Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1159213rdh; Fri, 24 Nov 2023 06:29:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IHzS+G4oEbL56qdvHY4H+7YDlOMeBkZPTInfC6d040NA/g5ZoUreoF5u70ZbsTuO2KW2LbZ X-Received: by 2002:a05:6820:228c:b0:581:e089:9e5c with SMTP id ck12-20020a056820228c00b00581e0899e5cmr3288210oob.6.1700836194329; Fri, 24 Nov 2023 06:29:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700836194; cv=none; d=google.com; s=arc-20160816; b=QxWJl6kov51/tUnbls9C4Q50Step4Qfq/mI5zvn+OHlhDtx71nJzZlxoJx1Jl2TSn6 O3ykhm4g8tXPTVH3fNRCPjzEGQMVtlD04clwxeA+osOScYoyfecSKnRYIDq3AwMbpOnO W/FEJtgj/e0e29O//xMqLMEMK32enwldFLwLlzM0lo8ImcdqOsj/VpR2W7e0JiDB+Mz6 tbIIcwSNIBSehu4und3Wi/ROX6DeZRIjb+No6GhO2zRnTRRCocG4b7LlMG2A+WfjA9zA Zf9U2EgBqWBNeFqTf+4ZjSYotlf0oLwSEE2u16JHe/9npX/qBVoth1yXlC3dmPK2ccLZ bVjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id :dkim-signature; bh=1+GDZ56cch6chx8Q0eFyp6YcBjnDxD6iAU8M1CHMcoo=; fh=UDwMb7ZLC3ZhbbYz+43HMOBqffFSnggPIlip3Rp7hPg=; b=Ja62M61dRIFemi+xzZ4lbJzLRMfLpIl3RVze9V+dTqrNpcyV936GUvVJUs5Pn9QOfk RnIyfLeUJ10xBrGSz29grk056/exwF9gEDcCJEUbFKDbR+tu7dob5CIn73k27AlYX8YV DWdfPDA7Hzd2KbIdgBoavr+CVk0AlSL9LtSROsZDAI+YMBpSyYYH2bvY0JkgAfkFy2Ap kA442NHjCX5uXmOlay/YJP4z8PXqElSQ0Ewbk5ZiJBmhuSeQM8X9jwOx5R7D79bocz3F caX801o7GMHl5uSB7jrjMWWXfvpFSS9S11w3Etc8C2NbRNNfxawHRVaW6IJ14fFKzzyJ JRVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@126.com header.s=s110527 header.b=gTf2VwWs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=126.com Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id y15-20020a4a9c0f000000b0057bed3bad1fsi1336061ooj.35.2023.11.24.06.29.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 06:29:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@126.com header.s=s110527 header.b=gTf2VwWs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=126.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 9046380B1E49; Fri, 24 Nov 2023 06:29:51 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230104AbjKXO3f (ORCPT + 99 others); Fri, 24 Nov 2023 09:29:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34124 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229742AbjKXO3d (ORCPT ); Fri, 24 Nov 2023 09:29:33 -0500 Received: from m15.mail.126.com (m15.mail.126.com [45.254.50.224]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2EC6E199B; Fri, 24 Nov 2023 06:29:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=126.com; s=s110527; h=Message-ID:Date:MIME-Version:Subject:From: Content-Type; bh=1+GDZ56cch6chx8Q0eFyp6YcBjnDxD6iAU8M1CHMcoo=; b=gTf2VwWsekr/uKsX23ZR9KzF3F63yYz7Q/abazOHmmYLpUrrv3Qs8QcJ9ZoGt8 NPBRemwfukzPjDRmKmd1aJxXgkwyTwent1p77y7M7mcnprsCBvf+6qRQuBgZoAkD r+ScRi9qTwXz8goefsooa8ie9vKE3qyFTURyGqQ+UpEC0= Received: from [172.23.69.7] (unknown [121.32.254.149]) by zwqz-smtp-mta-g1-0 (Coremail) with SMTP id _____wAXnoYts2BlcFQgDA--.21753S2; Fri, 24 Nov 2023 22:29:03 +0800 (CST) Message-ID: <15f80347-e9e9-49f9-bcab-784974856332@126.com> Date: Fri, 24 Nov 2023 22:28:58 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] RDMA/irdma: Avoid free the non-cqp_request scratch To: "Ismail, Mustafa" Cc: "Saleem, Shiraz" , "jgg@ziepe.ca" , "leon@kernel.org" , "linux-rdma@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "Ding, Hui" References: <20231120083122.78532-1-lishifeng1992@126.com> From: Shifeng Li In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-CM-TRANSID: _____wAXnoYts2BlcFQgDA--.21753S2 X-Coremail-Antispam: 1Uf129KBjvJXoW3XF1xJF4kWF1DZw1DZFWxtFb_yoW7Xr1xpr 48Jr12krWFvrW5Kw17C3s8AFyUJr4jyas7JFsFy34ayw1Uuw1YqF18ArW09rnxAr1xJF4x Jr1DXr4vvr1akaDanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x07UceOXUUUUU= X-Originating-IP: [121.32.254.149] X-CM-SenderInfo: xolvxx5ihqwiqzzsqiyswou0bp/1S2mthEyr1pD4TUlwwAAsR X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 24 Nov 2023 06:29:51 -0800 (PST) On 2023/11/22 1:25, Ismail, Mustafa wrote: >> -----Original Message----- >> From: Shifeng Li >> Sent: Monday, November 20, 2023 2:31 AM >> To: Ismail, Mustafa >> Cc: Saleem, Shiraz ; jgg@ziepe.ca; >> leon@kernel.org; linux-rdma@vger.kernel.org; linux-kernel@vger.kernel.org; >> Ding, Hui ; Shifeng Li >> Subject: [PATCH] RDMA/irdma: Avoid free the non-cqp_request scratch >> >> When creating