diff mbox series

[wireless] wifi: wilc1000: unregister wiphy only if it has been registered

Message ID 20241223-wilc_fix_probe_error_path-v1-1-91fa7bd8e5b6@bootlin.com (mailing list archive)
State Accepted
Commit 1be94490b6b8a06ff14cd23fda8714e6ec37cdfb
Delegated to: Kalle Valo
Headers show
Series [wireless] wifi: wilc1000: unregister wiphy only if it has been registered | expand

Commit Message

Alexis Lothoré (eBPF Foundation) Dec. 23, 2024, 3:46 p.m. UTC
There is a specific error path in probe functions in wilc drivers (both
sdio and spi) which can lead to kernel panic, as this one for example
when using SPI:

Unable to handle kernel paging request at virtual address 9f000000 when read
[9f000000] *pgd=00000000
Internal error: Oops: 5 [#1] ARM
Modules linked in: wilc1000_spi(+) crc_itu_t crc7 wilc1000 cfg80211 bluetooth ecdh_generic ecc
CPU: 0 UID: 0 PID: 106 Comm: modprobe Not tainted 6.13.0-rc3+ #22
Hardware name: Atmel SAMA5
PC is at wiphy_unregister+0x244/0xc40 [cfg80211]
LR is at wiphy_unregister+0x1c0/0xc40 [cfg80211]
[...]
 wiphy_unregister [cfg80211] from wilc_netdev_cleanup+0x380/0x494 [wilc1000]
 wilc_netdev_cleanup [wilc1000] from wilc_bus_probe+0x360/0x834 [wilc1000_spi]
 wilc_bus_probe [wilc1000_spi] from spi_probe+0x15c/0x1d4
 spi_probe from really_probe+0x270/0xb2c
 really_probe from __driver_probe_device+0x1dc/0x4e8
 __driver_probe_device from driver_probe_device+0x5c/0x140
 driver_probe_device from __driver_attach+0x220/0x540
 __driver_attach from bus_for_each_dev+0x13c/0x1a8
 bus_for_each_dev from bus_add_driver+0x2a0/0x6a4
 bus_add_driver from driver_register+0x27c/0x51c
 driver_register from do_one_initcall+0xf8/0x564
 do_one_initcall from do_init_module+0x2e4/0x82c
 do_init_module from load_module+0x59a0/0x70c4
 load_module from init_module_from_file+0x100/0x148
 init_module_from_file from sys_finit_module+0x2fc/0x924
 sys_finit_module from ret_fast_syscall+0x0/0x1c

The issue can easily be reproduced, for example by not wiring correctly
a wilc device through SPI (and so, make it unresponsive to early SPI
commands). It is due to a recent change decoupling wiphy allocation from
wiphy registration, however wilc_netdev_cleanup has not been updated
accordingly, letting it possibly call wiphy unregister on a wiphy which
has never been registered.

Fix this crash by moving wiphy_unregister/wiphy_free out of
wilc_netdev_cleanup, and by adjusting error paths in both drivers

Fixes: fbdf0c5248dc ("wifi: wilc1000: Register wiphy after reading out chipid")
Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com>
---
 drivers/net/wireless/microchip/wilc1000/netdev.c | 2 --
 drivers/net/wireless/microchip/wilc1000/sdio.c   | 9 +++++++--
 drivers/net/wireless/microchip/wilc1000/spi.c    | 9 +++++++--
 3 files changed, 14 insertions(+), 6 deletions(-)


---
base-commit: 96997ddfc7c249dbcb6e248986dc2d56ba29ec8b
change-id: 20241223-wilc_fix_probe_error_path-a64be3a9b39a

