From nobody Mon Apr 13 17:09:52 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1CA6EC43217 for ; Tue, 15 Nov 2022 14:51:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230402AbiKOOvc (ORCPT ); Tue, 15 Nov 2022 09:51:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36390 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229573AbiKOOvZ (ORCPT ); Tue, 15 Nov 2022 09:51:25 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 94A4C24BE9; Tue, 15 Nov 2022 06:51:24 -0800 (PST) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NBTdN4208zRpBQ; Tue, 15 Nov 2022 22:51:04 +0800 (CST) Received: from dggpeml500006.china.huawei.com (7.185.36.76) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:22 +0800 Received: from localhost.localdomain (10.175.112.70) by dggpeml500006.china.huawei.com (7.185.36.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:22 +0800 From: Zhang Changzhong To: , , , , , CC: , , Subject: [PATCH net v2 1/3] net: nixge: fix potential memory leak in nixge_start_xmit() Date: Tue, 15 Nov 2022 23:10:22 +0800 Message-ID: <1668525024-38409-2-git-send-email-zhangchangzhong@huawei.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> References: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.175.112.70] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml500006.china.huawei.com (7.185.36.76) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The nixge_start_xmit() returns NETDEV_TX_OK but does not free skb in case of dma_map_single() fails, which leads to memory leak. Fix it by adding dev_kfree_skb_any() when dma_map_single() fails. Fixes: 492caffa8a1a ("net: ethernet: nixge: Add support for National Instru= ments XGE netdev") Signed-off-by: Zhang Changzhong Reviewed-by: Francois Romieu --- drivers/net/ethernet/ni/nixge.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ni/nixge.c b/drivers/net/ethernet/ni/nixg= e.c index 19d043b..d8cd520 100644 --- a/drivers/net/ethernet/ni/nixge.c +++ b/drivers/net/ethernet/ni/nixge.c @@ -526,8 +526,10 @@ static netdev_tx_t nixge_start_xmit(struct sk_buff *sk= b, =20 cur_phys =3D dma_map_single(ndev->dev.parent, skb->data, skb_headlen(skb), DMA_TO_DEVICE); - if (dma_mapping_error(ndev->dev.parent, cur_phys)) + if (dma_mapping_error(ndev->dev.parent, cur_phys)) { + dev_kfree_skb_any(skb); goto drop; + } nixge_hw_dma_bd_set_phys(cur_p, cur_phys); =20 cur_p->cntrl =3D skb_headlen(skb) | XAXIDMA_BD_CTRL_TXSOF_MASK; --=20 2.9.5 From nobody Mon Apr 13 17:09:52 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B6B65C4332F for ; Tue, 15 Nov 2022 14:51:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230395AbiKOOvn (ORCPT ); Tue, 15 Nov 2022 09:51:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229546AbiKOOv2 (ORCPT ); Tue, 15 Nov 2022 09:51:28 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 48C6124BE9; Tue, 15 Nov 2022 06:51:27 -0800 (PST) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NBTd93QlTzHvsR; Tue, 15 Nov 2022 22:50:53 +0800 (CST) Received: from dggpeml500006.china.huawei.com (7.185.36.76) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:23 +0800 Received: from localhost.localdomain (10.175.112.70) by dggpeml500006.china.huawei.com (7.185.36.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:22 +0800 From: Zhang Changzhong To: , , , , , CC: , , Subject: [PATCH net v2 2/3] net: nixge: avoid overwriting buffer descriptor Date: Tue, 15 Nov 2022 23:10:23 +0800 Message-ID: <1668525024-38409-3-git-send-email-zhangchangzhong@huawei.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> References: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.175.112.70] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml500006.china.huawei.com (7.185.36.76) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The check on the number of available BDs is incorrect because BDs are required not only for frags but also for skb. This may result in overwriting BD that is still in use. Fixes: 492caffa8a1a ("net: ethernet: nixge: Add support for National Instru= ments XGE netdev") Signed-off-by: Zhang Changzhong Reviewed-by: Francois Romieu --- drivers/net/ethernet/ni/nixge.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ni/nixge.c b/drivers/net/ethernet/ni/nixg= e.c index d8cd520..91b7ebc 100644 --- a/drivers/net/ethernet/ni/nixge.c +++ b/drivers/net/ethernet/ni/nixge.c @@ -518,7 +518,7 @@ static netdev_tx_t nixge_start_xmit(struct sk_buff *skb, cur_p =3D &priv->tx_bd_v[priv->tx_bd_tail]; tx_skb =3D &priv->tx_skb[priv->tx_bd_tail]; =20 - if (nixge_check_tx_bd_space(priv, num_frag)) { + if (nixge_check_tx_bd_space(priv, num_frag + 1)) { if (!netif_queue_stopped(ndev)) netif_stop_queue(ndev); return NETDEV_TX_OK; --=20 2.9.5 From nobody Mon Apr 13 17:09:52 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 56741C4332F for ; Tue, 15 Nov 2022 14:51:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232642AbiKOOvg (ORCPT ); Tue, 15 Nov 2022 09:51:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36402 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230106AbiKOOv1 (ORCPT ); Tue, 15 Nov 2022 09:51:27 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25E2622500; Tue, 15 Nov 2022 06:51:26 -0800 (PST) Received: from dggpeml500025.