ceq_0 during probing irdma, cqp.sc_cqp will be sent as a >> cqp_request to cqp->sc_cqp.sq_ring. If the request is pending when removing >> the irdma driver or unplugging its aux device, cqp.sc_cqp will be dereferenced >> as wrong struct in irdma_free_pending_cqp_request(). >> >> crash> bt 3669 >> PID: 3669 TASK: ffff88aef892c000 CPU: 28 COMMAND: "kworker/28:0" >> #0 [fffffe0000549e38] crash_nmi_callback at ffffffff810e3a34 >> #1 [fffffe0000549e40] nmi_handle at ffffffff810788b2 >> #2 [fffffe0000549ea0] default_do_nmi at ffffffff8107938f >> #3 [fffffe0000549eb8] do_nmi at ffffffff81079582 >> #4 [fffffe0000549ef0] end_repeat_nmi at ffffffff82e016b4 >> [exception RIP: native_queued_spin_lock_slowpath+1291] >> RIP: ffffffff8127e72b RSP: ffff88aa841ef778 RFLAGS: 00000046 >> RAX: 0000000000000000 RBX: ffff88b01f849700 RCX: ffffffff8127e47e >> RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff83857ec0 >> RBP: ffff88afe3e4efc8 R8: ffffed15fc7c9dfa R9: ffffed15fc7c9dfa >> R10: 0000000000000001 R11: ffffed15fc7c9df9 R12: 0000000000740000 >> R13: ffff88b01f849708 R14: 0000000000000003 R15: ffffed1603f092e1 >> ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0000 >> --- --- >> #5 [ffff88aa841ef778] native_queued_spin_lock_slowpath at ffffffff8127e72b >> #6 [ffff88aa841ef7b0] _raw_spin_lock_irqsave at ffffffff82c22aa4 >> #7 [ffff88aa841ef7c8] __wake_up_common_lock at ffffffff81257363 >> #8 [ffff88aa841ef888] irdma_free_pending_cqp_request at ffffffffa0ba12cc >> [irdma] >> #9 [ffff88aa841ef958] irdma_cleanup_pending_cqp_op at ffffffffa0ba1469 >> [irdma] >> #10 [ffff88aa841ef9c0] irdma_ctrl_deinit_hw at ffffffffa0b2989f [irdma] >> #11 [ffff88aa841efa28] irdma_remove at ffffffffa0b252df [irdma] >> #12 [ffff88aa841efae8] auxiliary_bus_remove at ffffffff8219afdb >> #13 [ffff88aa841efb00] device_release_driver_internal at ffffffff821882e6 >> #14 [ffff88aa841efb38] bus_remove_device at ffffffff82184278 >> #15 [ffff88aa841efb88] device_del at ffffffff82179d23 >> #16 [ffff88aa841efc48] ice_unplug_aux_dev at ffffffffa0eb1c14 [ice] >> #17 [ffff88aa841efc68] ice_service_task at ffffffffa0d88201 [ice] >> #18 [ffff88aa841efde8] process_one_work at ffffffff811c589a >> #19 [ffff88aa841efe60] worker_thread at ffffffff811c71ff >> #20 [ffff88aa841eff10] kthread at ffffffff811d87a0 >> #21 [ffff88aa841eff50] ret_from_fork at ffffffff82e0022f >> >> Fixes: 44d9e52977a1 ("RDMA/irdma: Implement device initialization >> definitions") >> Signed-off-by: Shifeng Li >> --- >> drivers/infiniband/hw/irdma/utils.c | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/drivers/infiniband/hw/irdma/utils.c >> b/drivers/infiniband/hw/irdma/utils.c >> index 445e69e86409..222ec1f761a1 100644 >> --- a/drivers/infiniband/hw/irdma/utils.c >> +++ b/drivers/infiniband/hw/irdma/utils.c >> @@ -541,7 +541,7 @@ void irdma_cleanup_pending_cqp_op(struct >> irdma_pci_f *rf) >> for (i = 0; i < pending_work; i++) { >> cqp_request = (struct irdma_cqp_request *)(unsigned long) >> cqp->scratch_array[wqe_idx]; >> - if (cqp_request) >> + if (cqp_request && cqp_request != (struct irdma_cqp_request >> +*)&cqp->sc_cqp) >> irdma_free_pending_cqp_request(cqp, cqp_request); >> wqe_idx = (wqe_idx + 1) % IRDMA_RING_SIZE(cqp- >>> sc_cqp.sq_ring); >> } >> -- >> 2.25.1 > > Hi Li, > > Could you describe how you hit this issue? It seems like the probe would not have completed successfully if the create cceq request was still pending. > > A better fix might be to set the scratch to 0 in this case: In irdma_create_ceq(), pass 0 for scratch in call to irdma_sc_cceq_create(&iwceq->sc_ceq, 0), since it doesn't appear to be used in this case. Is it possible to test this fix? Thanks! 1. The firmware of net card or the hardware may enter into some kind of error state. And I observed that the sq_ring of sc_cqp is full through crash. This means that all the 2048 cqp_requests were pending. crash> struct irdma_cqp.sc_cqp ffff88afe3e4eee8 sc_cqp = { ... sq_ring = { head = 91, (The queue head caught up with the queue tail.) tail = 92, size = 2048 }, ... } 2. The issue is not reproducible. But I have tested the solution that pass 0 for scratch in call to irdma_sc_cceq_create(&iwceq->sc_ceq, 0) in irdma_create_ceq(). It works well. Thanks!