From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id D9E21A09E0 for ; Thu, 3 Dec 2020 05:41:37 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id CE091C954; Thu, 3 Dec 2020 05:41:35 +0100 (CET) Received: from relay.smtp-ext.broadcom.com (relay.smtp-ext.broadcom.com [192.19.221.30]) by dpdk.org (Postfix) with ESMTP id 42CA4C970 for ; Thu, 3 Dec 2020 05:41:33 +0100 (CET) Received: from dhcp-10-123-153-55.dhcp.broadcom.net (bgccx-dev-host-lnx35.bec.broadcom.net [10.123.153.55]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by relay.smtp-ext.broadcom.com (Postfix) with ESMTPS id 79D5580D6; Wed, 2 Dec 2020 20:41:30 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 relay.smtp-ext.broadcom.com 79D5580D6 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=broadcom.com; s=dkimrelay; t=1606970490; bh=mm9WU5L9j+XLKIn1nH4XlToEMHRSV20j+7FziU1+n4c=; h=From:To:Cc:Subject:Date:From; b=qV+YzCrrh5VSX4L3KERjboF5I8Kk03kHiasWOuZdOTfidnY0HrTWxJ/fzPXeORJ81 DbaywosUEF9GRn/7l1/HMiplsswRQej/xO5ODcL5KVD65dgs61POJSBBzUt/+fkufX IcvocVTPh2y3E4RANdNIK7eBsEpAlS/AJN5Y9cm4= From: Somnath Kotur To: stable@dpdk.org Cc: Somnath Kotur , Ajit Khaparde Date: Thu, 3 Dec 2020 10:02:58 +0530 Message-Id: <20201203043259.3423-1-somnath.kotur@broadcom.com> X-Mailer: git-send-email 2.28.0.450.g3a238e5 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-stable] [PATCH 18.11 1/2] net/bnxt: fix checking VNIC in shutdown path X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" [upstream commit 4b029f02de3a0ce9cdd9a3475b84ca2e42d74281] Add a couple of NULL pointer checks in bnxt_free_all_filters() and bnxt_free_vnics() respectively to guard against certain error injection/recovery scenarios where it was found that the application was crashing with the bp->vnic_info pointer being NULL. Fixes: 51fafb89a9a0 ("net/bnxt: get rid of ff pools and use VNIC info array") Cc: stable@dpdk.org Signed-off-by: Somnath Kotur Reviewed-by: Ajit Khaparde --- drivers/net/bnxt/bnxt_filter.c | 15 +++++++++------ drivers/net/bnxt/bnxt_vnic.c | 3 +++ 2 files changed, 12 insertions(+), 6 deletions(-) diff --git a/drivers/net/bnxt/bnxt_filter.c b/drivers/net/bnxt/bnxt_filter.c index b64ae1b20e..3dbd004924 100644 --- a/drivers/net/bnxt/bnxt_filter.c +++ b/drivers/net/bnxt/bnxt_filter.c @@ -80,6 +80,15 @@ void bnxt_free_all_filters(struct bnxt *bp) struct bnxt_filter_info *filter, *temp_filter; unsigned int i; + for (i = 0; i < bp->pf.max_vfs; i++) { + STAILQ_FOREACH(filter, &bp->pf.vf_info[i].filter, next) { + bnxt_hwrm_clear_l2_filter(bp, filter); + } + } + + if (bp->vnic_info == NULL) + return; + for (i = 0; i < bp->nr_vnics; i++) { vnic = &bp->vnic_info[i]; filter = STAILQ_FIRST(&vnic->filter); @@ -93,12 +102,6 @@ void bnxt_free_all_filters(struct bnxt *bp) } STAILQ_INIT(&vnic->filter); } - - for (i = 0; i < bp->pf.max_vfs; i++) { - STAILQ_FOREACH(filter, &bp->pf.vf_info[i].filter, next) { - bnxt_hwrm_clear_l2_filter(bp, filter); - } - } } void bnxt_free_filter_mem(struct bnxt *bp) diff --git a/drivers/net/bnxt/bnxt_vnic.c b/drivers/net/bnxt/bnxt_vnic.c index 30af7a56c8..183a62d94c 100644 --- a/drivers/net/bnxt/bnxt_vnic.c +++ b/drivers/net/bnxt/bnxt_vnic.c @@ -78,6 +78,9 @@ void bnxt_free_all_vnics(struct bnxt *bp) struct bnxt_vnic_info *temp; unsigned int i; + if (bp->vnic_info == NULL) + return; + for (i = 0; i < bp->nr_vnics; i++) { temp = &bp->vnic_info[i]; STAILQ_INSERT_TAIL(&bp->free_vnic_list, temp, next); -- 2.28.0.497.g54e85e7