scst_copy_mgr: Avoid that scst_cm_check_access_acg() triggers a kernel warning

Avoid that the following kernel warning is triggered:

WARNING: CPU: 2 PID: 1761 at scst/src/scst_copy_mgr.c:2835 
Call Trace:
 dump_stack+0x86/0xc3
 __warn+0xc1/0xe0
 warn_slowpath_null+0x18/0x20
 scst_cm_check_access_acg+0x1c2/0x1d0 [scst]
 scst_cm_check_access+0x155/0x280 [scst]
 scst_cm_parse_id_tgt_descr+0x2e6/0x590 [scst]
 scst_cm_parse_descriptors+0x303/0xa60 [scst]
 scst_parse_descriptors+0x5b/0x130 [scst]
 scst_tgt_pre_exec+0x370/0x4a0 [scst]
 scst_process_active_cmd+0x455/0x770 [scst]
 scst_cmd_thread+0x1fb/0x690 [scst]
 kthread+0x102/0x140
 ret_from_fork+0x31/0x40



git-svn-id: http://svn.code.sf.net/p/scst/svn/trunk@7099 d57e44dd-8a1f-0410-8b47-8ef2f437770f
This commit is contained in:
Bart Van Assche
2017-02-25 01:56:30 +00:00
parent 7ad87045dc
commit 19212e4f29

View File

@@ -2821,7 +2821,6 @@ static bool scst_cm_check_access_acg(const char *initiator_name,
TRACE_ENTRY();
scst_assert_activity_suspended();
lockdep_assert_held(&scst_mutex2);
list_for_each_entry(acg_dev, &acg->acg_dev_list, acg_dev_list_entry) {