svn commit: r246440 - stable/9/sys/cam

Alexander Motin mav at FreeBSD.org
Wed Feb 6 22:30:41 UTC 2013


Author: mav
Date: Wed Feb  6 22:30:40 2013
New Revision: 246440
URL: http://svnweb.freebsd.org/changeset/base/246440

Log:
  MFC r244001 (by ken):
  Fix a panic during CAM EDT traversal.
  
  The problem was a race condition between the EDT traversal used by
  things like 'camcontrol devlist', and CAM peripheral driver
  removal.
  
  The EDT traversal code holds the CAM topology lock, and wants
  to show devices that have been invalidated.  It acquires a
  reference to the peripheral to make sure the peripheral it is
  examining doesn't go away.
  
  However, because the peripheral removal code in camperiphfree()
  drops the CAM topology lock to call the peripheral's destructor
  routine, we can run into a situation where the EDT traversal
  increments the peripheral reference count after free process is
  already in progress.  At that point, the reference count is
  ignored, because it was 0 when we started the process.
  
  Fix this race by setting a flag, CAM_PERIPH_FREE, that I previously
  added and checked in xptperiphtraverse() and xptpdperiphtravsere(),
  but failed to use.  If the EDT traversal code sees that flag,
  it will know that the peripheral free process has already started,
  and that it should not access that peripheral.
  
  Also, fix an inconsistency in the locking between
  xptpdperiphtraverse() and xptperiphtraverse().  They now both
  hold the CAM topology lock while calling the peripheral traversal
  function.
  
  cam_xpt.c:      Change xptperiphtraverse() to hold the CAM topology
                  lock across calls to the traversal function.
  
                  Take out the comment in xptpdperiphtraverse() that
                  referenced the locking inconsistency.
  
  cam_periph.c:   Set the CAM_PERIPH_FREE flag when we are in the
                  process of freeing a peripheral driver.
  
  Sponsored by:   Spectra Logic Corporation

Modified:
  stable/9/sys/cam/cam_periph.c
  stable/9/sys/cam/cam_xpt.c
Directory Properties:
  stable/9/sys/   (props changed)

Modified: stable/9/sys/cam/cam_periph.c
==============================================================================
--- stable/9/sys/cam/cam_periph.c	Wed Feb  6 22:25:28 2013	(r246439)
+++ stable/9/sys/cam/cam_periph.c	Wed Feb  6 22:30:40 2013	(r246440)
@@ -615,6 +615,14 @@ camperiphfree(struct cam_periph *periph)
 	}
 
 	/*
+	 * We need to set this flag before dropping the topology lock, to
+	 * let anyone who is traversing the list that this peripheral is
+	 * about to be freed, and there will be no more reference count
+	 * checks.
+	 */
+	periph->flags |= CAM_PERIPH_FREE;
+
+	/*
 	 * The peripheral destructor semantics dictate calling with only the
 	 * SIM mutex held.  Since it might sleep, it should not be called
 	 * with the topology lock held.

Modified: stable/9/sys/cam/cam_xpt.c
==============================================================================
--- stable/9/sys/cam/cam_xpt.c	Wed Feb  6 22:25:28 2013	(r246439)
+++ stable/9/sys/cam/cam_xpt.c	Wed Feb  6 22:30:40 2013	(r246440)
@@ -2178,8 +2178,8 @@ xptperiphtraverse(struct cam_ed *device,
 		 * invalidated, but not peripherals that are scheduled to
 		 * be freed.  So instead of calling cam_periph_acquire(),
 		 * which will fail if the periph has been invalidated, we
-		 * just check for the free flag here.  If it is free, we
-		 * skip to the next periph.
+		 * just check for the free flag here.  If it is in the
+		 * process of being freed, we skip to the next periph.
 		 */
 		if (periph->flags & CAM_PERIPH_FREE) {
 			next_periph = SLIST_NEXT(periph, periph_links);
@@ -2192,16 +2192,9 @@ xptperiphtraverse(struct cam_ed *device,
 		 */
 		periph->refcount++;
 
-		xpt_unlock_buses();
-
 		retval = tr_func(periph, arg);
 
 		/*
-		 * We need the lock for list traversal.
-		 */
-		xpt_lock_buses();
-
-		/*
 		 * Grab the next peripheral before we release this one, so
 		 * our next pointer is still valid.
 		 */
@@ -2283,11 +2276,6 @@ xptpdperiphtraverse(struct periph_driver
 		 */
 		periph->refcount++;
 
-		/*
-		 * XXX KDM we have the toplogy lock here, but in
-		 * xptperiphtraverse(), we drop it before calling the
-		 * traversal function.  Which is correct?
-		 */
 		retval = tr_func(periph, arg);
 
 		/*


More information about the svn-src-stable-9 mailing list