Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp1209757rwp; Thu, 13 Jul 2023 07:42:19 -0700 (PDT) X-Google-Smtp-Source: APBJJlF5xmvysRQ7kaVo+c+RkwT5IoRuN5sm8U1UI7cSASNhlJ0G9kQtPHmywkfNF9N+3dLDxdn7 X-Received: by 2002:a2e:2c19:0:b0:2b6:ad79:a4fb with SMTP id s25-20020a2e2c19000000b002b6ad79a4fbmr1600408ljs.1.1689259339618; Thu, 13 Jul 2023 07:42:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689259339; cv=none; d=google.com; s=arc-20160816; b=dB/Pc1UHSUAhuqpXJj/TNSHMyKAWVz53IFSFK0G7v0iINt8uPk9dXC3+fWnxPeD7su dHVG0MWqFWD6J6nB2mLm96ZE/v5nx2cG/CW5Ng2E9uWdPl8tHYHcZ/CKl09OQkXJmd7X T2dZZnN1Yt+BiSBhaxYWFB7plWb6qrULA7mDHG4FbDKxAAt5/Ip5zDfSXxTqg7spVmXu 5YU1XKCR7JL/7X1wb5QPBcuqFYlQmeQtrE5xNQHaUQDhUGKc1lNEdHXhj21umluX533N QZC0kTFbYGWPbbQ8/f5tSxxvrS/+AO73XyrxBoE4C46pdEr1Z4mhALkUiy0pkZFdOKxP Zy0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:to:from:dkim-signature:dkim-signature; bh=0F3IVRfOzkZV04oqAbKVuLpJxEE0JQCptBRjfSogYEU=; fh=qqLaL74Fi3BAM6pTZkKD3n8C9QUfObglVAKORN8lozQ=; b=i3ph07ZTqj0Q8yIKCPMnZDy90V+cfn1y+AwmPggGGNzN7ShaGxgTOHN4tFURY2Slxn tPl89XWPvmRbP+BIf5NMcHn5CcwinQsdTT7r7mqG/RlaVZHeO1WRDxOrtV9bJnzFnWO9 11VxQ23+nziQnBZVpUGo8flSfLJH8dmFPIdXSuNdtWO3XCHgl1SLw6kK6wSSA6fimVcE 7ZF6azrfadJBarhKFxeooiUVxxyhWGA+nYPPzxhlUeECZFLSvd5i4ZhOaf5a+2un6i/d anF78ch63BiZj8wlFIu5wH86zZ5zpqmw0/M0j+WRfSLEFShrYIrvUEQTUdraPfxEQ2gJ Qaow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=k4Iv4+i8; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lh19-20020a170906f8d300b00992d772e984si7139084ejb.184.2023.07.13.07.41.55; Thu, 13 Jul 2023 07:42:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=k4Iv4+i8; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234319AbjGMORP (ORCPT + 99 others); Thu, 13 Jul 2023 10:17:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32774 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233586AbjGMORF (ORCPT ); Thu, 13 Jul 2023 10:17:05 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A8C5273C; Thu, 13 Jul 2023 07:17:04 -0700 (PDT) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 4B9A92215C; Thu, 13 Jul 2023 14:17:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1689257823; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=0F3IVRfOzkZV04oqAbKVuLpJxEE0JQCptBRjfSogYEU=; b=k4Iv4+i8i2pPGKsG6+WpXS4qYs5OaDShVpDg/2SC1skE75pAPVb9lttsOqC53wfpeVhzTa E2gJDAoKff5l0MhE/tvjWXJmJnLEUtJbhgBCDx3j6hEFBkYw7d/DnLo73T+DFb6dAXOz20 rbpkaZvAg7MuHO7VfHjGfChaL6GCxas= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1689257823; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=0F3IVRfOzkZV04oqAbKVuLpJxEE0JQCptBRjfSogYEU=; b=tJXDZNVs+MB1qj2V4LeR4c80hcvRGxpL+bg47FPaMfNqP2MLCrwHh4oeIFHXbhQ3HvAXnB GBJDxm1BXCmw2sBQ== Received: from adalid.arch.suse.de (adalid.arch.suse.de [10.161.8.13]) by relay2.suse.de (Postfix) with ESMTP id 2EAF62C142; Thu, 13 Jul 2023 14:17:03 +0000 (UTC) From: Thomas Bogendoerfer To: Jason Gunthorpe , Leon Romanovsky , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] RDMA/mthca: Fix crash when polling CQ for shared QPs Date: Thu, 13 Jul 2023 16:16:58 +0200 Message-Id: <20230713141658.9426-1-tbogendoerfer@suse.de> X-Mailer: git-send-email 2.35.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 21c2fe94abb2 ("RDMA/mthca: Combine special QP struct with mthca QP") introduced a new struct mthca_sqp which doesn't contain struct mthca_qp any longer. Placing a pointer of this new struct into qptable leads to crashes, because mthca_poll_one() expects a qp pointer. Fix this by putting the correct pointer into qptable. Fixes: 21c2fe94abb2 ("RDMA/mthca: Combine special QP struct with mthca QP") Signed-off-by: Thomas Bogendoerfer --- drivers/infiniband/hw/mthca/mthca_qp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/infiniband/hw/mthca/mthca_qp.c b/drivers/infiniband/hw/mthca/mthca_qp.c index 69bba0ef4a5d..53f43649f7d0 100644 --- a/drivers/infiniband/hw/mthca/mthca_qp.c +++ b/drivers/infiniband/hw/mthca/mthca_qp.c @@ -1393,7 +1393,7 @@ int mthca_alloc_sqp(struct mthca_dev *dev, if (mthca_array_get(&dev->qp_table.qp, mqpn)) err = -EBUSY; else - mthca_array_set(&dev->qp_table.qp, mqpn, qp->sqp); + mthca_array_set(&dev->qp_table.qp, mqpn, qp); spin_unlock_irq(&dev->qp_table.lock); if (err) -- 2.35.3