lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <40d06d0004354b79989168a90e5d7a60@huawei.com> Date: Sat, 28 Jan 2023 06:51:51 +0000 From: zhongjinghua <zhongjinghua@...wei.com> To: Mike Christie <michael.christie@...cle.com>, "jejb@...ux.ibm.com" <jejb@...ux.ibm.com>, "martin.petersen@...cle.com" <martin.petersen@...cle.com>, "bvanassche@....org" <bvanassche@....org>, "emilne@...hat.com" <emilne@...hat.com>, "hare@...e.de" <hare@...e.de> CC: "linux-scsi@...r.kernel.org" <linux-scsi@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "zhangyi (F)" <yi.zhang@...wei.com>, "yukuai (C)" <yukuai3@...wei.com>, "houtao (A)" <houtao1@...wei.com>, yangerkun <yangerkun@...wei.com> Subject: 答复: [PATCH] scsi: fix iscsi rescan fails to create block Hello, We also want to write get_device_unless_zero, I will try to make a patch. I'm not sure if this problem exists in other places and can be fixed in this way, because we only tested this problem. I want to fix this problem that is now tested first. Thanks. -----邮件原件----- 发件人: Mike Christie <michael.christie@...cle.com> 发送时间: 2023年1月19日 7:07 收件人: zhongjinghua <zhongjinghua@...wei.com>; jejb@...ux.ibm.com; martin.petersen@...cle.com; bvanassche@....org; emilne@...hat.com; hare@...e.de 抄送: linux-scsi@...r.kernel.org; linux-kernel@...r.kernel.org; zhangyi (F) <yi.zhang@...wei.com>; yukuai (C) <yukuai3@...wei.com>; houtao (A) <houtao1@...wei.com> 主题: Re: [PATCH] scsi: fix iscsi rescan fails to create block On 1/16/23 21:01, Zhong Jinghua wrote: > diff --git a/drivers/scsi/scsi_sysfs.c b/drivers/scsi/scsi_sysfs.c > index 42db9c52208e..e7893835b99a 100644 > --- a/drivers/scsi/scsi_sysfs.c > +++ b/drivers/scsi/scsi_sysfs.c > @@ -1503,6 +1503,13 @@ void scsi_remove_device(struct scsi_device > *sdev) } EXPORT_SYMBOL(scsi_remove_device); > > +static int scsi_device_try_get(struct scsi_device *sdev) { > + if (!kobject_get_unless_zero(&sdev->sdev_gendev.kobj)) > + return -ENXIO; > + return 0; > +} > + > static void __scsi_remove_target(struct scsi_target *starget) { > struct Scsi_Host *shost = dev_to_shost(starget->dev.parent); > @@ -1521,9 +1528,7 @@ static void __scsi_remove_target(struct scsi_target *starget) > if (sdev->channel != starget->channel || > sdev->id != starget->id) > continue; > - if (sdev->sdev_state == SDEV_DEL || > - sdev->sdev_state == SDEV_CANCEL || > - !get_device(&sdev->sdev_gendev)) > + if (scsi_device_try_get(sdev)) > continue; > spin_unlock_irqrestore(shost->host_lock, flags); > scsi_remove_device(sdev); I think the patch will work ok. I don't think we want to mix in our own reference getting function that works on kobjects directly with the put_device use a little below that line above. Since this is the second time (looks like Hannes was wanting one when he originally fixed this) we've wanted a get_unless_zero type function did you send Greg a get_device_unless_zero type of patch already and was that rejected? Why doesn't scsi_forget_host have the same issue with other drivers and similar scan/delete/host-removal type of tests? Is there something that flushes those async scans? I'm just wondering if we can do something similar for the target removal or if the host removal needs a similar fix.
Powered by blists - more mailing lists