Best regards,

Comments

Marek Vasut Dec. 23, 2024, 7:19 p.m. UTC | #1
On 12/23/24 4:46 PM, Alexis Lothoré wrote:
> There is a specific error path in probe functions in wilc drivers (both
> sdio and spi) which can lead to kernel panic, as this one for example
> when using SPI:
> 
> Unable to handle kernel paging request at virtual address 9f000000 when read
> [9f000000] *pgd=00000000
> Internal error: Oops: 5 [#1] ARM
> Modules linked in: wilc1000_spi(+) crc_itu_t crc7 wilc1000 cfg80211 bluetooth ecdh_generic ecc
> CPU: 0 UID: 0 PID: 106 Comm: modprobe Not tainted 6.13.0-rc3+ #22
> Hardware name: Atmel SAMA5
> PC is at wiphy_unregister+0x244/0xc40 [cfg80211]
> LR is at wiphy_unregister+0x1c0/0xc40 [cfg80211]
> [...]
>   wiphy_unregister [cfg80211] from wilc_netdev_cleanup+0x380/0x494 [wilc1000]
>   wilc_netdev_cleanup [wilc1000] from wilc_bus_probe+0x360/0x834 [wilc1000_spi]
>   wilc_bus_probe [wilc1000_spi] from spi_probe+0x15c/0x1d4
>   spi_probe from really_probe+0x270/0xb2c
>   really_probe from __driver_probe_device+0x1dc/0x4e8
>   __driver_probe_device from driver_probe_device+0x5c/0x140
>   driver_probe_device from __driver_attach+0x220/0x540
>   __driver_attach from bus_for_each_dev+0x13c/0x1a8
>   bus_for_each_dev from bus_add_driver+0x2a0/0x6a4
>   bus_add_driver from driver_register+0x27c/0x51c
>   driver_register from do_one_initcall+0xf8/0x564
>   do_one_initcall from do_init_module+0x2e4/0x82c
>   do_init_module from load_module+0x59a0/0x70c4
>   load_module from init_module_from_file+0x100/0x148
>   init_module_from_file from sys_finit_module+0x2fc/0x924
>   sys_finit_module from ret_fast_syscall+0x0/0x1c
> 
> The issue can easily be reproduced, for example by not wiring correctly
> a wilc device through SPI (and so, make it unresponsive to early SPI
> commands). It is due to a recent change decoupling wiphy allocation from
> wiphy registration, however wilc_netdev_cleanup has not been updated
> accordingly, letting it possibly call wiphy unregister on a wiphy which
> has never been registered.
> 
> Fix this crash by moving wiphy_unregister/wiphy_free out of
> wilc_netdev_cleanup, and by adjusting error paths in both drivers
> 
> Fixes: fbdf0c5248dc ("wifi: wilc1000: Register wiphy after reading out chipid")
> Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com>
Nice find, thank you for fixing it.

Reviewed-by: Marek Vasut <marex@denx.de>

Thanks !
Kalle Valo Jan. 7, 2025, 3:22 p.m. UTC | #2
Marek Vasut <marex@denx.de> writes:

> On 12/23/24 4:46 PM, Alexis Lothoré wrote:
>
>> There is a specific error path in probe functions in wilc drivers (both
>> sdio and spi) which can lead to kernel panic, as this one for example
>> when using SPI:
>> Unable to handle kernel paging request at virtual address 9f000000
>> when read
>> [9f000000] *pgd=00000000
>> Internal error: Oops: 5 [#1] ARM
>> Modules linked in: wilc1000_spi(+) crc_itu_t crc7 wilc1000 cfg80211 bluetooth ecdh_generic ecc
>> CPU: 0 UID: 0 PID: 106 Comm: modprobe Not tainted 6.13.0-rc3+ #22
>> Hardware name: Atmel SAMA5
>> PC is at wiphy_unregister+0x244/0xc40 [cfg80211]
>> LR is at wiphy_unregister+0x1c0/0xc40 [cfg80211]
>> [...]
>>   wiphy_unregister [cfg80211] from wilc_netdev_cleanup+0x380/0x494 [wilc1000]
>>   wilc_netdev_cleanup [wilc1000] from wilc_bus_probe+0x360/0x834 [wilc1000_spi]
>>   wilc_bus_probe [wilc1000_spi] from spi_probe+0x15c/0x1d4
>>   spi_probe from really_probe+0x270/0xb2c
>>   really_probe from __driver_probe_device+0x1dc/0x4e8
>>   __driver_probe_device from driver_probe_device+0x5c/0x140
>>   driver_probe_device from __driver_attach+0x220/0x540
>>   __driver_attach from bus_for_each_dev+0x13c/0x1a8
>>   bus_for_each_dev from bus_add_driver+0x2a0/0x6a4
>>   bus_add_driver from driver_register+0x27c/0x51c
>>   driver_register from do_one_initcall+0xf8/0x564
>>   do_one_initcall from do_init_module+0x2e4/0x82c
>>   do_init_module from load_module+0x59a0/0x70c4
>>   load_module from init_module_from_file+0x100/0x148
>>   init_module_from_file from sys_finit_module+0x2fc/0x924
>>   sys_finit_module from ret_fast_syscall+0x0/0x1c
>> The issue can easily be reproduced, for example by not wiring
>> correctly
>> a wilc device through SPI (and so, make it unresponsive to early SPI
>> commands). It is due to a recent change decoupling wiphy allocation from
>> wiphy registration, however wilc_netdev_cleanup has not been updated
>> accordingly, letting it possibly call wiphy unregister on a wiphy which
>> has never been registered.
>> Fix this crash by moving wiphy_unregister/wiphy_free out of
>> wilc_netdev_cleanup, and by adjusting error paths in both drivers
>> Fixes: fbdf0c5248dc ("wifi: wilc1000: Register wiphy after reading
>> out chipid")
>> Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com>
> Nice find, thank you for fixing it.
>
> Reviewed-by: Marek Vasut <marex@denx.de>

