Skip to content

Commit e592b51

Browse files
ParthibanI17164Paolo Abeni
authored andcommitted
net: ethernet: oa_tc6: fix tx skb race condition between reference pointers
There are two skb pointers to manage tx skb's enqueued from n/w stack. waiting_tx_skb pointer points to the tx skb which needs to be processed and ongoing_tx_skb pointer points to the tx skb which is being processed. SPI thread prepares the tx data chunks from the tx skb pointed by the ongoing_tx_skb pointer. When the tx skb pointed by the ongoing_tx_skb is processed, the tx skb pointed by the waiting_tx_skb is assigned to ongoing_tx_skb and the waiting_tx_skb pointer is assigned with NULL. Whenever there is a new tx skb from n/w stack, it will be assigned to waiting_tx_skb pointer if it is NULL. Enqueuing and processing of a tx skb handled in two different threads. Consider a scenario where the SPI thread processed an ongoing_tx_skb and it moves next tx skb from waiting_tx_skb pointer to ongoing_tx_skb pointer without doing any NULL check. At this time, if the waiting_tx_skb pointer is NULL then ongoing_tx_skb pointer is also assigned with NULL. After that, if a new tx skb is assigned to waiting_tx_skb pointer by the n/w stack and there is a chance to overwrite the tx skb pointer with NULL in the SPI thread. Finally one of the tx skb will be left as unhandled, resulting packet missing and memory leak. - Consider the below scenario where the TXC reported from the previous transfer is 10 and ongoing_tx_skb holds an tx ethernet frame which can be transported in 20 TXCs and waiting_tx_skb is still NULL. tx_credits = 10; /* 21 are filled in the previous transfer */ ongoing_tx_skb = 20; waiting_tx_skb = NULL; /* Still NULL */ - So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true. - After oa_tc6_prepare_spi_tx_buf_for_tx_skbs() ongoing_tx_skb = 10; waiting_tx_skb = NULL; /* Still NULL */ - Perform SPI transfer. - Process SPI rx buffer to get the TXC from footers. - Now let's assume previously filled 21 TXCs are freed so we are good to transport the next remaining 10 tx chunks from ongoing_tx_skb. tx_credits = 21; ongoing_tx_skb = 10; waiting_tx_skb = NULL; - So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true again. - In the oa_tc6_prepare_spi_tx_buf_for_tx_skbs() ongoing_tx_skb = NULL; waiting_tx_skb = NULL; - Now the below bad case might happen, Thread1 (oa_tc6_start_xmit) Thread2 (oa_tc6_spi_thread_handler) --------------------------- ----------------------------------- - if waiting_tx_skb is NULL - if ongoing_tx_skb is NULL - ongoing_tx_skb = waiting_tx_skb - waiting_tx_skb = skb - waiting_tx_skb = NULL ... - ongoing_tx_skb = NULL - if waiting_tx_skb is NULL - waiting_tx_skb = skb To overcome the above issue, protect the moving of tx skb reference from waiting_tx_skb pointer to ongoing_tx_skb pointer and assigning new tx skb to waiting_tx_skb pointer, so that the other thread can't access the waiting_tx_skb pointer until the current thread completes moving the tx skb reference safely. Fixes: 53fbde8 ("net: ethernet: oa_tc6: implement transmit path to transfer tx ethernet frames") Signed-off-by: Parthiban Veerasooran <[email protected]> Reviewed-by: Larysa Zaremba <[email protected]> Signed-off-by: Paolo Abeni <[email protected]>
1 parent 7d2f320 commit e592b51

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

drivers/net/ethernet/oa_tc6.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,7 @@ struct oa_tc6 {
113113
struct mii_bus *mdiobus;
114114
struct spi_device *spi;
115115
struct mutex spi_ctrl_lock; /* Protects spi control transfer */
116+
spinlock_t tx_skb_lock; /* Protects tx skb handling */
116117
void *spi_ctrl_tx_buf;
117118
void *spi_ctrl_rx_buf;
118119
void *spi_data_tx_buf;
@@ -1004,8 +1005,10 @@ static u16 oa_tc6_prepare_spi_tx_buf_for_tx_skbs(struct oa_tc6 *tc6)
10041005
for (used_tx_credits = 0; used_tx_credits < tc6->tx_credits;
10051006
used_tx_credits++) {
10061007
if (!tc6->ongoing_tx_skb) {
1008+
spin_lock_bh(&tc6->tx_skb_lock);
10071009
tc6->ongoing_tx_skb = tc6->waiting_tx_skb;
10081010
tc6->waiting_tx_skb = NULL;
1011+
spin_unlock_bh(&tc6->tx_skb_lock);
10091012
}
10101013
if (!tc6->ongoing_tx_skb)
10111014
break;
@@ -1210,7 +1213,9 @@ netdev_tx_t oa_tc6_start_xmit(struct oa_tc6 *tc6, struct sk_buff *skb)
12101213
return NETDEV_TX_OK;
12111214
}
12121215

1216+
spin_lock_bh(&tc6->tx_skb_lock);
12131217
tc6->waiting_tx_skb = skb;
1218+
spin_unlock_bh(&tc6->tx_skb_lock);
12141219

12151220
/* Wake spi kthread to perform spi transfer */
12161221
wake_up_interruptible(&tc6->spi_wq);
@@ -1240,6 +1245,7 @@ struct oa_tc6 *oa_tc6_init(struct spi_device *spi, struct net_device *netdev)
12401245
tc6->netdev = netdev;
12411246
SET_NETDEV_DEV(netdev, &spi->dev);
12421247
mutex_init(&tc6->spi_ctrl_lock);
1248+
spin_lock_init(&tc6->tx_skb_lock);
12431249

12441250
/* Set the SPI controller to pump at realtime priority */
12451251
tc6->spi->rt = true;

0 commit comments

Comments
 (0)