Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp125270ybm; Tue, 26 May 2020 12:24:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxonn+nn/6+6v+6+u8C+vtufU6sEkTTYEbJo2ISfaj4nLs+P8w9M7yylnoRVYubaKWrDDWM X-Received: by 2002:a17:906:c401:: with SMTP id u1mr2419683ejz.151.1590521055772; Tue, 26 May 2020 12:24:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590521055; cv=none; d=google.com; s=arc-20160816; b=q9qz71J0RNjQjwKedxGsyDY1UJpsBcA9fe0+gQSa+dfvh9SvzUw7ZM8bkcn4uUeZOa 8u0CQOPFbVJk4KubccwN/BRAolNNdkaGgxTRZ+z/LN2wzRB2X9hR1RyGVcEk4ewy8Gcq 49e+Oi+Waj0bZKz3CwmMPQhn3VEB/f5uG3gb5D1L07yNxKh3EDjbXqu2Wfzf0noBCJKX Yxlx1ifQBly/pHSMaqf8HUIoHoEDxFC2RWayjpP1J1XetLrEfoKIUopTEpBqiubp5E7U 9GUaF2gYW9CS7qDkf530e81T/s94UGLqWi5SjyPjb7ezKrZ60D4cVaqsn57eUfZkrpUa hw2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bnqCcsW8/XXfQ/8Rc2V4J3c2bviw8xNu24mNVFXzqGA=; b=n4oVBlydw342Ce8DDPsvUzJKdGXaHVRedyblI/bc7OMrx08EkdIUYXIPymWQYdi+2X +9UMfAg01jPSJC88QB+ArjFpSY7sNsLAPSd8fRfAi6bjjo7Fyz16n8Fevflw9wND+S1C io15tqgGT/Cnr0VkzLSPTMFVj/uCfdmm8SHhFfzXMXTOWB9ONXo2ZRYeu5iA/na3gqFj bTeJiEnonUiYakSwqcXITRi3si7WstNC6keztY/tR4Na79RBo54cBxKb9H5OQPPrg8sf jbPASaDJYtXNhj0FeUfkBxvFC2cvLvwD2peINKlbgGX90hOFXjvqGc9OlKia5TWoVoSN O1LA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dmt2imCF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h10si371352ejf.487.2020.05.26.12.23.52; Tue, 26 May 2020 12:24:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dmt2imCF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392544AbgEZTU7 (ORCPT + 99 others); Tue, 26 May 2020 15:20:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:41706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404116AbgEZTMM (ORCPT ); Tue, 26 May 2020 15:12:12 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 01ED220776; Tue, 26 May 2020 19:12:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590520331; bh=DJ+RkNvt0Js/EBh4v/QVhJIKEDFFoh4tGKhMbLz5ypE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dmt2imCFXPZ/v0Iovelx0rSvD1AKzCi812BSUAAJaYhcbDJMtfctd7y+Fuykgr3oF hC3j2MLyy+m3rxN868W6C/pgpi4gpP0YpGI0DCsns9hRdCGDTN1iBE90NeOs2jTkeh rIpj9i6azh9cQMtjPR39lhfeqCXt3mWjAy00Psa4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juliet Kim , "David S. Miller" , Sasha Levin Subject: [PATCH 5.6 038/126] ibmvnic: Skip fatal error reset after passive init Date: Tue, 26 May 2020 20:52:55 +0200 Message-Id: <20200526183941.130962874@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183937.471379031@linuxfoundation.org> References: <20200526183937.471379031@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Juliet Kim [ Upstream commit f9c6cea0b38518741c8dcf26ac056d26ee2fd61d ] During MTU change, the following events may happen. Client-driven CRQ initialization fails due to partner’s CRQ closed, causing client to enqueue a reset task for FATAL_ERROR. Then passive (server-driven) CRQ initialization succeeds, causing client to release CRQ and enqueue a reset task for failover. If the passive CRQ initialization occurs before the FATAL reset task is processed, the FATAL error reset task would try to access a CRQ message queue that was freed, causing an oops. The problem may be most likely to occur during DLPAR add vNIC with a non-default MTU, because the DLPAR process will automatically issue a change MTU request. Fix this by not processing fatal error reset if CRQ is passively initialized after client-driven CRQ initialization fails. Signed-off-by: Juliet Kim Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/ibm/ibmvnic.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ibm/ibmvnic.c b/drivers/net/ethernet/ibm/ibmvnic.c index 4bd33245bad6..3de549c6c693 100644 --- a/drivers/net/ethernet/ibm/ibmvnic.c +++ b/drivers/net/ethernet/ibm/ibmvnic.c @@ -2189,7 +2189,8 @@ static void __ibmvnic_reset(struct work_struct *work) rc = do_hard_reset(adapter, rwi, reset_state); rtnl_unlock(); } - } else { + } else if (!(rwi->reset_reason == VNIC_RESET_FATAL && + adapter->from_passive_init)) { rc = do_reset(adapter, rwi, reset_state); } kfree(rwi); -- 2.25.1