Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2269137imc; Tue, 12 Mar 2019 10:16:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqyu9BSKvEMdD5zZWxSU1rU/W1EsC06fVv9Ymg7R/Ia2FLUp69bDUPKMHKDe5JGTUm++PD9X X-Received: by 2002:a62:a504:: with SMTP id v4mr40163383pfm.22.1552410962088; Tue, 12 Mar 2019 10:16:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552410962; cv=none; d=google.com; s=arc-20160816; b=HlL5vwALa64M7R6WIWQaAqnG4pyIhOWrGmVYLIANXXMcQ67gV19qG/UQtbDvYdEKDD 4eyZ0cVn1aaIdQIosRm3ATFr8U5vyt4D3SY77J3XJ4dP9P7g7HAv1saXqzQO4ozyunli A9bR07UeLQ/qruuA1+hdQ8i1aqTSbacb7bsNGAgU1jWH2sDDjPOWpuo+FBXdTwPZzmER DrAx+jRI7ko5JDq9QrFT2wK4gY/boX1W3fPu8MvRz+QaaexkhjjqxOnI2uMaJzGZCKUU qrLf37BV2rtUmlRA+jd1OIKTz9TRFj2vkQDJdXGSBkUzr1XlOpeSJ+33QTKPqwsRmtic QrPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dFUA3gDD78Z3KwPsmaxzu/ownkV9dijcK5k1ysjfam4=; b=Kl8a/GjSxsrUC92cPmbaY5Vo9P44TpofvN4bGENr58MtsPK/svL5tTD16C16aO5Vox bzdvkLYBuPYOIDRyy/W2CxNYpQjCIlv0uVOJg25GfnpPTI2ViK7WFNXAmXUUXesakAJ+ uNKZjGRZkflgJwxX/cMCq1m6yF5AUB+cnsSCUv8lUgkxABEUPoo+WgQde5l1mvYdEvW0 99/zldwkqSRsCzrXIvUKzz9DjDSSYVbXGe0yFUy01rOy25WDgnk6YvDcPz1hGLE8L/en Gk9JDfc02V4sBRFBgsU/7UMz7vmfT1Yi1XgN5DRgZ3MmckA+IALJMyOylMquaeGKGqwx bYxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vSgU55dy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i4si7565228pgs.408.2019.03.12.10.15.46; Tue, 12 Mar 2019 10:16:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vSgU55dy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728437AbfCLROj (ORCPT + 99 others); Tue, 12 Mar 2019 13:14:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:51438 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728104AbfCLRNu (ORCPT ); Tue, 12 Mar 2019 13:13:50 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6F5DA2171F; Tue, 12 Mar 2019 17:13:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410829; bh=HypgB1R5/K6v+RlmL4REoK+WmSjdPZEgea/NfpOebHg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vSgU55dy9TrQrvppfP0TU6KzSuaHD146RVvZF8ADo/7AK7s+9XZzoYY+iM4nZFWav j/DR9k9i2d9yEL9teA6MMbQTBIMVQRPDaJTGYSyuY1YGS0avUIeDXVR5LlvUdJ2n17 Rrwsbz0DBKsnMyB8xp36eT/D2D0IDYbhp8udzlck= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Michael J. Ruhl" , Brian Welty , Mike Marciniszyn , Dennis Dalessandro , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.19 007/149] IB/{hfi1, qib}: Fix WC.byte_len calculation for UD_SEND_WITH_IMM Date: Tue, 12 Mar 2019 10:07:05 -0700 Message-Id: <20190312170350.141047661@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170349.421581206@linuxfoundation.org> References: <20190312170349.421581206@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 904bba211acc2112fdf866e5a2bc6cd9ecd0de1b ] The work completion length for a receiving a UD send with immediate is short by 4 bytes causing application using this opcode to fail. The UD receive logic incorrectly subtracts 4 bytes for immediate value. These bytes are already included in header length and are used to calculate header/payload split, so the result is these 4 bytes are subtracted twice, once when the header length subtracted from the overall length and once again in the UD opcode specific path. Remove the extra subtraction when handling the opcode. Fixes: 7724105686e7 ("IB/hfi1: add driver files") Reviewed-by: Michael J. Ruhl Signed-off-by: Brian Welty Signed-off-by: Mike Marciniszyn Signed-off-by: Dennis Dalessandro Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/hw/hfi1/ud.c | 1 - drivers/infiniband/hw/qib/qib_ud.c | 1 - 2 files changed, 2 deletions(-) diff --git a/drivers/infiniband/hw/hfi1/ud.c b/drivers/infiniband/hw/hfi1/ud.c index 70d39fc450a1..54eb69564264 100644 --- a/drivers/infiniband/hw/hfi1/ud.c +++ b/drivers/infiniband/hw/hfi1/ud.c @@ -980,7 +980,6 @@ void hfi1_ud_rcv(struct hfi1_packet *packet) opcode == IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE) { wc.ex.imm_data = packet->ohdr->u.ud.imm_data; wc.wc_flags = IB_WC_WITH_IMM; - tlen -= sizeof(u32); } else if (opcode == IB_OPCODE_UD_SEND_ONLY) { wc.ex.imm_data = 0; wc.wc_flags = 0; diff --git a/drivers/infiniband/hw/qib/qib_ud.c b/drivers/infiniband/hw/qib/qib_ud.c index f8d029a2390f..bce2b5cd3c7b 100644 --- a/drivers/infiniband/hw/qib/qib_ud.c +++ b/drivers/infiniband/hw/qib/qib_ud.c @@ -513,7 +513,6 @@ void qib_ud_rcv(struct qib_ibport *ibp, struct ib_header *hdr, opcode == IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE) { wc.ex.imm_data = ohdr->u.ud.imm_data; wc.wc_flags = IB_WC_WITH_IMM; - tlen -= sizeof(u32); } else if (opcode == IB_OPCODE_UD_SEND_ONLY) { wc.ex.imm_data = 0; wc.wc_flags = 0; -- 2.19.1