Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1235329ybi; Wed, 19 Jun 2019 16:25:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqzXaiQ1YC0iHE8CU5sKfKBwz6vmhF4lLRTVHp7sDiW/ulSS+j39d6YFl601tlSHTY4lc1CH X-Received: by 2002:a65:56c5:: with SMTP id w5mr9904016pgs.434.1560986725742; Wed, 19 Jun 2019 16:25:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560986725; cv=none; d=google.com; s=arc-20160816; b=yqBSdOH0U3daySXK0attZ59JB3T8EeXR/UdVIOsnykohpPgHaeLVAFXfbn1hBYNkR7 ZwwdH4Udpd4C1st8nMJIKOscZ4aJHfs8Muc/kcLgNrIKLj49lbAewvcGwCp1FmJXLqfD WezOMWWTnK+Qo1t/pdlKbRZnpUOr16PzifqDWuvxH/yQKV2YkgKNOKooS3tytuAS2cN8 B/7F01jGSCfgy/7ajD6eNLbHPT/yyC27sbvrTV0q2MFaVqsUeWQOYI3KMSMi064H0u1E meH4R3kJE2ey66dXIhy8NajsuRR4sey/GJP8luB9qCRbPzQgdzpWA+JDWlVAHFBG6a3z Zk7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :dlp-reaction:dlp-version:dlp-product:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:to:from; bh=YCBtc9dgWzOeg9f9WiYZUs8n6BEu9aoWa3Gnfyh7uVg=; b=tz1EUGg76wg/zU6wOqc1YMVKissNCP3LqSr4TcdglfI08opMTB1pfVVfGsOUM1Id01 5PKcwY2vwwCJb4a6grk24zJR59yYc4PCbHhMAOlGYVOLZZcOvDhfEtustS3hsJIEEXyo tz95s0TNFwnOVwWC5cP0MGum5OqqhHYu7SGXD85+o5+3K/xaM0/TXWbPbC1J+ZxJsb7m CPOB7KS69HIchJ2m0k9U2PBu5zhFFTzOjPyhbS1slcpydcTT8c7x4+GI/Ala7Kb6RBHt FwUaH3+GaQpj5GAJODMot0y6VAJ86ayxHaklyzyqPOjZkvevGTY1Bv1ikPxUFRSp1VRE Jhkg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y6si4093650pgp.222.2019.06.19.16.25.08; Wed, 19 Jun 2019 16:25:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730611AbfFSXZE convert rfc822-to-8bit (ORCPT + 99 others); Wed, 19 Jun 2019 19:25:04 -0400 Received: from mga05.intel.com ([192.55.52.43]:52805 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726251AbfFSXZE (ORCPT ); Wed, 19 Jun 2019 19:25:04 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jun 2019 16:25:03 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,394,1557212400"; d="scan'208";a="358347851" Received: from orsmsx105.amr.corp.intel.com ([10.22.225.132]) by fmsmga005.fm.intel.com with ESMTP; 19 Jun 2019 16:25:03 -0700 Received: from orsmsx104.amr.corp.intel.com ([169.254.4.70]) by ORSMSX105.amr.corp.intel.com ([169.254.2.207]) with mapi id 14.03.0439.000; Wed, 19 Jun 2019 16:25:03 -0700 From: "Bowers, AndrewX" To: "netdev@vger.kernel.org" , "intel-wired-lan@lists.osuosl.org" , "linux-kernel@vger.kernel.org" Subject: RE: [Intel-wired-lan] [PATCH] ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw Thread-Topic: [Intel-wired-lan] [PATCH] ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw Thread-Index: AQHVEPVK2teFE49vDEOaYdpdm/c7lqajymiQ Date: Wed, 19 Jun 2019 23:25:02 +0000 Message-ID: <26D9FDECA4FBDD4AADA65D8E2FC68A4A1D3F8D78@ORSMSX104.amr.corp.intel.com> References: <20190522232258.10353-1-dann.frazier@canonical.com> In-Reply-To: <20190522232258.10353-1-dann.frazier@canonical.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiMmU1Zjc0YTQtZGI5MS00Y2M4LTlhZmEtMWJlNTc1NjJlNDhiIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoieGNhOFwvaTUwZDZjOUE1TVJ6cE5WZG1tVFRrbEtEQWhXQ2Y5cGZ6aEFjMno2a1BORDZuMzVDcDJEbmFkYmFzSWYifQ== x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.0.400.15 dlp-reaction: no-action x-originating-ip: [10.22.254.138] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > -----Original Message----- > From: Intel-wired-lan [mailto:intel-wired-lan-bounces@osuosl.org] On > Behalf Of dann frazier > Sent: Wednesday, May 22, 2019 4:23 PM > To: Kirsher, Jeffrey T ; David S. Miller > ; Shannon Nelson > Cc: netdev@vger.kernel.org; intel-wired-lan@lists.osuosl.org; linux- > kernel@vger.kernel.org > Subject: [Intel-wired-lan] [PATCH] ixgbe: Avoid NULL pointer dereference > with VF on non-IPsec hw > > An ipsec structure will not be allocated if the hardware does not support > offload. Fixes the following Oops: > > [ 191.045452] Unable to handle kernel NULL pointer dereference at virtual > address 0000000000000000 [ 191.054232] Mem abort info: > [ 191.057014] ESR = 0x96000004 > [ 191.060057] Exception class = DABT (current EL), IL = 32 bits > [ 191.065963] SET = 0, FnV = 0 > [ 191.069004] EA = 0, S1PTW = 0 > [ 191.072132] Data abort info: > [ 191.074999] ISV = 0, ISS = 0x00000004 > [ 191.078822] CM = 0, WnR = 0 > [ 191.081780] user pgtable: 4k pages, 48-bit VAs, pgdp = 0000000043d9e467 [ > 191.088382] [0000000000000000] pgd=0000000000000000 [ 191.093252] > Internal error: Oops: 96000004 [#1] SMP [ 191.098119] Modules linked in: > vhost_net vhost tap vfio_pci vfio_virqfd vfio_iommu_type1 vfio > xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat_ipv4 > nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 > ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc ebtable_filter devlink > ebtables ip6table_filter ip6_tables iptable_filter bpfilter ipmi_ssif > nls_iso8859_1 input_leds joydev ipmi_si hns_roce_hw_v2 ipmi_devintf > hns_roce ipmi_msghandler cppc_cpufreq sch_fq_codel ib_iser rdma_cm > iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi > ip_tables x_tables autofs4 ses enclosure btrfs zstd_compress raid10 raid456 > async_raid6_recov async_memcpy async_pq async_xor async_tx xor > hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear ixgbevf > hibmc_drm ttm [ 191.168607] drm_kms_helper aes_ce_blk aes_ce_cipher > syscopyarea crct10dif_ce sysfillrect ghash_ce qla2xxx sysimgblt sha2_ce > sha256_arm64 hisi_sas_v3_hw fb_sys_fops sha1_ce uas nvme_fc mpt3sas > ixgbe drm hisi_sas_main nvme_fabrics usb_storage hclge scsi_transport_fc > ahci libsas hnae3 raid_class libahci xfrm_algo scsi_transport_sas mdio > aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64 [ 191.202952] > CPU: 94 PID: 0 Comm: swapper/94 Not tainted 4.19.0-rc1+ #11 [ 191.209553] > Hardware name: Huawei D06 /D06, BIOS Hisilicon D06 UEFI RC0 - V1.20.01 > 04/26/2019 [ 191.218064] pstate: 20400089 (nzCv daIf +PAN -UAO) [ > 191.222873] pc : ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe] [ 191.228093] lr : > ixgbe_msg_task+0x2d0/0x1088 [ixgbe] [ 191.233044] sp : ffff000009b3bcd0 [ > 191.236346] x29: ffff000009b3bcd0 x28: 0000000000000000 [ 191.241647] x27: > ffff000009628000 x26: 0000000000000000 [ 191.246946] x25: ffff803f652d7600 > x24: 0000000000000004 [ 191.252246] x23: ffff803f6a718900 x22: > 0000000000000000 [ 191.257546] x21: 0000000000000000 x20: > 0000000000000000 [ 191.262845] x19: 0000000000000000 x18: > 0000000000000000 [ 191.268144] x17: 0000000000000000 x16: > 0000000000000000 [ 191.273443] x15: 0000000000000000 x14: > 0000000100000026 [ 191.278742] x13: 0000000100000025 x12: > ffff8a5f7fbe0df0 [ 191.284042] x11: 000000010000000b x10: > 0000000000000040 [ 191.289341] x9 : 0000000000001100 x8 : ffff803f6a824fd8 > [ 191.294640] x7 : ffff803f6a825098 x6 : 0000000000000001 [ 191.299939] x5 : > ffff000000f0ffc0 x4 : 0000000000000000 [ 191.305238] x3 : ffff000028c00000 x2 > : ffff803f652d7600 [ 191.310538] x1 : 0000000000000000 x0 : ffff000000f205f0 [ > 191.315838] Process swapper/94 (pid: 0, stack limit = 0x00000000addfed5a) [ > 191.322613] Call trace: > [ 191.325055] ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe] [ 191.329927] > ixgbe_msg_task+0x2d0/0x1088 [ixgbe] [ 191.334536] > ixgbe_msix_other+0x274/0x330 [ixgbe] [ 191.339233] > __handle_irq_event_percpu+0x78/0x270 > [ 191.343924] handle_irq_event_percpu+0x40/0x98 [ 191.348355] > handle_irq_event+0x50/0xa8 [ 191.352180] handle_fasteoi_irq+0xbc/0x148 > [ 191.356263] generic_handle_irq+0x34/0x50 [ 191.360259] > __handle_domain_irq+0x68/0xc0 [ 191.364343] gic_handle_irq+0x84/0x180 > [ 191.368079] el1_irq+0xe8/0x180 [ 191.371208] arch_cpu_idle+0x30/0x1a8 > [ 191.374860] do_idle+0x1dc/0x2a0 [ 191.378077] > cpu_startup_entry+0x2c/0x30 [ 191.381988] > secondary_start_kernel+0x150/0x1e0 > [ 191.386506] Code: 6b15003f 54000320 f1404a9f 54000060 (79400260) > > Fixes: eda0333ac2930 ("ixgbe: add VF IPsec management") > Signed-off-by: dann frazier > --- > drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c | 3 +++ > 1 file changed, 3 insertions(+) Tested-by: Andrew Bowers