We are quite late in the cycle so I think I'll queue this to
wireless-next for v6.14.
Kalle Valo Jan. 10, 2025, 12:49 p.m. UTC | #3
Alexis Lothoré <alexis.lothore@bootlin.com> wrote:

> There is a specific error path in probe functions in wilc drivers (both
> sdio and spi) which can lead to kernel panic, as this one for example
> when using SPI:
> 
> Unable to handle kernel paging request at virtual address 9f000000 when read
> [9f000000] *pgd=00000000
> Internal error: Oops: 5 [#1] ARM
> Modules linked in: wilc1000_spi(+) crc_itu_t crc7 wilc1000 cfg80211 bluetooth ecdh_generic ecc
> CPU: 0 UID: 0 PID: 106 Comm: modprobe Not tainted 6.13.0-rc3+ #22
> Hardware name: Atmel SAMA5
> PC is at wiphy_unregister+0x244/0xc40 [cfg80211]
> LR is at wiphy_unregister+0x1c0/0xc40 [cfg80211]
> [...]
>  wiphy_unregister [cfg80211] from wilc_netdev_cleanup+0x380/0x494 [wilc1000]
>  wilc_netdev_cleanup [wilc1000] from wilc_bus_probe+0x360/0x834 [wilc1000_spi]
>  wilc_bus_probe [wilc1000_spi] from spi_probe+0x15c/0x1d4
>  spi_probe from really_probe+0x270/0xb2c
>  really_probe from __driver_probe_device+0x1dc/0x4e8
>  __driver_probe_device from driver_probe_device+0x5c/0x140
>  driver_probe_device from __driver_attach+0x220/0x540
>  __driver_attach from bus_for_each_dev+0x13c/0x1a8
>  bus_for_each_dev from bus_add_driver+0x2a0/0x6a4
>  bus_add_driver from driver_register+0x27c/0x51c
>  driver_register from do_one_initcall+0xf8/0x564
>  do_one_initcall from do_init_module+0x2e4/0x82c
>  do_init_module from load_module+0x59a0/0x70c4
>  load_module from init_module_from_file+0x100/0x148
>  init_module_from_file from sys_finit_module+0x2fc/0x924
>  sys_finit_module from ret_fast_syscall+0x0/0x1c
> 
> The issue can easily be reproduced, for example by not wiring correctly
> a wilc device through SPI (and so, make it unresponsive to early SPI
> commands). It is due to a recent change decoupling wiphy allocation from
> wiphy registration, however wilc_netdev_cleanup has not been updated
> accordingly, letting it possibly call wiphy unregister on a wiphy which
> has never been registered.
> 
> Fix this crash by moving wiphy_unregister/wiphy_free out of
> wilc_netdev_cleanup, and by adjusting error paths in both drivers
> 
> Fixes: fbdf0c5248dc ("wifi: wilc1000: Register wiphy after reading out chipid")
> Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com>
> Reviewed-by: Marek Vasut <marex@denx.de>

Patch applied to wireless-next.git, thanks.

