Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp5162920rwb; Tue, 8 Aug 2023 22:45:40 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGbtdh+h0sPUqZUgyoftSDkz76g2wTvomjMN0Z5QvXJB6LSEgtlHaeV0HdTgAngDarNgPTh X-Received: by 2002:aa7:c392:0:b0:523:3f4f:dcd4 with SMTP id k18-20020aa7c392000000b005233f4fdcd4mr2084583edq.16.1691559940329; Tue, 08 Aug 2023 22:45:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691559940; cv=none; d=google.com; s=arc-20160816; b=a1SV0GUMmyjYtYBn3H8KPlglKqGAk5yKq8oFpGH0isreewvrrOh0qtTGFNq5vTJ++C WaVBJmch3tcpomuDMBZisKAGVGnDHKx5t/0s7mAa/5uDhzda8QyTC25htaVuCyGd1X4o s+Zy6hOkvKK21XjOg0cxH2RaHiDji6sf2HW+EElSkkZitRzowZVB1bZJ6/XMRI3PPjqn OzYWHhLUJPOegFYloGHnjAQ2V5Nk2wCoKgolMXFzmOKGer4vqFVvDaBpmfpYQcpWOXrb aIC+p1Br0D7ExYNpOkgml7OzohjFtGR2Pra4EhBzRNfu8OPaaFpqAynS+QViKqTb6yEI 5JPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=VzAGB4dZcEjV+6I3XoAIzzdK9wBW2NBYOCDdgn2OM54=; fh=7Zr0xoRuLAFtd9Ofc3hLg83z7J8WxDvtLMprkgFSnWg=; b=A47Qw9ZQ0mYDusfPotDGa+dkcys7pZle+vr+HymHWA5O8LG/Ht5eC7MaIIGZaKI/n6 xqfBz5JUhIEz0kz/QH/LwD8uYJWLmOD57So6FkGKF3kR/eCXW+0nu2L+WgmEY/10vBlJ RspgOdeJ7dE5bM4SMNB8O2J8v3aezSA1omHvLd9ZGXoAhoVhcltEkE9LUBJa0womtdYI 4oEAmxtGHVTBF6/qPGo03RCuVcI32xeOtinMkq5l1vDqimJg/mN5sbSlN6QY3Y+Ux9E3 vTRvFJoQ7PfQBScMvCdrNcjVXZtVlljLKd1cHZu6leQjgAmH1eMcY6IqsTgpzANkzVSA jPCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=IeiFV73f; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r10-20020aa7c14a000000b005232e4b9de1si3196178edp.683.2023.08.08.22.45.22; Tue, 08 Aug 2023 22:45:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=IeiFV73f; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229934AbjHIE1v (ORCPT + 56 others); Wed, 9 Aug 2023 00:27:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229755AbjHIE1u (ORCPT ); Wed, 9 Aug 2023 00:27:50 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AC671BC3 for ; Tue, 8 Aug 2023 21:27:49 -0700 (PDT) Received: from pps.filterd (m0279868.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3794Q7fJ005537; Wed, 9 Aug 2023 04:27:45 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : in-reply-to : references; s=qcppdkim1; bh=VzAGB4dZcEjV+6I3XoAIzzdK9wBW2NBYOCDdgn2OM54=; b=IeiFV73ftuWKX814QETk3qimrgOxO5Ws7nPlbAI2Xl9z0dsYTdCAHh03BFEjxF6mnyw2 3m1E7JFyAH8323Ers/7sHacfIh3dkdLsFYiE9sELxuK+w59ViX1LUW2QaHTPujbBC0mv uva/4bGMuwft2m/+BsUZ4Rb2gnlFot/tsEC7uZXKy+cO5+b/010mGH7WvpZ+HNbul8hZ VJymRlM44FVf0eolO5D6hsOOe4tT+fMYZwFJGZHaocBCwbS1Vy2EF0nnzSxaJV2Gdo1l gI8ar0DXRfn1lQWX36dYEmsO4dqRJDhIZVh02s2mGhUiWaoU6f8kshMJqVCuh5XWy/ik pQ== Received: from nasanppmta02.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3sc28rr4ms-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Aug 2023 04:27:45 +0000 Received: from pps.filterd (NASANPPMTA02.qualcomm.com [127.0.0.1]) by NASANPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTP id 3794Q8r7028285; Wed, 9 Aug 2023 04:27:44 GMT Received: from pps.reinject (localhost [127.0.0.1]) by NASANPPMTA02.qualcomm.com (PPS) with ESMTPS id 3sbfxr1cs2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 09 Aug 2023 04:27:44 +0000 Received: from NASANPPMTA02.qualcomm.com (NASANPPMTA02.qualcomm.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 3794RiXD029866; Wed, 9 Aug 2023 04:27:44 GMT Received: from hprem-linux.qualcomm.com (hprem-linux.qualcomm.com [10.201.162.248]) by NASANPPMTA02.qualcomm.com (PPS) with ESMTP id 3794RgWq029858; Wed, 09 Aug 2023 04:27:44 +0000 Received: by hprem-linux.qualcomm.com (Postfix, from userid 4146166) id EE486B003A8; Wed, 9 Aug 2023 09:57:41 +0530 (IST) From: Harshitha Prem To: ath12k@lists.infradead.org Cc: linux-wireless@vger.kernel.org, Harshitha Prem Subject: [PATCH 1/2] wifi: ath12k: Ignore fragments from uninitialized peer in dp Date: Wed, 9 Aug 2023 09:57:37 +0530 Message-Id: <20230809042738.13394-2-quic_hprem@quicinc.