[ end trace 0000000000000000 ]---
[ 3180.244970] RIP: 0010:__list_add_valid+0x94/0xa0
[ 3180.244971] Code: d1 48 89 c6 4c 89 c2 48 c7 c7 38 e1 4b 82 e8 63 25
b3 ff 0f 0b 48 89 f2 48 89 c1 48 89 fe 48 c7 c7 90 e1 4b 82 e8 4c 25 b3
ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90
[ 3180.244972] RSP: 0018:ffffc90002e7fd68 EFLAGS: 00010246
[ 3180.244973] RAX: 0000000000000058 RBX: ffff888017480018 RCX:
0000000000000000
[ 3180.244973] RDX: 0000000000000000 RSI: ffffffff824440d9 RDI:
00000000ffffffff
[ 3180.244974] RBP: ffffc90002e7fd68 R08: 0000000000000001 R09:
0000000000000001
[ 3180.244974] R10: 000000001b629664 R11: 0000000000000005 R12:
0000000000000000
[ 3180.244975] R13: ffff888017480000 R14: ffff888017480000 R15:
ffff888017480010
[ 3180.244977] FS: 00007f26e5a526c0(0000) GS:ffff88841fc80000(0000)
knlGS:0000000000000000
[ 3180.244977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3180.244978] CR2: 00007f0104208440 CR3: 000000032af22000 CR4:
00000000003506a0
[ 3180.245068] se_dev->se_dev_ptr already set for storage object
[ 3180.245087] kobject: 'uio11' (00000000a5f1af78): fill_kobj_path: path
= '/devices/tcm_user/uio/uio11'
[ 3180.245265] tcmu nl cmd 1/-2 completion could not find device with
dev id 91.
[ 3180.245491] kobject: 'maps' (000000009b2a87fb): kobject_add_internal:
parent: 'uio11', set: '<NULL>'
[ 3180.245749] tcmu nl cmd 1/-2 completion could not find device with
dev id 94.
[ 3180.245966] kobject: 'map0' (00000000d832f7b9): kobject_add_internal:
parent: 'maps', set: '<NULL>'
[ 3180.246150] tcmu nl cmd 1/-2 completion could not find device with
dev id 94.
[ 3180.246349] kobject: 'map0' (00000000d832f7b9): kobject_uevent_env
[ 3180.246523] tcmu nl cmd 1/-2 completion could not find device with
dev id 93.
[ 3180.246691] kobject: 'map0' (00000000d832f7b9): kobject_uevent_env:
filter function caused the event to drop!
[ 3180.246878] tcmu nl cmd 1/0 completion could not find device with dev
id 91.
[ 3180.263756] tcmu nl cmd 1/-2 completion could not find device with
dev id 93.
Best regards,
Grzegorz Uriasz
On 21/05/2023 13:28, Grzegorz Uriasz wrote:
Hi Dmitry,
Thank you for your feedback :)
On 20/05/2023 10:46, Dmitry Bogdanov wrote:
Hi Grzegorz,
On Sat, May 20, 2023 at 02:26:14AM +0200, Grzegorz Uriasz wrote:
This fixes data corruptions arising from concurrent enabling of a
target
devices. When multiple enable calls are made concurrently then it is
possible for the target device to be set up twice which results in a
kernel BUG.
Introduces a per target device mutex for serializing enable requests.
Device enable call is already secured by configfs per-file mutex. That
is actually per device. So Enable procedures are already not executed
simulteniously.
True, I've checked the code in configfs and indeed there is a per
file/subsystem mutex.
Look like you wrongly identified the root cause of double list_add.
If you have an evidence that dev->dev_flags could have no DF_CONFIGURED
bit, then it meeans that it (dev_flags) is raced in other
configuration actions (udev_path, vpd_unit_serial, alias).
Bits in dev->dev_flags are written not atomically and if you writes to
enable, alias, udev_path,unit_serial files simulteniously, then some
bits could be lost.
IHMO the best solution is to make dev_flags changes be atomical.
I've tried that using the following patch:
---
drivers/target/target_core_configfs.c | 12 ++++++------
drivers/target/target_core_device.c | 2 +-
drivers/target/target_core_iblock.c | 2 +-
drivers/target/target_core_pscsi.c | 4 ++--
drivers/target/target_core_spc.c | 8 ++++----
drivers/target/target_core_tpg.c | 2 +-
include/target/target_core_backend.h | 2 +-
include/target/target_core_base.h | 4 ++--
8 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/drivers/target/target_core_configfs.c
b/drivers/target/target_core_configfs.c
index 74b67c346dfe..bdc06f654aa8 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -1621,7 +1621,7 @@ static ssize_t
target_wwn_vpd_unit_serial_store(struct config_item *item,
* it is doing 'the right thing' wrt a world wide unique
* VPD Unit Serial Number that OS dependent multipath can depend on.
