Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp4970563rwl; Mon, 3 Apr 2023 12:18:29 -0700 (PDT) X-Google-Smtp-Source: AKy350bQIJQM45aB0Dx8jiHuY+JJpZgiXG3NQPWgpdc2U7AR12V1Kxc5B6/3GDsRQtBBtJcjhqf/ X-Received: by 2002:a17:906:8a41:b0:930:18f5:d016 with SMTP id gx1-20020a1709068a4100b0093018f5d016mr36068214ejc.15.1680549509629; Mon, 03 Apr 2023 12:18:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680549509; cv=none; d=google.com; s=arc-20160816; b=XiaZXEhFzRPT6uyB5D/UztIawzq4tvdAFE0jqOfikL5om172g0yaVeSShEc5VOvGAT sOIHvIg9D5O7OPqsGR3Mb3llgrxA2TDy1qGjnm4WbIsIJVBTSu495r9xCzUS5n6gRww1 gLlxef0lhOMi4pOKEElnBRLPljmTp4VnxZ/gFSeV7hDXzJsxtHDLFHztrERxIxR5B4tf p6MnGAisRxpmphwTHcDctxs2h2CwRzGY0aEedLxqkLJibZe2Z8w4uHRRUeYHojZSm0RY LwWRqL6dGu1Nzc6DyDiHkdA/r1/rWl0jA6NYTQTE4/phl9AFFbFClG6Llyk+2AvTYfDx byLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=64dnArwDE/nX2hyQ9IDtxxU3+sUYPqIFERQVHfqx5Qo=; b=ZbR49/t7zOqnOzvixmZzy8olp5yP+n5VaaKBDGHl750bpP/kMdxpV6pKPhn0zjfUHj ZqUNPD6TPeFk6hdJ4NiFnSICWo4lZBGadBWBnrKNm4rBnZTsPy7VDv8YWE3otNBYFkOH pz7XeK6yYOYgEvdg1h85DX16hbrUhv0su4HTm/DX+kl9RoSgpkkIk2+DeznS4I10JJCU mOFEF7WtniNBJch87GAX1ijEo+Oj2oyic1OSCjre8wz96WIj1LtE8wUiA7saB/Xy3t20 OhH/leDw8HMYBCS7b79mIaygmU9QLUD40kFNJRz7x4GtRmj6vpzexYZGcAFq1Nlsmrju VAEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=lQfv53xC; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y3-20020a170906914300b0091d98c32ad5si7352375ejw.702.2023.04.03.12.18.11; Mon, 03 Apr 2023 12:18:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=lQfv53xC; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233281AbjDCSm6 (ORCPT + 59 others); Mon, 3 Apr 2023 14:42:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50594 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232489AbjDCSmy (ORCPT ); Mon, 3 Apr 2023 14:42:54 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 31C89CD for ; Mon, 3 Apr 2023 11:42:52 -0700 (PDT) Received: from pps.filterd (m0279868.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3339kljQ025797; Mon, 3 Apr 2023 18:42:49 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-type; s=qcppdkim1; bh=64dnArwDE/nX2hyQ9IDtxxU3+sUYPqIFERQVHfqx5Qo=; b=lQfv53xCCZfGDKtj9S/GRTmr6lMf7kJZ3BSoVa/1kC7QzreNGk2vkJ+6MH5v7MqBc7y8 D7xsxQpZQrXfWjfmdI386l/qdco6a7Q8LUkSp/1B5Pgceiv3XzNmTow6DbvGxsZtorep 7eq5NrQTQYF13EZuw3flTm0O4Hj4hmhAsYAopiid+wirxdgc4uiaMokpgelzH4BTOegT nrDN+wg+5/NzsARj+0B+qmnJgxOBd6MFpTGj7fQxBYiB9Gj0WPKsxdMxKTJ0VOpPPNwX aOtdTtO4suf9duRLLVlhStJSL+v/rq4ev2DlvKYCyXaE5BtW3R+S1ZyK2A3KcHaUHBT5 mw== Received: from nalasppmta04.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3pqus59cym-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 03 Apr 2023 18:42:48 +0000 Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA04.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 333IgltS016764 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 3 Apr 2023 18:42:47 GMT Received: from nmaran-linux.qualcomm.com (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.42; Mon, 3 Apr 2023 11:42:45 -0700 From: Nagarajan Maran To: CC: , Harshitha Prem , Nagarajan Maran Subject: [PATCH 1/2] wifi: ath11k: Ignore frags from uninitialized peer in dp. Date: Tue, 4 Apr 2023 00:11:54 +0530 Message-ID: <20230403184155.8670-2-quic_nmaran@quicinc.