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230809042738.13394-1-quic_hprem@quicinc.com> References: <20230809042738.13394-1-quic_hprem@quicinc.com> X-QCInternal: smtphost X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: w6m2CHXJs8JXMWmsrrsLqmMZ2trLbjsh X-Proofpoint-GUID: w6m2CHXJs8JXMWmsrrsLqmMZ2trLbjsh X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-08-09_01,2023-08-08_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 malwarescore=0 suspectscore=0 adultscore=0 impostorscore=0 bulkscore=0 mlxscore=0 priorityscore=1501 mlxlogscore=980 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2306200000 definitions=main-2308090038 X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,SPF_HELO_NONE, SPF_NONE,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org When max virtual ap interfaces are configured in all the bands with ACS and hostapd restart is done every 60s, a crash is observed at random times. In the above scenario, a fragmented packet is received for self peer, for which rx_tid and rx_frags are not initialized in datapath. While handling this fragment, crash is observed as the rx_frag list is uninitialised and when we walk in ath12k_dp_rx_h_sort_frags, skb null leads to exception. To address this, before processing received fragments we check dp_setup_done flag is set to ensure that peer has completed its dp peer setup for fragment queue, else ignore processing the fragments. Call trace: PC points to "ath12k_dp_process_rx_err+0x4e8/0xfcc [ath12k]" LR points to "ath12k_dp_process_rx_err+0x480/0xfcc [ath12k]". The Backtrace obtained is as follows: ath12k_dp_process_rx_err+0x4e8/0xfcc [ath12k] ath12k_dp_service_srng+0x78/0x260 [ath12k] ath12k_pci_write32+0x990/0xb0c [ath12k] __napi_poll+0x30/0xa4 net_rx_action+0x118/0x270 __do_softirq+0x10c/0x244 irq_exit+0x64/0xb4 __handle_domain_irq+0x88/0xac gic_handle_irq+0x74/0xbc el1_irq+0xf0/0x1c0 arch_cpu_idle+0x10/0x18 do_idle+0x104/0x248 cpu_startup_entry+0x20/0x64 rest_init+0xd0/0xdc arch_call_rest_init+0xc/0x14 Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 Signed-off-by: Harshitha Prem --- drivers/net/wireless/ath/ath12k/dp.c | 1 + drivers/net/wireless/ath/ath12k/dp_rx.c | 9 +++++++++ drivers/net/wireless/ath/ath12k/peer.h | 3 +++ 3 files changed, 13 insertions(+) diff --git a/drivers/net/wireless/ath/ath12k/dp.c b/drivers/net/wireless/ath/ath12k/dp.c index ae1645d0f42a..d825e08d820a 100644 --- a/drivers/net/wireless/ath/ath12k/dp.c +++ b/drivers/net/wireless/ath/ath12k/dp.c @@ -38,6 +38,7 @@ void ath12k_dp_peer_cleanup(struct ath12k *ar, int vdev_id, const u8 *addr) ath12k_dp_rx_peer_tid_cleanup(ar, peer); crypto_free_shash(peer->tfm_mmic); + peer->dp_setup_done = false; spin_unlock_bh(&ab->base_lock); } diff --git a/drivers/net/wireless/ath/ath12k/dp_rx.c b/drivers/net/wireless/ath/ath12k/dp_rx.c index 67f8c140840f..5923c7c9eaff 100644 --- a/drivers/net/wireless/ath/ath12k/dp_rx.c +++ b/drivers/net/wireless/ath/ath12k/dp_rx.c @@ -2748,6 +2748,7 @@ int ath12k_dp_rx_peer_frag_setup(struct ath12k *ar, const u8 *peer_mac, int vdev } peer->tfm_mmic = tfm; + peer->dp_setup_done = true; spin_unlock_bh(&ab->base_lock); return 0; @@ -3214,6 +3215,14 @@ static int ath12k_dp_rx_frag_h_mpdu(struct ath12k *ar, ret = -ENOENT; goto out_unlock; } + + if (!peer->dp_setup_done) { + ath12k_warn(ab, "The peer %pM [%d] has uninitialized datapath\n", + peer->addr, peer_id); + ret = -ENOENT; + goto out_unlock; + } + rx_tid = &peer->rx_tid[tid]; if ((!skb_queue_empty(&rx_tid->rx_frags) && seqno != rx_tid->cur_sn) || diff --git a/drivers/net/wireless/ath/ath12k/peer.h b/drivers/net/wireless/ath/ath12k/peer.h index b296dc0e2f67..c6edb24cbedd 100644 --- a/drivers/net/wireless/ath/ath12k/peer.h +++ b/drivers/net/wireless/ath/ath12k/peer.h @@ -44,6 +44,9 @@ struct ath12k_peer { struct ppdu_user_delayba ppdu_stats_delayba; bool delayba_flag; bool is_authorized; + + /* protected by ab->data_lock */ + bool dp_setup_done; }; void ath12k_peer_unmap_event(struct ath12k_base *ab, u16 peer_id); -- 2.17.1