Received: by 2002:a05:6358:700f:b0:131:369:b2a3 with SMTP id 15csp2157312rwo; Thu, 3 Aug 2023 05:42:59 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEC7Bl9cYu9ZTn8plR5jY0DZDs49QADmQ6u2rmpMNvzBajax+LUcJfOQHODxQbe32oTAaYe X-Received: by 2002:aa7:d918:0:b0:523:78c:166c with SMTP id a24-20020aa7d918000000b00523078c166cmr2502683edr.16.1691066578764; Thu, 03 Aug 2023 05:42:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691066578; cv=none; d=google.com; s=arc-20160816; b=wguV7URbecTmv8Fwlw7kr3cS/pX8YMX+cRYWSILoelx18UdLOd+qvPLsg071D4oRIM +c3KXikpwsqtJQZoDZfA78TwWAPJ+b4O0L2DoSFW/InWpdLaViJeX58bMoKdqRAgOdfX 1WLHH4ppb2x88g8X6/8bzTus05Cr5Dwo7Vj1/0CpNfeuathlyQHYpmDFwsWCNDSU/3yH Wai6ENrSEoRTeqUk1npUEs3ZO5fXQZVbdtmuaTnVPVdBEpn3T+Zgtvn6RW3RTmhkaRXx yAa/n9K1G0vIAsxZaw7J4znrVBis0ln5GsLF70WqYLvcmFybFQh+ozBWp5qgqkTe9vqh U/+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=lYPxjuKL4vXtlRUml9YprFoou9qTfz6gibILfEbuwZ8=; fh=OPB/lHsjyFsztcRZl1FqWvn8HhY449qa3DIvuBh7ZH8=; b=tDGKEtVZOpjGI/CEqTRKIdnN2d1PQV1j02pdt7KXqzCnMiG81kanf1wOlbkJCkivAL bKMWOhCz380vGvX/DVLL3BNh1362WOASP8b93E02dVeRs01D2qRwMb4nlTiN3aKeGjzB i1xoPrwKpRx7zRNKzJcdqV/lfdlM1bsreRyF5e8sk78aqDL7rGNsh4tlctTn4auxvtrs kcJRhWT09OPvkEMXkO5uC+a8t8d61IyK8XkW5luYedInIFAq1EyukegZcCOkzjUXoruV LAcOD/qv2XTALM1xpYpJ52F5WnQYysa0BK4Aap2lbZ78YjVD3GpTHNpEvoLAQlIlv16p TFWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sangfor.com.cn Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f19-20020a056402151300b005222c07f612si11553750edw.496.2023.08.03.05.42.34; Thu, 03 Aug 2023 05:42:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sangfor.com.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235788AbjHCMKz (ORCPT + 99 others); Thu, 3 Aug 2023 08:10:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60060 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234728AbjHCMKx (ORCPT ); Thu, 3 Aug 2023 08:10:53 -0400 X-Greylist: delayed 1200 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 03 Aug 2023 05:10:50 PDT Received: from mail-m11877.qiye.163.com (mail-m11877.qiye.163.com [115.236.118.77]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C798D2726; Thu, 3 Aug 2023 05:10:49 -0700 (PDT) Received: from localhost.localdomain (unknown [113.116.51.207]) by mail-m11877.qiye.163.com (Hmail) with ESMTPA id 46F97400519; Thu, 3 Aug 2023 19:31:51 +0800 (CST) From: Huang Cun To: jejb@linux.ibm.com, martin.petersen@oracle.com, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org Cc: huangcun@sangfor.com.cn, dinghui@sangfor.com.cn, pengdonglin@sangfor.com.cn Subject: [PATCH] scsi: scsi_dh_rdac: Avoid crash when a disk attach failed Date: Thu, 3 Aug 2023 19:28:41 +0800 Message-Id: <20230803112841.588822-1-huangcun@sangfor.com.cn> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-HM-Spam-Status: e1kfGhgUHx5ZQUtXWQgPGg8OCBgUHx5ZQUlOS1dZFg8aDwILHllBWSg2Ly tZV1koWUFITzdXWS1ZQUlXWQ8JGhUIEh9ZQVkaHx1DVklOT0IZTktJQkNPGlUTARMWGhIXJBQOD1 lXWRgSC1lBWUpKSFVKSk1VTkpVSUtMWVdZFhoPEhUdFFlBWUtVS1VLVUtZBg++ X-HM-Tid: 0a89bb2b1a3f2eb3kusn46f97400519 X-HM-MType: 1 X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6MTo6SQw5Tj1NNCgYDzQsEChO ERoKFC1VSlVKTUJKS01JSEpJSkJCVTMWGhIXVRMOGhUcGA4VOwgaFRwdFAlVGBQWVRgVRVlXWRIL WUFZSkpIVUpKTVVOSlVJS0xZV1kIAVlBSUNDQjcG X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When a disk fails to attach, the struct rdac_dh_data is released, but it is not removed from the ctlr->dh_list. When attaching another disk, the released rdac_dh_data will be accessed and the following BUG_ON() may be observed: [ 414.696167] scsi 5:0:0:7: rdac: Attach failed (8) ... [ 423.615364] kernel BUG at drivers/scsi/device_handler/scsi_dh_rdac.c:427! [ 423.615731] invalid opcode: 0000 [#1] SMP NOPTI ... [ 423.623247] Call Trace: [ 423.623598] rdac_bus_attach+0x203/0x4c0 [ 423.623949] ? scsi_dh_handler_attach+0x2d/0x90 [ 423.624300] scsi_dh_handler_attach+0x2d/0x90 [ 423.624652] scsi_sysfs_add_sdev+0x88/0x270 [ 423.625004] scsi_probe_and_add_lun+0xc47/0xd50 [ 423.625354] scsi_report_lun_scan+0x339/0x3b0 [ 423.625705] __scsi_scan_target+0xe9/0x220 [ 423.626056] scsi_scan_target+0xf6/0x100 [ 423.626404] fc_scsi_scan_rport+0xa5/0xb0 [ 423.626757] process_one_work+0x15e/0x3f0 [ 423.627106] worker_thread+0x4c/0x440 [ 423.627453] ? rescuer_thread+0x350/0x350 [ 423.627804] kthread+0xf8/0x130 [ 423.628153] ? kthread_destroy_worker+0x40/0x40 [ 423.628509] ret_from_fork+0x1f/0x40 Fixes: 1a5dc166cd88 ("scsi_dh_rdac: update 'access_state' field") Signed-off-by: Huang Cun Signed-off-by: Ding Hui Cc: Donglin Peng --- drivers/scsi/device_handler/scsi_dh_rdac.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/scsi/device_handler/scsi_dh_rdac.c b/drivers/scsi/device_handler/scsi_dh_rdac.c index c5538645057a..9d487c2b7708 100644 --- a/drivers/scsi/device_handler/scsi_dh_rdac.c +++ b/drivers/scsi/device_handler/scsi_dh_rdac.c @@ -762,8 +762,10 @@ static int rdac_bus_attach(struct scsi_device *sdev) clean_ctlr: spin_lock(&list_lock); + list_del_rcu(&h->node); kref_put(&h->ctlr->kref, release_controller); spin_unlock(&list_lock); + synchronize_rcu(); failed: kfree(h); -- 2.27.0