Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp577141ybz; Wed, 22 Apr 2020 04:04:27 -0700 (PDT) X-Google-Smtp-Source: APiQypLeMhyrqxdWdWigyHRb8JOLlG8tYbabNjsKc41rByxDy5P7gCiv+Ff4dASxwXqlrs/COiaZ X-Received: by 2002:a17:906:1ccb:: with SMTP id i11mr25176988ejh.101.1587553467391; Wed, 22 Apr 2020 04:04:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587553467; cv=none; d=google.com; s=arc-20160816; b=SeQ+QtYdP0QVLvIJg0MrpK6eqBxbmH0PZ9S08jVmo3tcCOeEQymZ4V2R5OvAlo/vQ1 ZHl7n4Rx46fdGCNzjp4woM33i2ZfDDZ1UNWHz8bO/ywth73a3+afbrOn05V5mJ9MHRW6 VNPL+RUmmL/4fv6RmUj1UJxao1hOd7z+9sNZbm711SNbbJVy7uzpOEHwevaY+XS0XFgL O8ay8d5v0Nir7eGXIU9qFy+RzAITUXpaXUIXSJI8ITvveKGgLNGqTI8LnFiF0CiL/NmL g0xFAfFRYZauE7YtgjVciEJZN6JuhJI+uJVKhrIE8Y2SN598TcQ6fXVkEdy329fzc5Zh KDZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=c2Qe0xfGWnjh9IaZQ0T+8GxmGYeN4TpZMYiePKGRlik=; b=tnX1wnuWe/TbniP58IwETwvi2RIq7Mvu8PQoEEggL6YePeSdfo5clhKZn6AvWzj8TA PQHaxFglD4NgDHAJsnD1adrufIdGVQ1rb7WzbF6cSF1Egm/QEkXthjSNN0DPBJl/hnLr oCMTugvkvhnxAGAwCorYmOADtl1YRxvkm/u6YAX7HDQNW78PPnOs3DFhc/4HBDCzttPs AiNOaFzCAPMFFS1syWzifgXq4Keg8sF7OTnHX0zlgAxSkCZVfcZfe38pPa5JV8I4z0d5 4haS3TeNZM6nQn/pVHbaB49EVkU5TFBXSQHEM6WgvS/miSLWO1Kjw1mehMQm4knfAcyZ 2Wtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qem/+px2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h21si3205590ejc.152.2020.04.22.04.03.51; Wed, 22 Apr 2020 04:04:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qem/+px2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726715AbgDVKBB (ORCPT + 99 others); Wed, 22 Apr 2020 06:01:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:48854 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726707AbgDVKA6 (ORCPT ); Wed, 22 Apr 2020 06:00:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E6CF2076C; Wed, 22 Apr 2020 10:00:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587549657; bh=0XlszoyFMe59iSqgMh03FHzcv92v+WCoY0GZ3XGuGbw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qem/+px26ycZXRAbBESLJ8xp065yMfcySIBzdeByiD7sXJLzEwdKxMz/bo9nOPvUc bxaR3p5g22DqNWuUoBi5pxAhQFq6NBHfsIKlMG6eY7f0LpDmCMXt523SiJ9UVzuPgB ndMBL/aMTAeDKZa0e4wV1D8n++dmhqz+Q4rujs84= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wen Yang , Corey Minyard , Arnd Bergmann , openipmi-developer@lists.sourceforge.net, Corey Minyard , Sasha Levin Subject: [PATCH 4.4 052/100] ipmi: fix hung processes in __get_guid() Date: Wed, 22 Apr 2020 11:56:22 +0200 Message-Id: <20200422095032.319462835@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095022.476101261@linuxfoundation.org> References: <20200422095022.476101261@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wen Yang [ Upstream commit 32830a0534700f86366f371b150b17f0f0d140d7 ] The wait_event() function is used to detect command completion. When send_guid_cmd() returns an error, smi_send() has not been called to send data. Therefore, wait_event() should not be used on the error path, otherwise it will cause the following warning: [ 1361.588808] systemd-udevd D 0 1501 1436 0x00000004 [ 1361.588813] ffff883f4b1298c0 0000000000000000 ffff883f4b188000 ffff887f7e3d9f40 [ 1361.677952] ffff887f64bd4280 ffffc90037297a68 ffffffff8173ca3b ffffc90000000010 [ 1361.767077] 00ffc90037297ad0 ffff887f7e3d9f40 0000000000000286 ffff883f4b188000 [ 1361.856199] Call Trace: [ 1361.885578] [] ? __schedule+0x23b/0x780 [ 1361.951406] [] schedule+0x36/0x80 [ 1362.010979] [] get_guid+0x118/0x150 [ipmi_msghandler] [ 1362.091281] [] ? prepare_to_wait_event+0x100/0x100 [ 1362.168533] [] ipmi_register_smi+0x405/0x940 [ipmi_msghandler] [ 1362.258337] [] try_smi_init+0x529/0x950 [ipmi_si] [ 1362.334521] [] ? std_irq_setup+0xd0/0xd0 [ipmi_si] [ 1362.411701] [] init_ipmi_si+0x492/0x9e0 [ipmi_si] [ 1362.487917] [] ? ipmi_pci_probe+0x280/0x280 [ipmi_si] [ 1362.568219] [] do_one_initcall+0x50/0x180 [ 1362.636109] [] ? kmem_cache_alloc_trace+0x142/0x190 [ 1362.714330] [] do_init_module+0x5f/0x200 [ 1362.781208] [] load_module+0x1898/0x1de0 [ 1362.848069] [] ? __symbol_put+0x60/0x60 [ 1362.913886] [] ? security_kernel_post_read_file+0x6b/0x80 [ 1362.998514] [] SYSC_finit_module+0xe5/0x120 [ 1363.068463] [] ? SYSC_finit_module+0xe5/0x120 [ 1363.140513] [] SyS_finit_module+0xe/0x10 [ 1363.207364] [] do_syscall_64+0x74/0x180 Fixes: 50c812b2b951 ("[PATCH] ipmi: add full sysfs support") Signed-off-by: Wen Yang Cc: Corey Minyard Cc: Arnd Bergmann Cc: Greg Kroah-Hartman Cc: openipmi-developer@lists.sourceforge.net Cc: linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org # 2.6.17- Message-Id: <20200403090408.58745-1-wenyang@linux.alibaba.com> Signed-off-by: Corey Minyard Signed-off-by: Sasha Levin --- drivers/char/ipmi/ipmi_msghandler.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c index 5cb5e8ff02240..7b8c1a64a1009 100644 --- a/drivers/char/ipmi/ipmi_msghandler.c +++ b/drivers/char/ipmi/ipmi_msghandler.c @@ -2645,7 +2645,9 @@ get_guid(ipmi_smi_t intf) if (rv) /* Send failed, no GUID available. */ intf->bmc->guid_set = 0; - wait_event(intf->waitq, intf->bmc->guid_set != 2); + else + wait_event(intf->waitq, intf->bmc->guid_set != 2); + intf->null_user_handler = NULL; } -- 2.20.1