Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11792977pjo; Thu, 2 Jan 2020 14:22:28 -0800 (PST) X-Google-Smtp-Source: APXvYqyXkmcU5ayssebcuBgp95vnFLdZPdtg2/r4khUV2SoB+geq/hu1V7Zu1JNHGplHrsXUS17o X-Received: by 2002:a9d:7501:: with SMTP id r1mr93081785otk.196.1578003748665; Thu, 02 Jan 2020 14:22:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578003748; cv=none; d=google.com; s=arc-20160816; b=eJ877gTlj1RR/Zf/X67U85KkDLSHqUM5uPoMhj5aFDhgTVJQQoUHjRGxaHsHajZVhG aCotybIJL8/NA+pjuATW6foXQ+ADYrwI237hhNerIOwMM+X6vKCn7VNqwLyHBmN94zpG ilRpYPbV+tgzjPZ40ZjImzlmkNjtex+pCXoyN5wVBp+PukwHRxTWnARbC9BU0dhV95ow vVoGLZTdaChdC3bEDl/Ys9Rr965U1JBXgajFsTr25y416LhxEE5od30kFbtQIejdqzrJ cnB1O9/KfDM+tAMrknT+Mtk6/U6unYFQ4cs91V9lmc0yy4witbXbxA7t+DDiiCB06NsY e4Pw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VxbeCaIW1HJ0DjExEyxdEgT8+0KQYYEQNiNY2Uz+LrM=; b=IRY/pC8/4uwxakWSxRCG1jmtaM2khKmHaPybbX7r9/10uv5zrygUoHDrNEPW9NYb10 Nn/2Zmj1+Zsk6eNHbiI0EJ+coSyjgDFRnw7sbtaloWKiwRxQWx496oSWKTeQ/k/Dc9Bd Vt5/85Ma4gmuFmoX4tgN4W+7eMuLy0YyKDE1tC201RufJnonMuyrS6R36fC87Ak7D4VF G+ZFUJENd+1ULpZd77IuyXUGLoz3XH+/HaOP3AZrap/4R3JHT1Y1w5wTqE88cqcEVNqn vtLHclCgg9oruUwoH2OvXBrm7whDNt+4+RwbhJ/6ukvKQk4vNyBvXNMJ+Cx0+EJxY0qs +G+g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lqJqLnmJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 13si21051138oiy.28.2020.01.02.14.22.16; Thu, 02 Jan 2020 14:22:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lqJqLnmJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728849AbgABWUl (ORCPT + 99 others); Thu, 2 Jan 2020 17:20:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:38554 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726099AbgABWUk (ORCPT ); Thu, 2 Jan 2020 17:20:40 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 103312253D; Thu, 2 Jan 2020 22:20:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578003639; bh=gvAaG+d7XPXErCZz0EtzFyx+y9qm2zos3QZhL5yM2yY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lqJqLnmJL02z96cpdJc72/BdCJQg/f4sYd05IWWSEzEsP8hKiNxLv7NIVEO9ojC/g wYQS7BQl1a0jUOu6aSXcfwxGzU7ZIVa9J4QFTHr+skIEcazFHpyELDPMWwlcrxAA4T XX2F1j82pJHFHlW77hZ2x+qGgfliHFPxY/FkrFac= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dick Kennedy , James Smart , "Martin K. Petersen" , Sasha Levin Subject: [PATCH 4.19 026/114] scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow Date: Thu, 2 Jan 2020 23:06:38 +0100 Message-Id: <20200102220031.755670668@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102220029.183913184@linuxfoundation.org> References: <20200102220029.183913184@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: James Smart [ Upstream commit 7cfd5639d99bec0d27af089d0c8c114330e43a72 ] If the driver receives a login that is later then LOGO'd by the remote port (aka ndlp), the driver, upon the completion of the LOGO ACC transmission, will logout the node and unregister the rpi that is being used for the node. As part of the unreg, the node's rpi value is replaced by the LPFC_RPI_ALLOC_ERROR value. If the port is subsequently offlined, the offline walks the nodes and ensures they are logged out, which possibly entails unreg'ing their rpi values. This path does not validate the node's rpi value, thus doesn't detect that it has been unreg'd already. The replaced rpi value is then used when accessing the rpi bitmask array which tracks active rpi values. As the LPFC_RPI_ALLOC_ERROR value is not a valid index for the bitmask, it may fault the system. Revise the rpi release code to detect when the rpi value is the replaced RPI_ALLOC_ERROR value and ignore further release steps. Link: https://lore.kernel.org/r/20191105005708.7399-2-jsmart2021@gmail.com Signed-off-by: Dick Kennedy Signed-off-by: James Smart Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin --- drivers/scsi/lpfc/lpfc_sli.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/scsi/lpfc/lpfc_sli.c b/drivers/scsi/lpfc/lpfc_sli.c index bd555f886d27..a801917d3c19 100644 --- a/drivers/scsi/lpfc/lpfc_sli.c +++ b/drivers/scsi/lpfc/lpfc_sli.c @@ -17867,6 +17867,13 @@ lpfc_sli4_alloc_rpi(struct lpfc_hba *phba) static void __lpfc_sli4_free_rpi(struct lpfc_hba *phba, int rpi) { + /* + * if the rpi value indicates a prior unreg has already + * been done, skip the unreg. + */ + if (rpi == LPFC_RPI_ALLOC_ERROR) + return; + if (test_and_clear_bit(rpi, phba->sli4_hba.rpi_bmask)) { phba->sli4_hba.rpi_count--; phba->sli4_hba.max_cfg_param.rpi_used--; -- 2.20.1