Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp578632imu; Thu, 20 Dec 2018 01:44:34 -0800 (PST) X-Google-Smtp-Source: AFSGD/Wq2GGVly05RpX7XrqSuA5CDfQDGhM/JwpV0vahwo6RqFSznFzpTIS4oyTpDVuFb4K+CCMM X-Received: by 2002:a17:902:a5ca:: with SMTP id t10mr23393351plq.139.1545299074427; Thu, 20 Dec 2018 01:44:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545299074; cv=none; d=google.com; s=arc-20160816; b=QgKz+/Pr6hWliBlpfAcJ1VjADLxh1M3mFTHXrVaYgULjoym6CZLLuk+eXZuaWh1uXR uOxzbSyYLOMl8qIBduvZ2a3a+Rv1vShF74b6CEau/IuKk9ICAqgrlfqg0qi8wC5Jy3hF SVAwf9mq688RcirlAGrPjWr1i7knK1JM34mJ+x94hlSC4zd6XiL/u0VG+K85iSAModpC NKTlm9aTsv+Yz8iOR+CQMqEqGnYof9HYmCg+W47BonSmWhOugv2Y5a0G+z/T5Ar2OskY 012jJIvZZ+yOJM0COSjApgJeY0ggD1SyQWVu+6vzHlthAWIRjujhQA23K3dZy+7tw2Jh l5xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Riau6qrJ1rNhtqWITjQ6+qKDtnUM/dChwJP/0wP3Cr4=; b=qdmvX/3hwdh9w/BW0wbDT6o7qVxuMbb/wEw5+xYKKT0TTOp0l/ALFhVpwR+rgMsdXX DAFUr5ZhQkNrnMZdUXiMV9FPoLzAO8gO0oxtF5DBvdSuCEf6VMBtF4GmCQFR9gUzCNRA MavgrTM7y7eF1ZMDxNUb1jQaaT2iT2fJit5w0eIWajrTqP+HxvWIhBEKXiGldZTjyS+9 cWvZRIH1dZyTD5AAxtOD/KqWgQAF1M9NcrphlSLuHj9GmHSEFk0eeINOhiIsItYwmp3c mL4rzEG5IeywJdEkoatBvji29OcbkiVdkdhYVpwLKNT9mjYF+7ppcG7DRU4lSQbWJoio U8Hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aIYjP6vq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n2si6497565pgr.67.2018.12.20.01.44.18; Thu, 20 Dec 2018 01:44:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aIYjP6vq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729363AbeLTJXC (ORCPT + 99 others); Thu, 20 Dec 2018 04:23:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:49318 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731442AbeLTJXA (ORCPT ); Thu, 20 Dec 2018 04:23:00 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2EA7420656; Thu, 20 Dec 2018 09:22:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1545297779; bh=cmOBhYafZzQJXvOZQ74STt0LE9zWgcrAcMLho6xsSqc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aIYjP6vq4oGe7sJjZiC6g0TTMzTckPfQlTmJ3DJ98oPZ2xMRxULMKDgu5nYGuwBZR kbyzcExeKF39zmkeoUjjQ1dT3lxg3Iy1C8bNb3fARIdgfy0Yu8GEYqsv1mq/AKPX9Z gtAUKsW5HM+p70CyuzNRxWQNWbqj5I0EI0GFCAak= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Radu Rendec , Michael Ellerman Subject: [PATCH 4.9 14/61] powerpc/msi: Fix NULL pointer access in teardown code Date: Thu, 20 Dec 2018 10:18:14 +0100 Message-Id: <20181220085844.304279950@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20181220085843.743900603@linuxfoundation.org> References: <20181220085843.743900603@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Radu Rendec commit 78e7b15e17ac175e7eed9e21c6f92d03d3b0a6fa upstream. The arch_teardown_msi_irqs() function assumes that controller ops pointers were already checked in arch_setup_msi_irqs(), but this assumption is wrong: arch_teardown_msi_irqs() can be called even when arch_setup_msi_irqs() returns an error (-ENOSYS). This can happen in the following scenario: - msi_capability_init() calls pci_msi_setup_msi_irqs() - pci_msi_setup_msi_irqs() returns -ENOSYS - msi_capability_init() notices the error and calls free_msi_irqs() - free_msi_irqs() calls pci_msi_teardown_msi_irqs() This is easier to see when CONFIG_PCI_MSI_IRQ_DOMAIN is not set and pci_msi_setup_msi_irqs() and pci_msi_teardown_msi_irqs() are just aliases to arch_setup_msi_irqs() and arch_teardown_msi_irqs(). The call to free_msi_irqs() upon pci_msi_setup_msi_irqs() failure seems legit, as it does additional cleanup; e.g. list_del(&entry->list) and kfree(entry) inside free_msi_irqs() do happen (MSI descriptors are allocated before pci_msi_setup_msi_irqs() is called and need to be cleaned up if that fails). Fixes: 6b2fd7efeb88 ("PCI/MSI/PPC: Remove arch_msi_check_device()") Cc: stable@vger.kernel.org # v3.18+ Signed-off-by: Radu Rendec Signed-off-by: Michael Ellerman Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/msi.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/arch/powerpc/kernel/msi.c +++ b/arch/powerpc/kernel/msi.c @@ -34,5 +34,10 @@ void arch_teardown_msi_irqs(struct pci_d { struct pci_controller *phb = pci_bus_to_host(dev->bus); - phb->controller_ops.teardown_msi_irqs(dev); + /* + * We can be called even when arch_setup_msi_irqs() returns -ENOSYS, + * so check the pointer again. + */ + if (phb->controller_ops.teardown_msi_irqs) + phb->controller_ops.teardown_msi_irqs(dev); }