From patchwork Mon Mar 20 11:23:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michal Swiatkowski X-Patchwork-Id: 13181068 X-Patchwork-Delegate: kuba@kernel.org Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5E42EC7618A for ; Mon, 20 Mar 2023 11:41:42 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229524AbjCTLlk (ORCPT ); Mon, 20 Mar 2023 07:41:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229882AbjCTLlj (ORCPT ); Mon, 20 Mar 2023 07:41:39 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9D404359D for ; Mon, 20 Mar 2023 04:41:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1679312497; x=1710848497; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=DebyBgUfT2FAUA4khxwAu+nktCCVYzyTLlBJzKOToIw=; b=L6XJlsqelanh1TCFntBmbAZPybXUw3+Fji7auUl3+ieO17FOYw1U6Vim fkeNbhiAHJLaV4y1PssRMheEmT6r4bNxEVkQj5ZmzCi+qQzxZvellUBAF jT5lNQ1i/z5Bb680Vqgy9F1DBNPDchycxI8nY1h1wW9SD2sYq/Ofhi5HC yQbKXv4nxl045qP/jnqDVQ8l0ShStWZBYsTtPnMeFprbOuEftcserCKod cR2w+u99puH+5up+oYcaZYlLMynoKH9xKwx1lqt4h02y5IOFHdXzZwleg oHX16EGuUNrhD/8KFPnJyYYpkXyY4hqhJxgs2+9BZkr6LuOCLo3TxOcks Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10654"; a="338663929" X-IronPort-AV: E=Sophos;i="5.98,274,1673942400"; d="scan'208";a="338663929" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Mar 2023 04:41:37 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10654"; a="770169168" X-IronPort-AV: E=Sophos;i="5.98,274,1673942400"; d="scan'208";a="770169168" Received: from wasp.igk.intel.com ([10.102.20.192]) by FMSMGA003.fm.intel.com with ESMTP; 20 Mar 2023 04:41:36 -0700 From: Michal Swiatkowski To: intel-wired-lan@lists.osuosl.org Cc: netdev@vger.kernel.org, piotr.raczynski@intel.com, Michal Swiatkowski , Mateusz Palczewski Subject: [PATCH net v2] ice: clear number of qs when rings are free Date: Mon, 20 Mar 2023 12:23:47 +0100 Message-Id: <20230320112347.117363-1-michal.swiatkowski@linux.intel.com> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org In case rebuild fails not clearing this field can lead to call trace. [ +0.009792] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ +0.000009] #PF: supervisor read access in kernel mode [ +0.000006] #PF: error_code(0x0000) - not-present page [ +0.000005] PGD 0 P4D 0 [ +0.000009] Oops: 0000 [#1] PREEMPT SMP PTI [ +0.000009] CPU: 45 PID: 77867 Comm: ice-ptp-0000:60 Kdump: loaded Tainted: G S OE 6.2.0-rc6+ #110 [ +0.000010] Hardware name: Dell Inc. PowerEdge R740/0JMK61, BIOS 2.11.2 004/21/2021 [ +0.000005] RIP: 0010:ice_ptp_update_cached_phctime+0xb0/0x130 [ice] [ +0.000145] Code: fa 7e 55 48 8b 93 48 01 00 00 48 8b 0c fa 48 85 c9 74 e1 8b 51 68 85 d2 75 da 66 83 b9 86 04 00 00 00 74 d0 31 d2 48 8b 71 20 <48> 8b 34 d6 48 85 f6 74 07 48 89 86 d8 00 00 00 0f b7 b1 86 04 00 [ +0.000008] RSP: 0018:ffffa036cf7c7ea8 EFLAGS: 00010246 [ +0.000008] RAX: 174ab1a8ab400f43 RBX: ffff937cda2c01a0 RCX: ffff937cdca9b028 [ +0.000005] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ +0.000005] RBP: ffffa036cf7c7eb8 R08: 0000000000000000 R09: 0000000000000000 [ +0.000005] R10: 0000000000000080 R11: 0000000000000001 R12: ffff937cdc971f40 [ +0.000006] R13: ffff937cdc971f44 R14: 0000000000000001 R15: ffffffffc13f3210 [ +0.000005] FS: 0000000000000000(0000) GS:ffff93826f980000(0000) knlGS:0000000000000000 [ +0.000006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000006] CR2: 0000000000000000 CR3: 00000004b7310002 CR4: 00000000007726e0 [ +0.000006] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ +0.000004] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ +0.000005] PKRU: 55555554 [ +0.000004] Call Trace: [ +0.000004] [ +0.000007] ice_ptp_periodic_work+0x2a/0x60 [ice] [ +0.000126] kthread_worker_fn+0xa6/0x250 [ +0.000014] ? __pfx_kthread_worker_fn+0x10/0x10 [ +0.000010] kthread+0xfc/0x130 [ +0.000009] ? __pfx_kthread+0x10/0x10 [ +0.000010] ret_from_fork+0x29/0x50 ice_ptp_update_cached_phctime() is calling ice_for_each_rxq macro, in case of rebuild fail the rx_ring is NULL and there is NULL pointer dereference. Also for future safety it is better to clear the size values for tx and rx ring when they are cleared. Fixes: 6624e780a577 ("ice: split ice_vsi_setup into smaller functions") Reported-by: Mateusz Palczewski Signed-off-by: Michal Swiatkowski Reviewed-by: Leon Romanovsky --- v1 --> v2: * change subject to net and add fixes tag --- drivers/net/ethernet/intel/ice/ice_lib.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/ethernet/intel/ice/ice_lib.c b/drivers/net/ethernet/intel/ice/ice_lib.c index 0f52ea38b6f3..b8317001ad34 100644 --- a/drivers/net/ethernet/intel/ice/ice_lib.c +++ b/drivers/net/ethernet/intel/ice/ice_lib.c @@ -330,10 +330,12 @@ static void ice_vsi_free_arrays(struct ice_vsi *vsi) vsi->q_vectors = NULL; } if (vsi->tx_rings) { + vsi->num_txq = 0; devm_kfree(dev, vsi->tx_rings); vsi->tx_rings = NULL; } if (vsi->rx_rings) { + vsi->num_rxq = 0; devm_kfree(dev, vsi->rx_rings); vsi->rx_rings = NULL; }