Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1166171ybf; Thu, 27 Feb 2020 06:12:39 -0800 (PST) X-Google-Smtp-Source: APXvYqzzYr+Xprik0PVob904h3dxYrDDziNncVoADChPo501CKKROti6ryeTJyof+Y7wxBKWbwrD X-Received: by 2002:aca:4b46:: with SMTP id y67mr3226891oia.122.1582812758910; Thu, 27 Feb 2020 06:12:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582812758; cv=none; d=google.com; s=arc-20160816; b=HrBZejlFMgykzV4KcVWjwHfG9ymf5PuVNzb4Edvt8qT6pkjCeQyo1RLcgGR+YgHvcE zaFq0dJAwqB+lFBx2v7AiTTN+ljDvCZ0S7yHtL1108dkcs9bQQAs/h0QuxJxTFTziXF6 lPgUU8TzoS2vW1C0JGm3u1RRnWipgh+R+ogeBvnJ9uXwUvBcRBPl0tBEcYnuL9AxcBiP Zk5W7OQKNQaD/wapz1B7W3vNSl2zR7nFVWUgNVyVYZ6XoD/io07JZvSGJ4wFBh3NeKDX BCvZWxyk+BeS4ESAwg6RCnSfFTyjVCeDJ9UC5g5B8iQgiarJIx/A14b09IAEM3Prn/rD EFtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tzwuSWThRwh0bGzHngUsJmxBNOECUpr/IAPlMhoxiiU=; b=PlLHjejiCJfFKDl03x9yw+t7ugv0DLUpmZXBmU6xLrs6lwER5qhw04UQRyrBWmg7+q fyYi0g8WxCuYLRcmST5/FgS/a8fMq7+WHQ3iJ6/z/foNxtRHjYIPJXvOu79SocKgDl// 543Y2L6enbaOrF1+3kExm6Ng1Wxhrqx0RrJPGBdaaz7vZXQwhjATuq6GHYc2Cj1TEtEd W0wrT5dnvSVffrlMfeznxfeaW2sl5bbDdBzo9DGWhhlV99nishEX8c7Su6jOj5O5aPn5 o3ArGUs8Dp9RVCDyxu6jrlS4ymfRMblG0eNUa9eFP3xiHFUIuXFKE6mwo7GFTaIaq4e6 KQlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ivmO1LoR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z18si718312oid.82.2020.02.27.06.12.24; Thu, 27 Feb 2020 06:12:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ivmO1LoR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388584AbgB0OMW (ORCPT + 99 others); Thu, 27 Feb 2020 09:12:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:50982 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388653AbgB0OMT (ORCPT ); Thu, 27 Feb 2020 09:12:19 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 73ED420578; Thu, 27 Feb 2020 14:12:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582812738; bh=OWTPxU+/A5iHErJHBufe6ko4/tT/IkEB8jQDEA3c+Po=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ivmO1LoR+aa88Bk5VLVcHlN3/12BR5nG4BdjsXGNenNOFPqLPglKu0U64Ze1d17aL ODXwtuf4Vh1ffZg19bUGJMwrwkdtkvzxfu0t1AbsoGwmyblorit/DOKZ6UmJ3zsw8h Z3tFH6X2B8DDCYazVjRnGfjrOsWU755ofcpcPNoc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aya Levin , Parav Pandit , Tariq Toukan , Saeed Mahameed Subject: [PATCH 5.4 132/135] net/mlx5e: Fix crash in recovery flow without devlink reporter Date: Thu, 27 Feb 2020 14:37:52 +0100 Message-Id: <20200227132248.906407764@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132228.710492098@linuxfoundation.org> References: <20200227132228.710492098@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aya Levin commit 1ad6c43c6a7b8627240c6cc19c69e31fedc596a7 upstream. When health reporters are not supported, recovery function is invoked directly, not via devlink health reporters. In this direct flow, the recover function input parameter was passed incorrectly and is causing a kernel oops. This patch is fixing the input parameter. Following call trace is observed on rx error health reporting. Internal error: Oops: 96000007 [#1] PREEMPT SMP Process kworker/u16:4 (pid: 4584, stack limit = 0x00000000c9e45703) Call trace: mlx5e_rx_reporter_err_rq_cqe_recover+0x30/0x164 [mlx5_core] mlx5e_health_report+0x60/0x6c [mlx5_core] mlx5e_reporter_rq_cqe_err+0x6c/0x90 [mlx5_core] mlx5e_rq_err_cqe_work+0x20/0x2c [mlx5_core] process_one_work+0x168/0x3d0 worker_thread+0x58/0x3d0 kthread+0x108/0x134 Fixes: c50de4af1d63 ("net/mlx5e: Generalize tx reporter's functionality") Signed-off-by: Aya Levin Signed-off-by: Parav Pandit Reviewed-by: Tariq Toukan Signed-off-by: Saeed Mahameed Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/mellanox/mlx5/core/en/health.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/ethernet/mellanox/mlx5/core/en/health.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/en/health.c @@ -200,7 +200,7 @@ int mlx5e_health_report(struct mlx5e_pri netdev_err(priv->netdev, err_str); if (!reporter) - return err_ctx->recover(&err_ctx->ctx); + return err_ctx->recover(err_ctx->ctx); return devlink_health_report(reporter, err_str, err_ctx); }