lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAJ6xRxVxLbHFZu3CqT37MF4br9Sj3HJ5nwb=qo3kNspymp38WA@mail.gmail.com>
Date: Wed, 21 Jan 2026 17:17:45 +0800
From: Aaron Ma <aaron.ma@...onical.com>
To: "Loktionov, Aleksandr" <aleksandr.loktionov@...el.com>
Cc: "Nguyen, Anthony L" <anthony.l.nguyen@...el.com>, 
	"Kitszel, Przemyslaw" <przemyslaw.kitszel@...el.com>, 
	"andrew+netdev@...n.ch" <andrew+netdev@...n.ch>, "davem@...emloft.net" <davem@...emloft.net>, 
	"edumazet@...gle.com" <edumazet@...gle.com>, "kuba@...nel.org" <kuba@...nel.org>, 
	"pabeni@...hat.com" <pabeni@...hat.com>, 
	"intel-wired-lan@...ts.osuosl.org" <intel-wired-lan@...ts.osuosl.org>, 
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>, 
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [Intel-wired-lan] [PATCH] ice: Fix PTP NULL pointer dereference
 during VSI rebuild

On Wed, Jan 21, 2026 at 4:21 PM Loktionov, Aleksandr
<aleksandr.loktionov@...el.com> wrote:
>
>
>
> > -----Original Message-----
> > From: Intel-wired-lan <intel-wired-lan-bounces@...osl.org> On Behalf
> > Of Aaron Ma via Intel-wired-lan
> > Sent: Wednesday, January 21, 2026 8:51 AM
> > To: Nguyen, Anthony L <anthony.l.nguyen@...el.com>; Kitszel,
> > Przemyslaw <przemyslaw.kitszel@...el.com>; andrew+netdev@...n.ch;
> > davem@...emloft.net; edumazet@...gle.com; kuba@...nel.org;
> > pabeni@...hat.com; intel-wired-lan@...ts.osuosl.org;
> > netdev@...r.kernel.org; linux-kernel@...r.kernel.org
> > Subject: [Intel-wired-lan] [PATCH] ice: Fix PTP NULL pointer
> > dereference during VSI rebuild
> >
> > Fix race condition where PTP periodic work runs while VSI is being
> > rebuilt, accessing NULL vsi->rx_rings.
> >
> > The sequence was:
> > 1. ice_ptp_prepare_for_reset() cancels PTP work 2. ice_ptp_rebuild()
> > immediately queues PTP work 3. VSI rebuild happens AFTER
> > ice_ptp_rebuild() 4. PTP work runs and accesses NULL vsi->rx_rings
> >
> > Fix: Keep PTP work cancelled during rebuild, only queue it after VSI
> > rebuild completes in ice_rebuild().
> >
> > Added ice_ptp_queue_work() helper function to encapsulate the logic
> > for queuing PTP work, ensuring it's only queued when PTP is supported
> > and the state is ICE_PTP_READY.
> >
> > Error log:
> > [  121.392544] ice 0000:60:00.1: PTP reset successful [  121.392692]
> > BUG: kernel NULL pointer dereference, address: 0000000000000000 [
> > 121.392712] #PF: supervisor read access in kernel mode [  121.392720]
> > #PF: error_code(0x0000) - not-present page [  121.392727] PGD 0 [
> > 121.392734] Oops: Oops: 0000 [#1] SMP NOPTI
> > [  121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted:
> > G S                  6.19.0-rc6+ #4 PREEMPT(voluntary)
> > [  121.392761] Tainted: [S]=CPU_OUT_OF_SPEC [  121.392773] RIP:
> > 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice] [  121.393042]
> > Call Trace:
> > [  121.393047]  <TASK>
> > [  121.393055]  ice_ptp_periodic_work+0x69/0x180 [ice] [  121.393202]
> > kthread_worker_fn+0xa2/0x260 [  121.393216]  ?
> > __pfx_ice_ptp_periodic_work+0x10/0x10 [ice] [  121.393359]  ?
> > __pfx_kthread_worker_fn+0x10/0x10 [  121.393371]  kthread+0x10d/0x230
> > [  121.393382]  ? __pfx_kthread+0x10/0x10 [  121.393393]
> > ret_from_fork+0x273/0x2b0 [  121.393407]  ? __pfx_kthread+0x10/0x10 [
> > 121.393417]  ret_from_fork_asm+0x1a/0x30 [  121.393432]  </TASK>
> >
> > Fixes: 803bef817807d ("ice: factor out ice_ptp_rebuild_owner()")
> > Signed-off-by: Aaron Ma <aaron.ma@...onical.com>
> > ---
> >  drivers/net/ethernet/intel/ice/ice_main.c |  3 +++
> > drivers/net/ethernet/intel/ice/ice_ptp.c  | 26 ++++++++++++++++++-----
> > drivers/net/ethernet/intel/ice/ice_ptp.h  |  5 +++++
> >  3 files changed, 29 insertions(+), 5 deletions(-)
> >
> > diff --git a/drivers/net/ethernet/intel/ice/ice_main.c
> > b/drivers/net/ethernet/intel/ice/ice_main.c
> > index 1851e9932cefe..2f5961573842d 100644
> > --- a/drivers/net/ethernet/intel/ice/ice_main.c
> > +++ b/drivers/net/ethernet/intel/ice/ice_main.c
> > @@ -7814,6 +7814,9 @@ static void ice_rebuild(struct ice_pf *pf, enum
> > ice_reset_req reset_type)
> >
> >       /* Restore timestamp mode settings after VSI rebuild */
> >       ice_ptp_restore_timestamp_mode(pf);
> > +
> > +     /* Start PTP periodic work after VSI is fully rebuilt */
> > +     ice_ptp_queue_work(pf);
> >       return;
> >
> >  err_vsi_rebuild:
> > diff --git a/drivers/net/ethernet/intel/ice/ice_ptp.c
> > b/drivers/net/ethernet/intel/ice/ice_ptp.c
> > index 4c8d20f2d2c0a..8e5d93acaf108 100644
> > --- a/drivers/net/ethernet/intel/ice/ice_ptp.c
> > +++ b/drivers/net/ethernet/intel/ice/ice_ptp.c
> > @@ -2817,6 +2817,20 @@ static void ice_ptp_periodic_work(struct
> > kthread_work *work)
> >                                  msecs_to_jiffies(err ? 10 : 500));  }
> >
> > +/**
> > + * ice_ptp_queue_work - Queue PTP periodic work for a PF
> > + * @pf: Board private structure
> > + *
> > + * Helper function to queue PTP periodic work after VSI rebuild
> > completes.
> > + * This ensures that PTP work only runs when VSI structures are
> > ready.
> > + */
> > +void ice_ptp_queue_work(struct ice_pf *pf) {
> > +     if (test_bit(ICE_FLAG_PTP_SUPPORTED, pf->flags) &&
> > +         pf->ptp.state == ICE_PTP_READY)
> > +             kthread_queue_delayed_work(pf->ptp.kworker, &pf-
> > >ptp.work, 0); }
> > +
> >  /**
> >   * ice_ptp_prepare_rebuild_sec - Prepare second NAC for PTP reset or
> > rebuild
> >   * @pf: Board private structure
> > @@ -2835,10 +2849,15 @@ static void ice_ptp_prepare_rebuild_sec(struct
> > ice_pf *pf, bool rebuild,
> >               struct ice_pf *peer_pf = ptp_port_to_pf(port);
> >
> >               if (!ice_is_primary(&peer_pf->hw)) {
> > -                     if (rebuild)
> > +                     if (rebuild) {
> > +                             /* TODO: When implementing rebuild=true:
> > +                              * 1. Ensure secondary PFs' VSIs are
> > rebuilt
> > +                              * 2. Call ice_ptp_queue_work(peer_pf)
> > after VSI rebuild
> > +                              */
> Shouldn't we resolve all TODOs before merging?
>