*/
- if (dev->dev_flags & DF_FIRMWARE_VPD_UNIT_SERIAL) {
+ if (atomic_read(&dev->dev_flags) & DF_FIRMWARE_VPD_UNIT_SERIAL) {
pr_err("Underlying SCSI device firmware provided VPD"
" Unit Serial, ignoring request\n");
return -EOPNOTSUPP;
@@ -1654,7 +1654,7 @@ static ssize_t
target_wwn_vpd_unit_serial_store(struct config_item *item,
snprintf(buf, INQUIRY_VPD_SERIAL_LEN, "%s", page);
snprintf(dev->t10_wwn.unit_serial, INQUIRY_VPD_SERIAL_LEN,
"%s", strstrip(buf));
- dev->dev_flags |= DF_EMULATED_VPD_UNIT_SERIAL;
+ atomic_or(DF_EMULATED_VPD_UNIT_SERIAL, &dev->dev_flags);
pr_debug("Target_Core_ConfigFS: Set emulated VPD Unit Serial:"
" %s\n", dev->t10_wwn.unit_serial);
@@ -2263,7 +2263,7 @@ static ssize_t target_dev_alias_show(struct
config_item *item, char *page)
{
struct se_device *dev = to_device(item);
- if (!(dev->dev_flags & DF_USING_ALIAS))
+ if (!(atomic_read(&dev->dev_flags) & DF_USING_ALIAS))
return 0;
return snprintf(page, PAGE_SIZE, "%s\n", dev->dev_alias);
@@ -2289,7 +2289,7 @@ static ssize_t target_dev_alias_store(struct
config_item *item,
if (dev->dev_alias[read_bytes - 1] == '\n')
dev->dev_alias[read_bytes - 1] = '\0';
- dev->dev_flags |= DF_USING_ALIAS;
+ atomic_or(DF_USING_ALIAS, &dev->dev_flags);
pr_debug("Target_Core_ConfigFS: %s/%s set alias: %s\n",
config_item_name(&hba->hba_group.cg_item),
@@ -2303,7 +2303,7 @@ static ssize_t target_dev_udev_path_show(struct
config_item *item, char *page)
{
struct se_device *dev = to_device(item);
- if (!(dev->dev_flags & DF_USING_UDEV_PATH))
+ if (!(atomic_read(&dev->dev_flags) & DF_USING_UDEV_PATH))
return 0;
return snprintf(page, PAGE_SIZE, "%s\n", dev->udev_path);
@@ -2330,7 +2330,7 @@ static ssize_t target_dev_udev_path_store(struct
config_item *item,
if (dev->udev_path[read_bytes - 1] == '\n')
dev->udev_path[read_bytes - 1] = '\0';
- dev->dev_flags |= DF_USING_UDEV_PATH;
+ atomic_or(DF_USING_UDEV_PATH, &dev->dev_flags);
pr_debug("Target_Core_ConfigFS: %s/%s set udev_path: %s\n",
config_item_name(&hba->hba_group.cg_item),
diff --git a/drivers/target/target_core_device.c
b/drivers/target/target_core_device.c
index 90f3f4926172..5054b647dd0b 100644
--- a/drivers/target/target_core_device.c
+++ b/drivers/target/target_core_device.c
@@ -967,7 +967,7 @@ int target_configure_device(struct se_device *dev)
hba->dev_count++;
spin_unlock(&hba->device_lock);
- dev->dev_flags |= DF_CONFIGURED;
+ atomic_or(DF_CONFIGURED, &dev->dev_flags);
return 0;
diff --git a/drivers/target/target_core_iblock.c
b/drivers/target/target_core_iblock.c
index cc838ffd1294..38d0d104661d 100644
--- a/drivers/target/target_core_iblock.c
+++ b/drivers/target/target_core_iblock.c
@@ -112,7 +112,7 @@ static int iblock_configure_device(struct
se_device *dev)
if (!ib_dev->ibd_readonly)
mode |= FMODE_WRITE;
else
- dev->dev_flags |= DF_READ_ONLY;
+ atomic_or(DF_READ_ONLY, &dev->dev_flags);
bd = blkdev_get_by_path(ib_dev->ibd_udev_path, mode, ib_dev);
if (IS_ERR(bd)) {
diff --git a/drivers/target/target_core_pscsi.c
b/drivers/target/target_core_pscsi.c
index e7425549e39c..36a1ac519f0b 100644
--- a/drivers/target/target_core_pscsi.c
+++ b/drivers/target/target_core_pscsi.c
@@ -201,7 +201,7 @@ pscsi_get_inquiry_vpd_serial(struct scsi_device
*sdev, struct t10_wwn *wwn)
snprintf(&wwn->unit_serial[0], INQUIRY_VPD_SERIAL_LEN, "%s",
&buf[4]);
- wwn->t10_dev->dev_flags |= DF_FIRMWARE_VPD_UNIT_SERIAL;
+ atomic_or(DF_FIRMWARE_VPD_UNIT_SERIAL, &wwn->t10_dev->dev_flags);
kfree(buf);
return 0;
@@ -450,7 +450,7 @@ static int pscsi_configure_device(struct se_device
*dev)
* For the newer PHV_VIRTUAL_HOST_ID struct scsi_device
* reference, we enforce that udev_path has been set
*/
- if (!(dev->dev_flags & DF_USING_UDEV_PATH)) {
+ if (!(atomic_read(&dev->dev_flags) & DF_USING_UDEV_PATH)) {
pr_err("pSCSI: udev_path attribute has not"
" been set before ENABLE=1\n");
return -EINVAL;
diff --git a/drivers/target/target_core_spc.c
b/drivers/target/target_core_spc.c
index 89c0d56294cc..d380d08a2df0 100644
--- a/drivers/target/target_core_spc.c
+++ b/drivers/target/target_core_spc.c
@@ -159,7 +159,7 @@ spc_emulate_evpd_80(struct se_cmd *cmd, unsigned
char *buf)
struct se_device *dev = cmd->se_dev;
u16 len;
- if (dev->dev_flags & DF_EMULATED_VPD_UNIT_SERIAL) {
+ if (atomic_read(&dev->dev_flags) & DF_EMULATED_VPD_UNIT_SERIAL) {
len = sprintf(&buf[4], "%s", dev->t10_wwn.unit_serial);
len++; /* Extra Byte for NULL Terminator */
buf[3] = len;
@@ -239,7 +239,7 @@ spc_emulate_evpd_83(struct se_cmd *cmd, unsigned
char *buf)
* /sys/kernel/config/target/core/$HBA/$DEV/wwn/vpd_unit_serial
* value in order to return the NAA id.
