Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11811844pjo; Thu, 2 Jan 2020 14:42:14 -0800 (PST) X-Google-Smtp-Source: APXvYqyAYPu4/5LBwBDE6688DeeWVHBkhx0UTk3tDMppfEP7Zw4N4Q17rMTITts9d5raniBM86vS X-Received: by 2002:a05:6830:1248:: with SMTP id s8mr93737882otp.202.1578004934392; Thu, 02 Jan 2020 14:42:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578004934; cv=none; d=google.com; s=arc-20160816; b=pP0UOu/p7zFjkntYknF9UO1FBXlegZFaKVZ2wUXMnqhKCcE5JVZze1MjLm1A9OmKwR 4H9Ed29jy8Oqmw5J7gK9u8xY631HGJBI5X4oN1/86ktyfDbhOVqarProzefqRXzCPDgR y0DvdDOLUaQSZTj1KM43UeuRWq69NYn5bjlT01NY3st3o6/HcnnlcLhfvpLSJCJpizKA /5Dui+apuykg6O9WNfAhuY9pgGiRgowguxIRq74z3sGgc3/dnJif3B2Php4vnbSVB42h Ajz7g+VTWls65axxMAKOuhDcM1fdoPp90ZZnvf7l4INBUgcx/nQUj08C99wSWHrRtgid 1R1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=n3RJC0ReLWSTJw11buJQ1j2X7qfBu64FG8O2gxZapgk=; b=yOMW0SrHFFW6TPWcnQLxQ80LJiuvPaCTWCAxvbNWVfO7ZWJ+9QGeLjpNRiZfGNU7ja /BMSX86yojrnzMsDGCB9ooApxhqYTSoiOEWlkTcoKGk6MlNDmxEJSwn2sGgd/ZSGqIdI LtwJrW36r8zRhFMHpR0A/ILv8VTjuq4vE0hzZr0IL7LFEF9GBFa0j0BEA+QUuSbGAYUE o8IuJa1jdWV2gg6CNwrjipQvd5tER7GVzGDiNDbU1mavlO444ElwW/2Cd98MSrWlCAY2 ejsIuqVmV2B9tdY/TJJuoJUqIzJBK3SvSLah/mhzCf6q/MHnRZGc0NGVkqaQVKVnKyI9 YNdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wrZeueB+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c21si28915255otr.223.2020.01.02.14.42.02; Thu, 02 Jan 2020 14:42:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wrZeueB+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731154AbgABWhx (ORCPT + 99 others); Thu, 2 Jan 2020 17:37:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:50884 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731142AbgABWhu (ORCPT ); Thu, 2 Jan 2020 17:37:50 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3D72A20863; Thu, 2 Jan 2020 22:37:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578004669; bh=eWf9WbLF7nulpcJC+82Dx0PCDNXNjLHUHyQVz1FSm/I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wrZeueB+58vykrqnrJZZMe18teVH8wREIahqLQ/KYLvwXbts9J3ECOBYg5vUhMTHO NFM1KpxibxSmRp/VlXZlkoPO5PTTMyLARwgepnwTkkwO6MFTGNqVsStSqQGtQ6jYuj kwuQXXipfX+rhF322+dR5/SYVStg62jnYSkpsNqE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dick Kennedy , James Smart , "Martin K. Petersen" , Sasha Levin Subject: [PATCH 4.4 103/137] scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow Date: Thu, 2 Jan 2020 23:07:56 +0100 Message-Id: <20200102220600.928909168@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102220546.618583146@linuxfoundation.org> References: <20200102220546.618583146@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: James Smart [ Upstream commit 7cfd5639d99bec0d27af089d0c8c114330e43a72 ] If the driver receives a login that is later then LOGO'd by the remote port (aka ndlp), the driver, upon the completion of the LOGO ACC transmission, will logout the node and unregister the rpi that is being used for the node. As part of the unreg, the node's rpi value is replaced by the LPFC_RPI_ALLOC_ERROR value. If the port is subsequently offlined, the offline walks the nodes and ensures they are logged out, which possibly entails unreg'ing their rpi values. This path does not validate the node's rpi value, thus doesn't detect that it has been unreg'd already. The replaced rpi value is then used when accessing the rpi bitmask array which tracks active rpi values. As the LPFC_RPI_ALLOC_ERROR value is not a valid index for the bitmask, it may fault the system. Revise the rpi release code to detect when the rpi value is the replaced RPI_ALLOC_ERROR value and ignore further release steps. Link: https://lore.kernel.org/r/20191105005708.7399-2-jsmart2021@gmail.com Signed-off-by: Dick Kennedy Signed-off-by: James Smart Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin --- drivers/scsi/lpfc/lpfc_sli.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/scsi/lpfc/lpfc_sli.c b/drivers/scsi/lpfc/lpfc_sli.c index 9b8867c023b9..065fdc17bbfb 100644 --- a/drivers/scsi/lpfc/lpfc_sli.c +++ b/drivers/scsi/lpfc/lpfc_sli.c @@ -15792,6 +15792,13 @@ lpfc_sli4_alloc_rpi(struct lpfc_hba *phba) static void __lpfc_sli4_free_rpi(struct lpfc_hba *phba, int rpi) { + /* + * if the rpi value indicates a prior unreg has already + * been done, skip the unreg. + */ + if (rpi == LPFC_RPI_ALLOC_ERROR) + return; + if (test_and_clear_bit(rpi, phba->sli4_hba.rpi_bmask)) { phba->sli4_hba.rpi_count--; phba->sli4_hba.max_cfg_param.rpi_used--; -- 2.20.1