Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1970503ybh; Tue, 14 Jul 2020 11:58:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWIRPK+9n2xupDIcUXi1e5h0r44xaAh3od2oNVn/tlQ2kpXWJ594CT9A6OQ/D+ugUY99qv X-Received: by 2002:a50:d80f:: with SMTP id o15mr6110176edj.156.1594753087494; Tue, 14 Jul 2020 11:58:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594753087; cv=none; d=google.com; s=arc-20160816; b=GD4qwCFAUWoFCruD+CbzWhUZZCj5xjB6EjpFmFHvT5se5VBSc8soEQWfZlLAwSAi7w Q8TNQf3d1FzE1uIuqgGa8mUZK2Hz+Sp8Jepv3tcafzvg6Im/ytIDAV+O0JAT83a72u/k 3jmq2pjZGXPuFQeuavMU8mNO5KfIsGby2cXZGvRejJ045KvmBZMVwVeJuavAkQM6Xe7I 2OhBTu36H/H3T4cMUB2NR3geDLfk5t73VhJEWVonkCpwIi0yFBPz83mC38rQdEL8s7Wp 8KLpnUXB8tegTz2gd2qRxWHbPUrmdHeAWNIWOVociuZp3VmeAiX1mqSlckqdAGmRiuo9 EQew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=N96iJNzTxhtKpWrcCPTWlYNanAM7ok5BKMjCndCRYBc=; b=uCG/OqcAZbP1d51D5pIKIX2CtDry88gy+mPU+wL7+J210dxJLLNgHhIaSlu5Jwh/up LSgG3pF1Z9U4ZN41hrZFMco+JcKVaGFJ/yJ9vSbu/47P2tyXq+1aGLDeLId42tdzkQmz II1+q8AO+4rqTtbaVExJOaXcOGiFZDtpKaRokk3zkFLZGhEUHsb3KbpUvlKknSTXo/7i BoiP/D4pAeQM/kXaNuLiY5F+sA/4Bcopz7kUvDvtSAQ+D48VhMVxpSzmGcQ1M5JFzQcb s3jqT5VFXuLyxXmtSY20JlFUotg2UCJ6IVqXfipIvZD0A9Uf8ePCS5c0BWskvjRviJId fm4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gdU7jIUJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 91si13982404edy.467.2020.07.14.11.57.44; Tue, 14 Jul 2020 11:58:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gdU7jIUJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729623AbgGNSye (ORCPT + 99 others); Tue, 14 Jul 2020 14:54:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:51958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730092AbgGNSya (ORCPT ); Tue, 14 Jul 2020 14:54:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E8C122BEB; Tue, 14 Jul 2020 18:54:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594752869; bh=V6Pmu3m83SA+fn0VRBHhHKrR+JTh1Ner59R44FVUyEw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gdU7jIUJVFBQj1Nhdl2UVfgF0/7G57Xbptkhznoi2oYu8MZelNwvuol3CoposbZ4n dW+1ZnQG3NnvK63tsoc+TluueEEqCCxn4PNIuMY+ojzgF19RItr6UShfIz19ebw8Zn SR4HKsZRVdoNpyVXfSYasY+RMEULEvfhfHZp1u5k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ciara Loftus , Andrew Bowers , Jeff Kirsher , Sasha Levin Subject: [PATCH 5.7 024/166] ice: protect ring accesses with WRITE_ONCE Date: Tue, 14 Jul 2020 20:43:09 +0200 Message-Id: <20200714184117.038430264@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714184115.844176932@linuxfoundation.org> References: <20200714184115.844176932@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ciara Loftus [ Upstream commit b1d95cc2391ffac0c5b27256a4fb0d2cfb021a29 ] The READ_ONCE macro is used when reading rings prior to accessing the statistics pointer. The corresponding WRITE_ONCE usage when allocating and freeing the rings to ensure protected access was not in place. Introduce this. Signed-off-by: Ciara Loftus Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/ice/ice_lib.c | 8 ++++---- drivers/net/ethernet/intel/ice/ice_main.c | 2 +- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_lib.c b/drivers/net/ethernet/intel/ice/ice_lib.c index 2f256bf45efcf..6dd839b325259 100644 --- a/drivers/net/ethernet/intel/ice/ice_lib.c +++ b/drivers/net/ethernet/intel/ice/ice_lib.c @@ -1063,7 +1063,7 @@ static void ice_vsi_clear_rings(struct ice_vsi *vsi) for (i = 0; i < vsi->alloc_txq; i++) { if (vsi->tx_rings[i]) { kfree_rcu(vsi->tx_rings[i], rcu); - vsi->tx_rings[i] = NULL; + WRITE_ONCE(vsi->tx_rings[i], NULL); } } } @@ -1071,7 +1071,7 @@ static void ice_vsi_clear_rings(struct ice_vsi *vsi) for (i = 0; i < vsi->alloc_rxq; i++) { if (vsi->rx_rings[i]) { kfree_rcu(vsi->rx_rings[i], rcu); - vsi->rx_rings[i] = NULL; + WRITE_ONCE(vsi->rx_rings[i], NULL); } } } @@ -1104,7 +1104,7 @@ static int ice_vsi_alloc_rings(struct ice_vsi *vsi) ring->vsi = vsi; ring->dev = dev; ring->count = vsi->num_tx_desc; - vsi->tx_rings[i] = ring; + WRITE_ONCE(vsi->tx_rings[i], ring); } /* Allocate Rx rings */ @@ -1123,7 +1123,7 @@ static int ice_vsi_alloc_rings(struct ice_vsi *vsi) ring->netdev = vsi->netdev; ring->dev = dev; ring->count = vsi->num_rx_desc; - vsi->rx_rings[i] = ring; + WRITE_ONCE(vsi->rx_rings[i], ring); } return 0; diff --git a/drivers/net/ethernet/intel/ice/ice_main.c b/drivers/net/ethernet/intel/ice/ice_main.c index 69e50331e08e9..7fd2ec63f128e 100644 --- a/drivers/net/ethernet/intel/ice/ice_main.c +++ b/drivers/net/ethernet/intel/ice/ice_main.c @@ -1701,7 +1701,7 @@ static int ice_xdp_alloc_setup_rings(struct ice_vsi *vsi) xdp_ring->netdev = NULL; xdp_ring->dev = dev; xdp_ring->count = vsi->num_tx_desc; - vsi->xdp_rings[i] = xdp_ring; + WRITE_ONCE(vsi->xdp_rings[i], xdp_ring); if (ice_setup_tx_ring(xdp_ring)) goto free_xdp_rings; ice_set_ring_xdp(xdp_ring); -- 2.25.1