*/
- if (!(dev->dev_flags & DF_EMULATED_VPD_UNIT_SERIAL))
+ if (!(atomic_read(&dev->dev_flags) & DF_EMULATED_VPD_UNIT_SERIAL))
goto check_t10_vend_desc;
/* CODE SET == Binary */
@@ -267,7 +267,7 @@ spc_emulate_evpd_83(struct se_cmd *cmd, unsigned
char *buf)
*/
id_len = 8; /* For Vendor field */
- if (dev->dev_flags & DF_EMULATED_VPD_UNIT_SERIAL)
+ if (atomic_read(&dev->dev_flags) & DF_EMULATED_VPD_UNIT_SERIAL)
id_len += sprintf(&buf[off+12], "%s:%s", prod,
&dev->t10_wwn.unit_serial[0]);
buf[off] = 0x2; /* ASCII */
@@ -720,7 +720,7 @@ spc_emulate_evpd_00(struct se_cmd *cmd, unsigned
char *buf)
* Registered Extended LUN WWN has been set via ConfigFS
* during device creation/restart.
*/
- if (cmd->se_dev->dev_flags & DF_EMULATED_VPD_UNIT_SERIAL) {
+ if (atomic_read(&cmd->se_dev->dev_flags) &
DF_EMULATED_VPD_UNIT_SERIAL) {
buf[3] = ARRAY_SIZE(evpd_handlers);
for (p = 0; p < ARRAY_SIZE(evpd_handlers); ++p)
buf[p + 4] = evpd_handlers[p].page;
diff --git a/drivers/target/target_core_tpg.c
b/drivers/target/target_core_tpg.c
index c0e429e5ef31..c88dc36db6de 100644
--- a/drivers/target/target_core_tpg.c
+++ b/drivers/target/target_core_tpg.c
@@ -656,7 +656,7 @@ int core_tpg_add_lun(
list_add_tail(&lun->lun_dev_link, &dev->dev_sep_list);
spin_unlock(&dev->se_port_lock);
- if (dev->dev_flags & DF_READ_ONLY)
+ if (atomic_read(&dev->dev_flags) & DF_READ_ONLY)
lun->lun_access_ro = true;
else
lun->lun_access_ro = lun_access_ro;
diff --git a/include/target/target_core_backend.h
b/include/target/target_core_backend.h
index a3c193df25b3..27c70a69e088 100644
--- a/include/target/target_core_backend.h
+++ b/include/target/target_core_backend.h
@@ -122,7 +122,7 @@ bool target_configure_unmap_from_queue(struct
se_dev_attrib *attrib,
static inline bool target_dev_configured(struct se_device *se_dev)
{
- return !!(se_dev->dev_flags & DF_CONFIGURED);
+ return !!(atomic_read(&se_dev->dev_flags) & DF_CONFIGURED);
}
#endif /* TARGET_CORE_BACKEND_H */
diff --git a/include/target/target_core_base.h
b/include/target/target_core_base.h
index 5f8e96f1516f..5794b2360c47 100644
--- a/include/target/target_core_base.h
+++ b/include/target/target_core_base.h
@@ -792,8 +792,8 @@ struct se_device_queue {
struct se_device {
/* Used for SAM Task Attribute ordering */
- u32 dev_cur_ordered_id;
- u32 dev_flags;
+ u32 dev_cur_ordered_id;
+ atomic_t dev_flags;
#define DF_CONFIGURED 0x00000001
#define DF_FIRMWARE_VPD_UNIT_SERIAL 0x00000002
#define DF_EMULATED_VPD_UNIT_SERIAL 0x00000004