Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2643168pxj; Mon, 14 Jun 2021 03:51:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz8L2b2yA/wYQoLfeQ7h9zh5SZZu1Gm0XFgCs8J6G7noYeyCGybMYjQu4E4MBjkmoL+4It2 X-Received: by 2002:aa7:d288:: with SMTP id w8mr16118360edq.276.1623667912217; Mon, 14 Jun 2021 03:51:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623667912; cv=none; d=google.com; s=arc-20160816; b=ulJkGjNKSW01kG3vhbpCxvssolSczfqxd38ehMR/2uVT5tVo5ymqhkcMH+e9bzq761 r6xeSr/sb7q9giqY8zW6KMAJwVAeFiKAVrhUgKm2YNF3hfqX/7zrmaDujLT4HSVIKEC5 GMRfrSrokEK4mQJFmGLjMBzTlAC7Z0Y2/mjLow3pRt4Wodr/JOAEPzLas1po4LMD6m6C YuoupHiA4j3lz2iUiYMFeK0m7G5lWL0LaMjFcaxoMjEb7IPbFjb5YLYhAt4BGOQd02/w jDSn3sRDtSGth/DdeAKAskaqHXEVe5PNqlU4UuQeiE/+DL5CGkAmPf9L1+dhNBxIjcX6 JkRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yWF0bkb67K1ReD8KnVvnMl/FoNzhGoktKmBRHWiC2HA=; b=jWMrPT4lvcdF4BgMc3/rb+BtJAMHfgiuEj44UH2T7LNC6onvTNLNHMfXlXCiVQ6k9H CyrRt6m0A9WX9RuB7mAZUiXB9taQBYETpjStQXCtfkjW5SiTTk6RvT9gfCPCSeG4VaUF f4d8uK1Tvp+gIq43mgbS8rMFs30wuaPCi5HWrOUmpFTZYsVU6dS1NGYrQGWch2cpLzNu enY6CXlowwj/uscNwUyqkHg69Ad0rrt3XBfrWfSgT1/bCMRxJoAJj1pIKgS/uMmjiaKZ 9vP9Quv4RNpVu3ueuPvRFR2WE+z6uOTaXtsd591B3hGLvPnJIwM6pTbLOxE1/kEYtWtz MhPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Tk5tYrZp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bx25si10339659ejc.431.2021.06.14.03.51.29; Mon, 14 Jun 2021 03:51:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Tk5tYrZp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233593AbhFNKwP (ORCPT + 99 others); Mon, 14 Jun 2021 06:52:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:50964 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234382AbhFNKpF (ORCPT ); Mon, 14 Jun 2021 06:45:05 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id DDD1361403; Mon, 14 Jun 2021 10:36:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623666988; bh=flZHxU2lobluVDj8Vavz63zxc+TDyGA9BWMeCmiwlwc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Tk5tYrZpsxri+ebcv5mTyBjA/PpXdgjTWKSCh12HW7koIjgbz652h00kuK8b8Agk3 z6RvFhpo9p0U8qHg2F5kqKfBPT4dzbf5+craR72A2B8I8pUeIgysRD7wn4VCY8AU5Z wEt2RsmkcJrpZUqHaTg2Sz4EhnQ7/OIowcWJXqjM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alaa Hleihel , Leon Romanovsky , Jason Gunthorpe Subject: [PATCH 4.19 55/67] IB/mlx5: Fix initializing CQ fragments buffer Date: Mon, 14 Jun 2021 12:27:38 +0200 Message-Id: <20210614102645.627237471@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210614102643.797691914@linuxfoundation.org> References: <20210614102643.797691914@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alaa Hleihel commit 2ba0aa2feebda680ecfc3c552e867cf4d1b05a3a upstream. The function init_cq_frag_buf() can be called to initialize the current CQ fragments buffer cq->buf, or the temporary cq->resize_buf that is filled during CQ resize operation. However, the offending commit started to use function get_cqe() for getting the CQEs, the issue with this change is that get_cqe() always returns CQEs from cq->buf, which leads us to initialize the wrong buffer, and in case of enlarging the CQ we try to access elements beyond the size of the current cq->buf and eventually hit a kernel panic. [exception RIP: init_cq_frag_buf+103] [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib] [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core] [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt] [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt] [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt] [ffff9f799ddcbec8] kthread at ffffffffa66c5da1 [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd Fix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that takes the correct source buffer as a parameter. Fixes: 388ca8be0037 ("IB/mlx5: Implement fragmented completion queue (CQ)") Link: https://lore.kernel.org/r/90a0e8c924093cfa50a482880ad7e7edb73dc19a.1623309971.git.leonro@nvidia.com Signed-off-by: Alaa Hleihel Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/mlx5/cq.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) --- a/drivers/infiniband/hw/mlx5/cq.c +++ b/drivers/infiniband/hw/mlx5/cq.c @@ -896,15 +896,14 @@ static void destroy_cq_user(struct mlx5_ ib_umem_release(cq->buf.umem); } -static void init_cq_frag_buf(struct mlx5_ib_cq *cq, - struct mlx5_ib_cq_buf *buf) +static void init_cq_frag_buf(struct mlx5_ib_cq_buf *buf) { int i; void *cqe; struct mlx5_cqe64 *cqe64; for (i = 0; i < buf->nent; i++) { - cqe = get_cqe(cq, i); + cqe = mlx5_frag_buf_get_wqe(&buf->fbc, i); cqe64 = buf->cqe_size == 64 ? cqe : cqe + 64; cqe64->op_own = MLX5_CQE_INVALID << 4; } @@ -930,7 +929,7 @@ static int create_cq_kernel(struct mlx5_ if (err) goto err_db; - init_cq_frag_buf(cq, &cq->buf); + init_cq_frag_buf(&cq->buf); *inlen = MLX5_ST_SZ_BYTES(create_cq_in) + MLX5_FLD_SZ_BYTES(create_cq_in, pas[0]) * @@ -1253,7 +1252,7 @@ static int resize_kernel(struct mlx5_ib_ if (err) goto ex; - init_cq_frag_buf(cq, cq->resize_buf); + init_cq_frag_buf(cq->resize_buf); return 0;