public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
* Re: [net,v2,02/12] idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL
       [not found] <20260225211546.1949260-3-anthony.l.nguyen@intel.com>
@ 2026-02-27  3:56 ` Jakub Kicinski
  2026-03-02 22:02   ` Hay, Joshua A
  0 siblings, 1 reply; 2+ messages in thread
From: Jakub Kicinski @ 2026-02-27  3:56 UTC (permalink / raw)
  To: anthony.l.nguyen
  Cc: Jakub Kicinski, andrew+netdev, avigailx.dahan, boolli, aaron.ma,
	decot, willemb, przemyslaw.kitszel, sridhar.samudrala,
	aleksandr.loktionov, davem, pabeni, sreedevi.joshi, Samuel.salin,
	netdev, sx.rinitha, joshua.a.hay, tglx, dima.ruinskiy,
	emil.s.tantilov, david.m.ertman, stable, brianvv, pmenzel,
	edumazet, horms, piotr.kwapulinski, joe, rafal.romanowski,
	brett.creeley, mschmidt, jacob.e.keller, intel-wired-lan,
	vitaly.lifshits, jedrzej.jagielski

This is an AI-generated review of your patch. The human sending this
email has considered the AI review valid, or at least plausible.

For local reproduction steps see https://netdev-ai.bots.linux.dev/ai-local.html
---
idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL

This patch adds a NULL check for rx_qgrp->splitq.bufq_sets to prevent
kernel panic when idpf_rxq_group_alloc() fails during initialization and
the error path calls idpf_rxq_sw_queue_rel(). The panic was occurring
during device opening when adding to a bonding interface.

> diff --git a/drivers/net/ethernet/intel/idpf/idpf_txrx.c b/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> index 761a77510467..59aafadae3d0 100644
> --- a/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> +++ b/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> @@ -1341,6 +1341,9 @@ static void idpf_txq_group_rel(struct idpf_q_vec_rsrc *rsrc)
>   */
>  static void idpf_rxq_sw_queue_rel(struct idpf_rxq_group *rx_qgrp)
>  {
> +	if (!rx_qgrp->splitq.bufq_sets)
> +		return;
> +
>  	for (unsigned int i = 0; i < rx_qgrp->splitq.num_bufq_sets; i++) {
>  		struct idpf_bufq_set *bufq_set = &rx_qgrp->splitq.bufq_sets[i];
>
>  		for (unsigned int j = 0; j < bufq_set->num_refillqs; j++) {
>  			kfree(bufq_set->refillqs[j].ring);
>  			bufq_set->refillqs[j].ring = NULL;
                           ^^^^^^
This patch adds a NULL check for bufq_sets, but does the same issue
exist for refillqs?

Looking at idpf_rxq_group_alloc() in the same file, it first sets
bufq_set->num_refillqs to a non-zero value, then attempts to allocate
refillqs:

idpf_rxq_group_alloc() {
    ...
    bufq_set->num_refillqs = num_rxq;
    bufq_set->refillqs = kcalloc(bufq_set->num_refillqs,
                                  sizeof(struct idpf_sw_queue),
                                  GFP_KERNEL);
    if (!bufq_set->refillqs) {
        err = -ENOMEM;
        goto err_alloc;
    }
    ...
}

If this allocation fails, bufq_set->refillqs is NULL but
bufq_set->num_refillqs is non-zero. The error path calls
idpf_rxq_sw_queue_rel() which now passes the bufq_sets check but then
dereferences bufq_set->refillqs[j].ring in the inner loop.

The inner loop condition (j < bufq_set->num_refillqs) would be true,
causing the same NULL pointer dereference the patch is meant to prevent.

Would this need a similar check before the inner loop, similar to the
bufq_sets check added in this patch?