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230403184155.8670-1-quic_nmaran@quicinc.com> References: <20230403184155.8670-1-quic_nmaran@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: dZeKY9fVqidlbYytsOMw_w6TKKVPRaM0 X-Proofpoint-GUID: dZeKY9fVqidlbYytsOMw_w6TKKVPRaM0 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-04-03_15,2023-04-03_03,2023-02-09_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 lowpriorityscore=0 suspectscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 adultscore=0 impostorscore=0 mlxscore=0 priorityscore=1501 clxscore=1015 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2303200000 definitions=main-2304030143 X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Harshitha Prem When max virtual ap interfaces are configured in all the bands with ACS and hostapd restart is done every 60s, a crash is observed at random times. In this certain scenario, a fragmented packet is received for self peer, for which rx_tid and rx_frags are not initialized in datapath. While handling this fragment, crash is observed as the rx_frag list is uninitialised and when we walk in ath11k_dp_rx_h_sort_frags, skb null leads to exception. To address this, before processing received fragments we check dp_setup_done flag is set to ensure that peer has completed its dp peer setup for fragment queue, else ignore processing the fragments. Call trace: ath11k_dp_process_rx_err+0x550/0x1084 [ath11k] ath11k_dp_service_srng+0x70/0x370 [ath11k] 0xffffffc009693a04 __napi_poll+0x30/0xa4 net_rx_action+0x118/0x270 __do_softirq+0x10c/0x244 irq_exit+0x64/0xb4 __handle_domain_irq+0x88/0xac gic_handle_irq+0x74/0xbc el1_irq+0xf0/0x1c0 arch_cpu_idle+0x10/0x18 do_idle+0x104/0x248 cpu_startup_entry+0x20/0x64 rest_init+0xd0/0xdc arch_call_rest_init+0xc/0x14 start_kernel+0x480/0x4b8 Code: f9400281 f94066a2 91405021 b94a0023 (f9406401) Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1 Signed-off-by: Harshitha Prem Signed-off-by: Nagarajan Maran --- drivers/net/wireless/ath/ath11k/dp.c | 4 +++- drivers/net/wireless/ath/ath11k/dp_rx.c | 8 ++++++++ drivers/net/wireless/ath/ath11k/peer.h | 1 + 3 files changed, 12 insertions(+), 1 deletion(-) diff --git a/drivers/net/wireless/ath/ath11k/dp.c b/drivers/net/wireless/ath/ath11k/dp.c index f5156a7fbdd7..d070bcb3fe24 100644 --- a/drivers/net/wireless/ath/ath11k/dp.c +++ b/drivers/net/wireless/ath/ath11k/dp.c @@ -36,6 +36,7 @@ void ath11k_dp_peer_cleanup(struct ath11k *ar, int vdev_id, const u8 *addr) } ath11k_peer_rx_tid_cleanup(ar, peer); + peer->dp_setup_done = false; crypto_free_shash(peer->tfm_mmic); spin_unlock_bh(&ab->base_lock); } @@ -72,7 +73,8 @@ int ath11k_dp_peer_setup(struct ath11k *ar, int vdev_id, const u8 *addr) ret = ath11k_peer_rx_frag_setup(ar, addr, vdev_id); if (ret) { ath11k_warn(ab, "failed to setup rx defrag context\n"); - return ret; + tid--; + goto peer_clean; } /* TODO: Setup other peer specific resource used in data path */ diff --git a/drivers/net/wireless/ath/ath11k/dp_rx.c b/drivers/net/wireless/ath/ath11k/dp_rx.c index 99859b59138e..2893f6757e3e 100644 --- a/drivers/net/wireless/ath/ath11k/dp_rx.c +++ b/drivers/net/wireless/ath/ath11k/dp_rx.c @@ -3127,6 +3127,7 @@ int ath11k_peer_rx_frag_setup(struct ath11k *ar, const u8 *peer_mac, int vdev_id } peer->tfm_mmic = tfm; + peer->dp_setup_done = true; spin_unlock_bh(&ab->base_lock); return 0; @@ -3572,6 +3573,13 @@ static int ath11k_dp_rx_frag_h_mpdu(struct ath11k *ar, ret = -ENOENT; goto out_unlock; } + if (!peer->dp_setup_done) { + ath11k_warn(ab, "The peer %pM [%d] has uninitialized datapath\n", + peer->addr, peer_id); + ret = -ENOENT; + goto out_unlock; + } + rx_tid = &peer->rx_tid[tid]; if ((!skb_queue_empty(&rx_tid->rx_frags) && seqno != rx_tid->cur_sn) || diff --git a/drivers/net/wireless/ath/ath11k/peer.h b/drivers/net/wireless/ath/ath11k/peer.h index 6dd17bafe3a0..9bd385d0a38c 100644 --- a/drivers/net/wireless/ath/ath11k/peer.h +++ b/drivers/net/wireless/ath/ath11k/peer.h @@ -35,6 +35,7 @@ struct ath11k_peer { u16 sec_type; u16 sec_type_grp; bool is_authorized; + bool dp_setup_done; }; void ath11k_peer_unmap_event(struct ath11k_base *ab, u16 peer_id); -- 2.17.1