now the code only set rebuild = false.
This note is for future if anyone implement secondary PFs rebuilt,
So add todo here.

Thanks for review.
Aaron

>
> >                               ice_ptp_rebuild(peer_pf, reset_type);
> > -                     else
> > +                     } else {
> >                               ice_ptp_prepare_for_reset(peer_pf,
> > reset_type);
> > +                     }
> >               }
> >       }
> >  }
> > @@ -2984,9 +3003,6 @@ void ice_ptp_rebuild(struct ice_pf *pf, enum
> > ice_reset_req reset_type)
> >
> >       ptp->state = ICE_PTP_READY;
> >
> > -     /* Start periodic work going */
> > -     kthread_queue_delayed_work(ptp->kworker, &ptp->work, 0);
> > -
> >       dev_info(ice_pf_to_dev(pf), "PTP reset successful\n");
> >       return;
> >
> > diff --git a/drivers/net/ethernet/intel/ice/ice_ptp.h
> > b/drivers/net/ethernet/intel/ice/ice_ptp.h
> > index 27016aac4f1e8..428f7f79343a7 100644
> > --- a/drivers/net/ethernet/intel/ice/ice_ptp.h
> > +++ b/drivers/net/ethernet/intel/ice/ice_ptp.h
> > @@ -317,6 +317,7 @@ void ice_ptp_prepare_for_reset(struct ice_pf *pf,
> > void ice_ptp_init(struct ice_pf *pf);  void ice_ptp_release(struct
> > ice_pf *pf);  void ice_ptp_link_change(struct ice_pf *pf, bool
> > linkup);
> > +void ice_ptp_queue_work(struct ice_pf *pf);
> >  #else /* IS_ENABLED(CONFIG_PTP_1588_CLOCK) */
> >
> >  static inline int ice_ptp_hwtstamp_get(struct net_device *netdev, @@
> > -383,6 +384,10 @@ static inline void ice_ptp_link_change(struct ice_pf
> > *pf, bool linkup)  {  }
> >
> > +static inline void ice_ptp_queue_work(struct ice_pf *pf) { }
> > +
> >  static inline int ice_ptp_clock_index(struct ice_pf *pf)  {
> >       return -1;
> > --
> > 2.43.0
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