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NBTdL51DqzmVt7; Tue, 15 Nov 2022 22:51:02 +0800 (CST) Received: from dggpeml500006.china.huawei.com (7.185.36.76) by dggpeml500025.china.huawei.com (7.185.36.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:23 +0800 Received: from localhost.localdomain (10.175.112.70) by dggpeml500006.china.huawei.com (7.185.36.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 15 Nov 2022 22:51:23 +0800 From: Zhang Changzhong To: , , , , , CC: , , Subject: [PATCH net v2 3/3] net: nixge: fix tx queue handling Date: Tue, 15 Nov 2022 23:10:24 +0800 Message-ID: <1668525024-38409-4-git-send-email-zhangchangzhong@huawei.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> References: <1668525024-38409-1-git-send-email-zhangchangzhong@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.175.112.70] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml500006.china.huawei.com (7.185.36.76) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Currently the driver check for available space at the beginning of nixge_start_xmit(), and when there is not enough space for this packet, it returns NETDEV_TX_OK, which casues packet loss and memory leak. Instead the queue should be stopped after the packet is added to the BD when there may not be enough space for next packet. In addition, the queue should be wakeup only if there is enough space for a packet with max frags. Fixes: 492caffa8a1a ("net: ethernet: nixge: Add support for National Instru= ments XGE netdev") Signed-off-by: Zhang Changzhong --- drivers/net/ethernet/ni/nixge.c | 54 +++++++++++++++++++++++++++++--------= ---- 1 file changed, 38 insertions(+), 16 deletions(-) diff --git a/drivers/net/ethernet/ni/nixge.c b/drivers/net/ethernet/ni/nixg= e.c index 91b7ebc..3776a03 100644 --- a/drivers/net/ethernet/ni/nixge.c +++ b/drivers/net/ethernet/ni/nixge.c @@ -457,6 +457,17 @@ static void nixge_tx_skb_unmap(struct nixge_priv *priv, } } =20 +static int nixge_check_tx_bd_space(struct nixge_priv *priv, + int num_frag) +{ + struct nixge_hw_dma_bd *cur_p; + + cur_p =3D &priv->tx_bd_v[(priv->tx_bd_tail + num_frag) % TX_BD_NUM]; + if (cur_p->status & XAXIDMA_BD_STS_ALL_MASK) + return NETDEV_TX_BUSY; + return 0; +} + static void nixge_start_xmit_done(struct net_device *ndev) { struct nixge_priv *priv =3D netdev_priv(ndev); @@ -488,19 +499,13 @@ static void nixge_start_xmit_done(struct net_device *= ndev) ndev->stats.tx_packets +=3D packets; ndev->stats.tx_bytes +=3D size; =20 - if (packets) - netif_wake_queue(ndev); -} - -static int nixge_check_tx_bd_space(struct nixge_priv *priv, - int num_frag) -{ - struct nixge_hw_dma_bd *cur_p; + if (packets) { + /* Matches barrier in nixge_start_xmit */ + smp_mb(); =20 - cur_p =3D &priv->tx_bd_v[(priv->tx_bd_tail + num_frag) % TX_BD_NUM]; - if (cur_p->status & XAXIDMA_BD_STS_ALL_MASK) - return NETDEV_TX_BUSY; - return 0; + if (!nixge_check_tx_bd_space(priv, MAX_SKB_FRAGS + 1)) + netif_wake_queue(ndev); + } } =20 static netdev_tx_t nixge_start_xmit(struct sk_buff *skb, @@ -518,10 +523,15 @@ static netdev_tx_t nixge_start_xmit(struct sk_buff *s= kb, cur_p =3D &priv->tx_bd_v[priv->tx_bd_tail]; tx_skb =3D &priv->tx_skb[priv->tx_bd_tail]; =20 - if (nixge_check_tx_bd_space(priv, num_frag + 1)) { - if (!netif_queue_stopped(ndev)) - netif_stop_queue(ndev); - return NETDEV_TX_OK; + if (unlikely(nixge_check_tx_bd_space(priv, num_frag + 1))) { + /* Should not happen as last start_xmit call should have + * checked for sufficient space and queue should only be + * woken when sufficient space is available. + */ + netif_stop_queue(ndev); + if (net_ratelimit()) + netdev_err(ndev, "BUG! TX Ring full when queue awake!\n"); + return NETDEV_TX_BUSY; } =20 cur_phys =3D dma_map_single(ndev->dev.parent, skb->data, @@ -572,6 +582,18 @@ static netdev_tx_t nixge_start_xmit(struct sk_buff *sk= b, ++priv->tx_bd_tail; priv->tx_bd_tail %=3D TX_BD_NUM; =20 + /* Stop queue if next transmit may not have space */ + if (nixge_check_tx_bd_space(priv, MAX_SKB_FRAGS + 1)) { + netif_stop_queue(ndev); + + /* Matches barrier in nixge_start_xmit_done */ + smp_mb(); + + /* Space might have just been freed - check again */ + if (!nixge_check_tx_bd_space(priv, MAX_SKB_FRAGS + 1)) + netif_wake_queue(ndev); + } + return NETDEV_TX_OK; frag_err: for (; ii > 0; ii--) { --=20 2.9.5