aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPhilipp Reisner <philipp.reisner@linbit.com>2011-05-16 06:57:15 -0400
committerPhilipp Reisner <philipp.reisner@linbit.com>2012-11-08 10:55:52 -0500
commit46e1ce4177aac86b8e39bc7bb5763e9d040ae5cb (patch)
treea5d277ef1bd84a141edd7e7ad8597ac7fda24176
parentdcb20d1a8e7d9602e52a9b673ae4d7f746d2cbb2 (diff)
drbd: protect updates to integrits_tfm by tconn->data->mutex
Since we need to hold that mutex anyways to make sure the peer gets that change in the right position in the data stream, it makes a lot of sense to use the same mutex to ensure existence of the tfm. Signed-off-by: Philipp Reisner <philipp.reisner@linbit.com> Signed-off-by: Lars Ellenberg <lars.ellenberg@linbit.com>
-rw-r--r--drivers/block/drbd/drbd_int.h2
-rw-r--r--drivers/block/drbd/drbd_main.c9
2 files changed, 6 insertions, 5 deletions
diff --git a/drivers/block/drbd/drbd_int.h b/drivers/block/drbd/drbd_int.h
index e16722840767..c59012f96857 100644
--- a/drivers/block/drbd/drbd_int.h
+++ b/drivers/block/drbd/drbd_int.h
@@ -848,7 +848,7 @@ struct drbd_tconn { /* is a resource from the config file */
848 struct list_head out_of_sequence_requests; 848 struct list_head out_of_sequence_requests;
849 849
850 struct crypto_hash *cram_hmac_tfm; 850 struct crypto_hash *cram_hmac_tfm;
851 struct crypto_hash *integrity_tfm; /* checksums we compute */ 851 struct crypto_hash *integrity_tfm; /* checksums we compute, updates protected by tconn->data->mutex */
852 struct crypto_hash *peer_integrity_tfm; /* checksums we verify */ 852 struct crypto_hash *peer_integrity_tfm; /* checksums we verify */
853 struct crypto_hash *csums_tfm; 853 struct crypto_hash *csums_tfm;
854 struct crypto_hash *verify_tfm; 854 struct crypto_hash *verify_tfm;
diff --git a/drivers/block/drbd/drbd_main.c b/drivers/block/drbd/drbd_main.c
index 26d7763d5255..bca599a3c1e1 100644
--- a/drivers/block/drbd/drbd_main.c
+++ b/drivers/block/drbd/drbd_main.c
@@ -1720,11 +1720,11 @@ int drbd_send_dblock(struct drbd_conf *mdev, struct drbd_request *req)
1720 int dgs; 1720 int dgs;
1721 int err; 1721 int err;
1722 1722
1723 sock = &mdev->tconn->data;
1724 p = drbd_prepare_command(mdev, sock);
1723 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_tfm) ? 1725 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_tfm) ?
1724 crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0; 1726 crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0;
1725 1727
1726 sock = &mdev->tconn->data;
1727 p = drbd_prepare_command(mdev, sock);
1728 if (!p) 1728 if (!p)
1729 return -EIO; 1729 return -EIO;
1730 p->sector = cpu_to_be64(req->i.sector); 1730 p->sector = cpu_to_be64(req->i.sector);
@@ -1793,11 +1793,12 @@ int drbd_send_block(struct drbd_conf *mdev, enum drbd_packet cmd,
1793 int err; 1793 int err;
1794 int dgs; 1794 int dgs;
1795 1795
1796 sock = &mdev->tconn->data;
1797 p = drbd_prepare_command(mdev, sock);
1798
1796 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_tfm) ? 1799 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_tfm) ?
1797 crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0; 1800 crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0;
1798 1801
1799 sock = &mdev->tconn->data;
1800 p = drbd_prepare_command(mdev, sock);
1801 if (!p) 1802 if (!p)
1802 return -EIO; 1803 return -EIO;
1803 p->sector = cpu_to_be64(peer_req->i.sector); 1804 p->sector = cpu_to_be64(peer_req->i.sector);