1be94490b6b8 wifi: wilc1000: unregister wiphy only if it has been registered
diff mbox series

Patch

diff --git a/drivers/net/wireless/microchip/wilc1000/netdev.c b/drivers/net/wireless/microchip/wilc1000/netdev.c
index 7e84fc0fd91188b411863b9de647b6d182c6c187..af298021e05041ba4b16a94c8ee768407a208dfc 100644
--- a/drivers/net/wireless/microchip/wilc1000/netdev.c
+++ b/drivers/net/wireless/microchip/wilc1000/netdev.c
@@ -925,8 +925,6 @@  void wilc_netdev_cleanup(struct wilc *wilc)
 
 	wilc_wlan_cfg_deinit(wilc);
 	wlan_deinit_locks(wilc);
-	wiphy_unregister(wilc->wiphy);
-	wiphy_free(wilc->wiphy);
 }
 EXPORT_SYMBOL_GPL(wilc_netdev_cleanup);
 
diff --git a/drivers/net/wireless/microchip/wilc1000/sdio.c b/drivers/net/wireless/microchip/wilc1000/sdio.c
index 5262c8846c13df28cf65ec8c5ad0ef9d6677c98b..3751e2ee1ca95918b589ba9be032984705fa822a 100644
--- a/drivers/net/wireless/microchip/wilc1000/sdio.c
+++ b/drivers/net/wireless/microchip/wilc1000/sdio.c
@@ -193,7 +193,7 @@  static int wilc_sdio_probe(struct sdio_func *func,
 	ret = wilc_load_mac_from_nv(wilc);
 	if (ret) {
 		pr_err("Can not retrieve MAC address from chip\n");
-		goto dispose_irq;
+		goto unregister_wiphy;
 	}
 
 	wilc_sdio_deinit(wilc);
@@ -202,15 +202,18 @@  static int wilc_sdio_probe(struct sdio_func *func,
 				   NL80211_IFTYPE_STATION, false);
 	if (IS_ERR(vif)) {
 		ret = PTR_ERR(vif);
-		goto dispose_irq;
+		goto unregister_wiphy;
 	}
 
 	dev_info(&func->dev, "Driver Initializing success\n");
 	return 0;
 
+unregister_wiphy:
+	wiphy_unregister(wilc->wiphy);
 dispose_irq:
 	irq_dispose_mapping(wilc->dev_irq_num);
 	wilc_netdev_cleanup(wilc);
+	wiphy_free(wilc->wiphy);
 free:
 	kfree(sdio_priv->cmd53_buf);
 	kfree(sdio_priv);
@@ -222,7 +225,9 @@  static void wilc_sdio_remove(struct sdio_func *func)
 	struct wilc *wilc = sdio_get_drvdata(func);
 	struct wilc_sdio *sdio_priv = wilc->bus_data;
 
+	wiphy_unregister(wilc->wiphy);
 	wilc_netdev_cleanup(wilc);
+	wiphy_free(wilc->wiphy);
 	kfree(sdio_priv->cmd53_buf);
 	kfree(sdio_priv);
 }
diff --git a/drivers/net/wireless/microchip/wilc1000/spi.c b/drivers/net/wireless/microchip/wilc1000/spi.c
index ce2a9cdd6aa7877ed4c2517f9549a00bdc8dc874..31219fd0cfb3fc6df071b3e9be5af17087ccf583 100644
--- a/drivers/net/wireless/microchip/wilc1000/spi.c
+++ b/drivers/net/wireless/microchip/wilc1000/spi.c
@@ -256,7 +256,7 @@  static int wilc_bus_probe(struct spi_device *spi)
 	ret = wilc_load_mac_from_nv(wilc);
 	if (ret) {
 		pr_err("Can not retrieve MAC address from chip\n");
-		goto power_down;
+		goto unregister_wiphy;
 	}
 
 	wilc_wlan_power(wilc, false);
@@ -264,14 +264,17 @@  static int wilc_bus_probe(struct spi_device *spi)
 				   NL80211_IFTYPE_STATION, false);
 	if (IS_ERR(vif)) {
 		ret = PTR_ERR(vif);
-		goto power_down;
+		goto unregister_wiphy;
 	}
 	return 0;
 
+unregister_wiphy:
+	wiphy_unregister(wilc->wiphy);
 power_down:
 	wilc_wlan_power(wilc, false);
 netdev_cleanup:
 	wilc_netdev_cleanup(wilc);
+	wiphy_free(wilc->wiphy);
 free:
 	kfree(spi_priv);
 	return ret;
@@ -282,7 +285,9 @@  static void wilc_bus_remove(struct spi_device *spi)
 	struct wilc *wilc = spi_get_drvdata(spi);
 	struct wilc_spi *spi_priv = wilc->bus_data;
 
+	wiphy_unregister(wilc->wiphy);
 	wilc_netdev_cleanup(wilc);
+	wiphy_free(wilc->wiphy);
 	kfree(spi_priv);
 }