Patch "net/mlx5: Fix IPsec RoCE MPV trace call" has been added to the 6.10-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    net/mlx5: Fix IPsec RoCE MPV trace call

to the 6.10-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     net-mlx5-fix-ipsec-roce-mpv-trace-call.patch
and it can be found in the queue-6.10 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit bfe6b85bdd5c6e3ba5e84f5cd0cafe3387abe1ac
Author: Patrisious Haddad <phaddad@xxxxxxxxxx>
Date:   Thu Aug 15 10:16:11 2024 +0300

    net/mlx5: Fix IPsec RoCE MPV trace call
    
    [ Upstream commit 607e1df7bd47fe91cab85a97f57870a26d066137 ]
    
    Prevent the call trace below from happening, by not allowing IPsec
    creation over a slave, if master device doesn't support IPsec.
    
    WARNING: CPU: 44 PID: 16136 at kernel/locking/rwsem.c:240 down_read+0x75/0x94
    Modules linked in: esp4_offload esp4 act_mirred act_vlan cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa mst_pciconf(OE) nfsv3 nfs_acl nfs lockd grace fscache netfs xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill cuse fuse rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_ipoib iw_cm ib_cm ipmi_ssif intel_rapl_msr intel_rapl_common amd64_edac edac_mce_amd kvm_amd kvm irqbypass crct10dif_pclmul crc32_pclmul mlx5_ib ghash_clmulni_intel sha1_ssse3 dell_smbios ib_uverbs aesni_intel crypto_simd dcdbas wmi_bmof dell_wmi_descriptor cryptd pcspkr ib_core acpi_ipmi sp5100_tco ccp i2c_piix4 ipmi_si ptdma k10temp ipmi_devintf ipmi_msghandler acpi_power_meter acpi_cpufreq ext4 mbcache jbd2 sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect mlx5_core sysimgblt fb_sys_fops cec
     ahci libahci mlxfw drm pci_hyperv_intf libata tg3 sha256_ssse3 tls megaraid_sas i2c_algo_bit psample wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mst_pci]
    CPU: 44 PID: 16136 Comm: kworker/44:3 Kdump: loaded Tainted: GOE 5.15.0-20240509.el8uek.uek7_u3_update_v6.6_ipsec_bf.x86_64 #2
    Hardware name: Dell Inc. PowerEdge R7525/074H08, BIOS 2.0.3 01/15/2021
    Workqueue: events xfrm_state_gc_task
    RIP: 0010:down_read+0x75/0x94
    Code: 00 48 8b 45 08 65 48 8b 14 25 80 fc 01 00 83 e0 02 48 09 d0 48 83 c8 01 48 89 45 08 5d 31 c0 89 c2 89 c6 89 c7 e9 cb 88 3b 00 <0f> 0b 48 8b 45 08 a8 01 74 b2 a8 02 75 ae 48 89 c2 48 83 ca 02 f0
    RSP: 0018:ffffb26387773da8 EFLAGS: 00010282
    RAX: 0000000000000000 RBX: ffffa08b658af900 RCX: 0000000000000001
    RDX: 0000000000000000 RSI: ff886bc5e1366f2f RDI: 0000000000000000
    RBP: ffffa08b658af940 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000000 R12: ffffa0a9bfb31540
    R13: ffffa0a9bfb37900 R14: 0000000000000000 R15: ffffa0a9bfb37905
    FS:  0000000000000000(0000) GS:ffffa0a9bfb00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 000055a45ed814e8 CR3: 000000109038a000 CR4: 0000000000350ee0
    Call Trace:
     <TASK>
     ? show_trace_log_lvl+0x1d6/0x2f9
     ? show_trace_log_lvl+0x1d6/0x2f9
     ? mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]
     ? down_read+0x75/0x94
     ? __warn+0x80/0x113
     ? down_read+0x75/0x94
     ? report_bug+0xa4/0x11d
     ? handle_bug+0x35/0x8b
     ? exc_invalid_op+0x14/0x75
     ? asm_exc_invalid_op+0x16/0x1b
     ? down_read+0x75/0x94
     ? down_read+0xe/0x94
     mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]
     mlx5_ipsec_fs_roce_tx_destroy+0xb1/0x130 [mlx5_core]
     tx_destroy+0x1b/0xc0 [mlx5_core]
     tx_ft_put+0x53/0xc0 [mlx5_core]
     mlx5e_xfrm_free_state+0x45/0x90 [mlx5_core]
     ___xfrm_state_destroy+0x10f/0x1a2
     xfrm_state_gc_task+0x81/0xa9
     process_one_work+0x1f1/0x3c6
     worker_thread+0x53/0x3e4
     ? process_one_work.cold+0x46/0x3c
     kthread+0x127/0x144
     ? set_kthread_struct+0x60/0x52
     ret_from_fork+0x22/0x2d
     </TASK>
    ---[ end trace 5ef7896144d398e1 ]---
    
    Fixes: dfbd229abeee ("net/mlx5: Configure IPsec steering for egress RoCEv2 MPV traffic")
    Reviewed-by: Leon Romanovsky <leonro@xxxxxxxxxx>
    Signed-off-by: Patrisious Haddad <phaddad@xxxxxxxxxx>
    Signed-off-by: Tariq Toukan <tariqt@xxxxxxxxxx>
    Link: https://patch.msgid.link/20240815071611.2211873-5-tariqt@xxxxxxxxxx
    Signed-off-by: Jakub Kicinski <kuba@xxxxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/drivers/net/ethernet/mellanox/mlx5/core/lib/ipsec_fs_roce.c b/drivers/net/ethernet/mellanox/mlx5/core/lib/ipsec_fs_roce.c
index 234cd00f71a1c..b7d4b1a2baf2e 100644
--- a/drivers/net/ethernet/mellanox/mlx5/core/lib/ipsec_fs_roce.c
+++ b/drivers/net/ethernet/mellanox/mlx5/core/lib/ipsec_fs_roce.c
@@ -386,7 +386,8 @@ static int ipsec_fs_roce_tx_mpv_create(struct mlx5_core_dev *mdev,
 		return -EOPNOTSUPP;
 
 	peer_priv = mlx5_devcom_get_next_peer_data(*ipsec_roce->devcom, &tmp);
-	if (!peer_priv) {
+	if (!peer_priv || !peer_priv->ipsec) {
+		mlx5_core_err(mdev, "IPsec not supported on master device\n");
 		err = -EOPNOTSUPP;
 		goto release_peer;
 	}
@@ -455,7 +456,8 @@ static int ipsec_fs_roce_rx_mpv_create(struct mlx5_core_dev *mdev,
 		return -EOPNOTSUPP;
 
 	peer_priv = mlx5_devcom_get_next_peer_data(*ipsec_roce->devcom, &tmp);
-	if (!peer_priv) {
+	if (!peer_priv || !peer_priv->ipsec) {
+		mlx5_core_err(mdev, "IPsec not supported on master device\n");
 		err = -EOPNOTSUPP;
 		goto release_peer;
 	}




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux