Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp270482img; Mon, 18 Mar 2019 02:45:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzwPK3IdxI5r7vQ8UK6/eNU597mzjSZi5Kc8xqOODKJSK4oYO6l6WpSD7g5ZF4kfqv32K7+ X-Received: by 2002:a17:902:8303:: with SMTP id bd3mr19220088plb.10.1552902331612; Mon, 18 Mar 2019 02:45:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552902331; cv=none; d=google.com; s=arc-20160816; b=ypeOFIDNoNH2LQjwLVV8ssKMnsFgqiCpDgvn2zDoELFyNTYl/p1u0Z8pqgmRppZ1U7 l9aYnkfojmCC8tSz809mGY0xXFAAkpdvBj2Gpp29vo155q4mR0fJKQJCmT5dS1bEV51V V81QDoJUyP4jUPz+2RB0rh+LpK+zqeFZ/oy5VgdSAVJmcnEOU6iZwWMHB3gTWo/5/JA8 fmrgOwXi4EjOYgQ29fU3gfoRpzBx5CZeQkdjrJhudnwR7sY2pazeQ+nFHiBFtVT/6r8e efIHNgZ2yCuNkxqcf+wcVVUqKdyYIgZDGgS9LtB655cubIZ5CHJJAzvqQLr1ofbfIUhb n04Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZsxpR0XUfkpru402Wq9L1JyDFPd1YCxTjzayZizbcns=; b=opltLDBAMDwYYE5uCk5e0+T1EPu9CdYMfs12DyjmsgmXIIlV00lLM9Y2WCL/rKUoEA Gmp0G9zkN8axuDKCYlVXwJbLyC7yUrMPAuOjGKxFMYyDfdBYEsrn0GEPfG7oGJUrsgkT MCcYsDggpmOKsgXAd0bWw33KDy1ZiCMtEUZoAwCRtqQNUplxfVlSY3jFSsFoi1SlB4tf YuTydD1AYQAwvo9pOB59NFcJaU5SjJ4JgZyMQ4+0LYZmSpWKvr/O5K52aZxoKLNxIgHu DV6TdcqwgiDkEW5yZZluHeGT0wc3I7k5rM9k7q7mRyuAJ6rtKqdIaiIz53M2AFklmuEx yN2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bT8qlDiC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x88si136582pfe.188.2019.03.18.02.45.16; Mon, 18 Mar 2019 02:45:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bT8qlDiC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728174AbfCRJoD (ORCPT + 99 others); Mon, 18 Mar 2019 05:44:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:38906 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727722AbfCRJbU (ORCPT ); Mon, 18 Mar 2019 05:31:20 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EACF42087C; Mon, 18 Mar 2019 09:31:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552901479; bh=VxGKjELqylB1CafHCRrZjCUSaDH9kfRY+hF08Yi31vs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bT8qlDiCDOy/dbhP3wOYbo9zbpUeAGFCugH+Dgw98dB4RU01Ms396El9cdw5ZdCc5 t7hVlcQqGuG/fTYAKzuABIZKUhxn3LK70OnRVo8B9LowswHo0qCBLMztLTedleeBte hyfmj/Wivo93zmQQYGwgyvV9CKw+17jHwlVZpkTk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bryan Whitehead , "David S. Miller" Subject: [PATCH 4.20 05/52] lan743x: Fix RX Kernel Panic Date: Mon, 18 Mar 2019 10:24:52 +0100 Message-Id: <20190318083844.043670554@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190318083843.398913295@linuxfoundation.org> References: <20190318083843.398913295@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Bryan Whitehead [ Upstream commit dd9d9f5907bb475f8b1796c47d4ecc7fb9b72136 ] It has been noticed that running the speed test at www.speedtest.net occasionally causes a kernel panic. Investigation revealed that under this test RX buffer allocation sometimes fails and returns NULL. But the lan743x driver did not handle this case. This patch fixes this issue by attempting to allocate a buffer before sending the new rx packet to the OS. If the allocation fails then the new rx packet is dropped and the existing buffer is reused in the DMA ring. Updates for v2: Additional 2 locations where allocation was not checked, has been changed to reuse existing buffer. Fixes: 23f0703c125b ("lan743x: Add main source files for new lan743x driver") Signed-off-by: Bryan Whitehead Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/microchip/lan743x_main.c | 46 ++++++++++++++++++-------- 1 file changed, 32 insertions(+), 14 deletions(-) --- a/drivers/net/ethernet/microchip/lan743x_main.c +++ b/drivers/net/ethernet/microchip/lan743x_main.c @@ -1902,7 +1902,17 @@ static int lan743x_rx_next_index(struct return ((++index) % rx->ring_size); } -static int lan743x_rx_allocate_ring_element(struct lan743x_rx *rx, int index) +static struct sk_buff *lan743x_rx_allocate_skb(struct lan743x_rx *rx) +{ + int length = 0; + + length = (LAN743X_MAX_FRAME_SIZE + ETH_HLEN + 4 + RX_HEAD_PADDING); + return __netdev_alloc_skb(rx->adapter->netdev, + length, GFP_ATOMIC | GFP_DMA); +} + +static int lan743x_rx_init_ring_element(struct lan743x_rx *rx, int index, + struct sk_buff *skb) { struct lan743x_rx_buffer_info *buffer_info; struct lan743x_rx_descriptor *descriptor; @@ -1911,9 +1921,7 @@ static int lan743x_rx_allocate_ring_elem length = (LAN743X_MAX_FRAME_SIZE + ETH_HLEN + 4 + RX_HEAD_PADDING); descriptor = &rx->ring_cpu_ptr[index]; buffer_info = &rx->buffer_info[index]; - buffer_info->skb = __netdev_alloc_skb(rx->adapter->netdev, - length, - GFP_ATOMIC | GFP_DMA); + buffer_info->skb = skb; if (!(buffer_info->skb)) return -ENOMEM; buffer_info->dma_ptr = dma_map_single(&rx->adapter->pdev->dev, @@ -2060,8 +2068,19 @@ static int lan743x_rx_process_packet(str /* packet is available */ if (first_index == last_index) { /* single buffer packet */ + struct sk_buff *new_skb = NULL; int packet_length; + new_skb = lan743x_rx_allocate_skb(rx); + if (!new_skb) { + /* failed to allocate next skb. + * Memory is very low. + * Drop this packet and reuse buffer. + */ + lan743x_rx_reuse_ring_element(rx, first_index); + goto process_extension; + } + buffer_info = &rx->buffer_info[first_index]; skb = buffer_info->skb; descriptor = &rx->ring_cpu_ptr[first_index]; @@ -2081,7 +2100,7 @@ static int lan743x_rx_process_packet(str skb_put(skb, packet_length - 4); skb->protocol = eth_type_trans(skb, rx->adapter->netdev); - lan743x_rx_allocate_ring_element(rx, first_index); + lan743x_rx_init_ring_element(rx, first_index, new_skb); } else { int index = first_index; @@ -2094,26 +2113,23 @@ static int lan743x_rx_process_packet(str if (first_index <= last_index) { while ((index >= first_index) && (index <= last_index)) { - lan743x_rx_release_ring_element(rx, - index); - lan743x_rx_allocate_ring_element(rx, - index); + lan743x_rx_reuse_ring_element(rx, + index); index = lan743x_rx_next_index(rx, index); } } else { while ((index >= first_index) || (index <= last_index)) { - lan743x_rx_release_ring_element(rx, - index); - lan743x_rx_allocate_ring_element(rx, - index); + lan743x_rx_reuse_ring_element(rx, + index); index = lan743x_rx_next_index(rx, index); } } } +process_extension: if (extension_index >= 0) { descriptor = &rx->ring_cpu_ptr[extension_index]; buffer_info = &rx->buffer_info[extension_index]; @@ -2290,7 +2306,9 @@ static int lan743x_rx_ring_init(struct l rx->last_head = 0; for (index = 0; index < rx->ring_size; index++) { - ret = lan743x_rx_allocate_ring_element(rx, index); + struct sk_buff *new_skb = lan743x_rx_allocate_skb(rx); + + ret = lan743x_rx_init_ring_element(rx, index, new_skb); if (ret) goto cleanup; }