Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1592046ybv; Thu, 20 Feb 2020 23:54:34 -0800 (PST) X-Google-Smtp-Source: APXvYqyAi5IBy3HCBT9TzR9LBvhO2US170FdofKDtLkGAy5FoEsy/fPWTlePv78PiQRXDAyE8tEQ X-Received: by 2002:a9d:7f11:: with SMTP id j17mr28838139otq.281.1582271674442; Thu, 20 Feb 2020 23:54:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271674; cv=none; d=google.com; s=arc-20160816; b=hiG/TvHlUNKBCRjpRi2HDEw3TCFo1BlmYXrPSpyq+vabW6tYHzDbJu/BU7yc3FZerh YnpIuLjH0b4ySxfqw+zLzdSUmQDq/anv++wA5FUEomDjp0FGbw6y/EI1c4w1wQRsEV5v cO3qRnaGFVq6Q2Q0BSkULkHU+pHpPfe7P0aOivVucHq9KXffgTAe9rZ+Fr6hToh8rGVU kSsAs1TB5eLqOl+tvPYFX22KL45u2kkiYDqgOGc0mLo6eq/WxXWPf5+SDQsTiUvEhuzv OApb02kZs+YcuQa5P7t8Poz9GSw99CWEVmg4baQn1P1OKlGYpOHcD/lr9Oo/jT1dXsDt r+IQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0kVoVKrZXeqToUZBaOkymqNe8KVTMtbxLzY4xbX5OXE=; b=BNk5nsYErQhWoWazqKJSSE0NumMkIN/SukSy5iQP1onAfC5uVpqpE7JM63/oMp95hV rFu4XKTW0UiyK8/pMDfa57rMF07VsTv1i+7DpokKYySTnLcVyC+R5YTbCNHNG7f8+tRm ouce2tparl36/I9T5OpVOLavsXVAEQ0F3/YmAFb7TSnb/g3UEN4n6QQOz2qQBAQBiHr5 LWHMExdD6WrgaOxzvwFC97VSjPZjr1IlGHBEkYxKgEsYlZsRMTpdxUO2XnLh45roJx7/ n0ippegiUb99ECB/z2Zsr3Q386/No2TLrmTsUc3391L+20qPquy58BvSd3CK/TaO9DPe PCyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FNXvGvZm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t11si430550oih.187.2020.02.20.23.54.22; Thu, 20 Feb 2020 23:54:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FNXvGvZm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730162AbgBUHxs (ORCPT + 99 others); Fri, 21 Feb 2020 02:53:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:52178 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730153AbgBUHxq (ORCPT ); Fri, 21 Feb 2020 02:53:46 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8CC0420801; Fri, 21 Feb 2020 07:53:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271626; bh=UsiEZwaNCOzGinm9GY9LYQeSFH9pbbl3cGztO6ANsr0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FNXvGvZmdjPLjC+sCYojhNLTjQv6SZYhzlbMs+rrNkyCAmTaHh7yfiIHP1nWoBHGl G5h4opTvO5AYV0oBGco2qR5HCmi7P8NUj/XrtJ35ZGt1eJM6C/A/hEta9+PmFHKoyH myXTs4vVbvVUxpIWEbgvWIPmHFuKIJNn+MR349ig= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mitch Williams , Andrew Bowers , Jeff Kirsher , Sasha Levin Subject: [PATCH 5.5 199/399] ice: add extra check for null Rx descriptor Date: Fri, 21 Feb 2020 08:38:44 +0100 Message-Id: <20200221072422.152591489@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mitch Williams [ Upstream commit 1f45ebe0d8fbe6178670b663005f38ef8535db5d ] In the case where the hardware gives us a null Rx descriptor, it is theoretically possible that we could call one of our skb-construction functions with no data pointer, which would cause a panic. In real life, this will never happen - we only get null RX descriptors as the final descriptor in a chain of otherwise-valid descriptors. When this happens, the skb will be extant and we'll just call ice_add_rx_frag(), which can deal with empty data buffers. Unfortunately, Coverity does not have intimate knowledge of our hardware, so we must add a check here. Signed-off-by: Mitch Williams Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/ice/ice_txrx.c | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_txrx.c b/drivers/net/ethernet/intel/ice/ice_txrx.c index 2c212f64d99f2..8b2b9e254d28d 100644 --- a/drivers/net/ethernet/intel/ice/ice_txrx.c +++ b/drivers/net/ethernet/intel/ice/ice_txrx.c @@ -1071,13 +1071,16 @@ static int ice_clean_rx_irq(struct ice_ring *rx_ring, int budget) ice_put_rx_buf(rx_ring, rx_buf); continue; construct_skb: - if (skb) + if (skb) { ice_add_rx_frag(rx_ring, rx_buf, skb, size); - else if (ice_ring_uses_build_skb(rx_ring)) - skb = ice_build_skb(rx_ring, rx_buf, &xdp); - else + } else if (likely(xdp.data)) { + if (ice_ring_uses_build_skb(rx_ring)) + skb = ice_build_skb(rx_ring, rx_buf, &xdp); + else + skb = ice_construct_skb(rx_ring, rx_buf, &xdp); + } else { skb = ice_construct_skb(rx_ring, rx_buf, &xdp); - + } /* exit if we failed to retrieve a buffer */ if (!skb) { rx_ring->rx_stats.alloc_buf_failed++; -- 2.20.1