^ permalink raw reply	[flat|nested] 2+ messages in thread

* RE: [net,v2,02/12] idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL
  2026-02-27  3:56 ` [net,v2,02/12] idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL Jakub Kicinski
@ 2026-03-02 22:02   ` Hay, Joshua A
  0 siblings, 0 replies; 2+ messages in thread
From: Hay, Joshua A @ 2026-03-02 22:02 UTC (permalink / raw)
  To: Jakub Kicinski, Nguyen, Anthony L
  Cc: andrew+netdev@lunn.ch, Dahan, AvigailX, boolli@google.com,
	aaron.ma@canonical.com, decot@google.com, willemb@google.com,
	Kitszel, Przemyslaw, Samudrala, Sridhar, Loktionov, Aleksandr,
	davem@davemloft.net, pabeni@redhat.com, Joshi, Sreedevi,
	Salin, Samuel, netdev@vger.kernel.org, Rinitha, SX,
	tglx@kernel.org, Ruinskiy, Dima, Tantilov, Emil S,
	Ertman, David M, stable@vger.kernel.org, brianvv@google.com,
	pmenzel@molgen.mpg.de, edumazet@google.com, horms@kernel.org,
	Kwapulinski, Piotr, joe@dama.to, Romanowski, Rafal,
	brett.creeley@amd.com, Schmidt, Michal, Keller, Jacob E,
	intel-wired-lan@lists.osuosl.org, 'Lifshits, Vitaly',
	Jagielski, Jedrzej

> This is an AI-generated review of your patch. The human sending this
> email has considered the AI review valid, or at least plausible.
> 
> For local reproduction steps see https://netdev-ai.bots.linux.dev/ai-local.html
> ---
> idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL
> 
> This patch adds a NULL check for rx_qgrp->splitq.bufq_sets to prevent
> kernel panic when idpf_rxq_group_alloc() fails during initialization and
> the error path calls idpf_rxq_sw_queue_rel(). The panic was occurring
> during device opening when adding to a bonding interface.
> 
> > diff --git a/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> b/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> > index 761a77510467..59aafadae3d0 100644
> > --- a/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> > +++ b/drivers/net/ethernet/intel/idpf/idpf_txrx.c
> > @@ -1341,6 +1341,9 @@ static void idpf_txq_group_rel(struct
> idpf_q_vec_rsrc *rsrc)
> >   */
> >  static void idpf_rxq_sw_queue_rel(struct idpf_rxq_group *rx_qgrp)
> >  {
> > +	if (!rx_qgrp->splitq.bufq_sets)
> > +		return;
> > +
> >  	for (unsigned int i = 0; i < rx_qgrp->splitq.num_bufq_sets; i++) {
> >  		struct idpf_bufq_set *bufq_set = &rx_qgrp-
> >splitq.bufq_sets[i];
> >
> >  		for (unsigned int j = 0; j < bufq_set->num_refillqs; j++) {
> >  			kfree(bufq_set->refillqs[j].ring);
> >  			bufq_set->refillqs[j].ring = NULL;
>                            ^^^^^^
> This patch adds a NULL check for bufq_sets, but does the same issue
> exist for refillqs?
> 
> Looking at idpf_rxq_group_alloc() in the same file, it first sets
> bufq_set->num_refillqs to a non-zero value, then attempts to allocate
> refillqs:
> 
> idpf_rxq_group_alloc() {
>     ...
>     bufq_set->num_refillqs = num_rxq;
>     bufq_set->refillqs = kcalloc(bufq_set->num_refillqs,
>                                   sizeof(struct idpf_sw_queue),
>                                   GFP_KERNEL);
>     if (!bufq_set->refillqs) {
>         err = -ENOMEM;
>         goto err_alloc;
>     }
>     ...
> }
> 
> If this allocation fails, bufq_set->refillqs is NULL but
> bufq_set->num_refillqs is non-zero. The error path calls
> idpf_rxq_sw_queue_rel() which now passes the bufq_sets check but then
> dereferences bufq_set->refillqs[j].ring in the inner loop.
> 
> The inner loop condition (j < bufq_set->num_refillqs) would be true,
> causing the same NULL pointer dereference the patch is meant to prevent.
> 
> Would this need a similar check before the inner loop, similar to the
> bufq_sets check added in this patch?

This is a valid bug, but we can fix it in a different way. Will send a follow up patch shortly.

Thanks!
Josh

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2026-03-02 22:03 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <20260225211546.1949260-3-anthony.l.nguyen@intel.com>
2026-02-27  3:56 ` [net,v2,02/12] idpf: skip deallocating bufq_sets from rx_qgrp if it is NULL Jakub Kicinski
2026-03-02 22:02   ` Hay, Joshua A

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox