Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2926693ybx; Fri, 8 Nov 2019 11:21:53 -0800 (PST) X-Google-Smtp-Source: APXvYqwTB20ksRdUqpbtDVquZO/zDd048r7atuRYCUqbAcIjv6j7S64fuK1swD69lLzMrx7JsLwt X-Received: by 2002:a17:906:b310:: with SMTP id n16mr10455109ejz.129.1573240913111; Fri, 08 Nov 2019 11:21:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240913; cv=none; d=google.com; s=arc-20160816; b=BiJhpBTlzBZHHomDOPMxV9kssEiXCGC+lZGTSk81z3/tU7tlNG8AUuMi00IITTHElY 0/OaG2Vy5J/sHOdq43zhg4Z2kC5M30LRaB+ffHrllZOrQZq7H6kO+YDc+3UAVaD5ma2I Hk0lQ81xInUMtHhJVhvEFXgZVByWViyjgouwXDens5jk3wVpsaV2KtPQ4hLjSJSP9VIy 8LYe2+QYGotFewx0C7ZxRtJy3+uC5cqSdKWnqSIEK63BeHZv7s1m8wF2w2Dfq7kAFGjB 0Q14J9s/h6rmhU5AL2HLuYvXRUT/wfEyYWaoFOtCtrhVlqbcb8z7J8CBMB0e8CqpzgwI GxIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W4pZ9qWLtLWde6rVJVoObRVEIVslE3CDLrJ1VvoaLP0=; b=cciMXIkKH2GafDmfEKiHF3IhTEeHBSQ/oxPLfP0dMGK3ZF039HrpTp22SrGe+InHFb Cm/sqLqz+oLV7g98cRzcGVjsv4iZoSzCinfEPoeXf6hGb2hbmjy5CWrLm+09MIIZNN0/ ZloLMQ8hjU3Ms4Kqmz3R/kf3WYKIcETWPJcbdBxnqYMXDSzJCdY6ar5N6Rdsx77DxZjp UghR9T94YNL9ktnyJ4k+Ksyv6nVMzboG63feeDh5bRDy6cOSuRy3fi4wFuXbhsXJkBeq FiLgEo/cKPnTq6hn7ooSVTevz5zRW2Eu+5kuWCQZtKLahdCM7thEhsPsnwNkHDD9pKjN 9DFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Wm9WXtmQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cb6si4162883ejb.359.2019.11.08.11.21.29; Fri, 08 Nov 2019 11:21:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Wm9WXtmQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390360AbfKHTS7 (ORCPT + 99 others); Fri, 8 Nov 2019 14:18:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:57272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389521AbfKHTAM (ORCPT ); Fri, 8 Nov 2019 14:00:12 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EB0F42247A; Fri, 8 Nov 2019 18:58:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239490; bh=ALXLVrMT++fTiNRn7HeIjfwjcrLRnK0M8YRl47E6Qnk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Wm9WXtmQvfJTl7NmhQz/Vmerr/O6u+miWuMAxRfcwnbB2tEPv/wdQamFRJ/o68RXZ Rjms+aVDdN2rnRv88yT4YXwc+e5u9T7R/HIiQfYkkVmZpDx+QQsSXw9LzW+fr4kEbL /ZjXpxyIP5rTSnkiBLa0dtpXg0VUvBpDPaGYLenw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shahjada Abul Husain , Vishal Kulkarni , "David S. Miller" Subject: [PATCH 4.14 23/62] cxgb4: fix panic when attaching to ULD fail Date: Fri, 8 Nov 2019 19:50:11 +0100 Message-Id: <20191108174739.009216039@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174719.228826381@linuxfoundation.org> References: <20191108174719.228826381@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vishal Kulkarni [ Upstream commit fc89cc358fb64e2429aeae0f37906126636507ec ] Release resources when attaching to ULD fail. Otherwise, data mismatch is seen between LLD and ULD later on, which lead to kernel panic when accessing resources that should not even exist in the first place. Fixes: 94cdb8bb993a ("cxgb4: Add support for dynamic allocation of resources for ULD") Signed-off-by: Shahjada Abul Husain Signed-off-by: Vishal Kulkarni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c | 29 ++++++++++++++----------- 1 file changed, 17 insertions(+), 12 deletions(-) --- a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c +++ b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c @@ -670,10 +670,10 @@ static void uld_init(struct adapter *ada lld->fr_nsmr_tpte_wr_support = adap->params.fr_nsmr_tpte_wr_support; } -static void uld_attach(struct adapter *adap, unsigned int uld) +static int uld_attach(struct adapter *adap, unsigned int uld) { - void *handle; struct cxgb4_lld_info lli; + void *handle; uld_init(adap, &lli); uld_queue_init(adap, uld, &lli); @@ -683,7 +683,7 @@ static void uld_attach(struct adapter *a dev_warn(adap->pdev_dev, "could not attach to the %s driver, error %ld\n", adap->uld[uld].name, PTR_ERR(handle)); - return; + return PTR_ERR(handle); } adap->uld[uld].handle = handle; @@ -691,23 +691,24 @@ static void uld_attach(struct adapter *a if (adap->flags & FULL_INIT_DONE) adap->uld[uld].state_change(handle, CXGB4_STATE_UP); + + return 0; } -/** - * cxgb4_register_uld - register an upper-layer driver - * @type: the ULD type - * @p: the ULD methods +/* cxgb4_register_uld - register an upper-layer driver + * @type: the ULD type + * @p: the ULD methods * - * Registers an upper-layer driver with this driver and notifies the ULD - * about any presently available devices that support its type. Returns - * %-EBUSY if a ULD of the same type is already registered. + * Registers an upper-layer driver with this driver and notifies the ULD + * about any presently available devices that support its type. Returns + * %-EBUSY if a ULD of the same type is already registered. */ int cxgb4_register_uld(enum cxgb4_uld type, const struct cxgb4_uld_info *p) { - int ret = 0; unsigned int adap_idx = 0; struct adapter *adap; + int ret = 0; if (type >= CXGB4_ULD_MAX) return -EINVAL; @@ -741,12 +742,16 @@ int cxgb4_register_uld(enum cxgb4_uld ty if (ret) goto free_irq; adap->uld[type] = *p; - uld_attach(adap, type); + ret = uld_attach(adap, type); + if (ret) + goto free_txq; adap_idx++; } mutex_unlock(&uld_mutex); return 0; +free_txq: + release_sge_txq_uld(adap, type); free_irq: if (adap->flags & FULL_INIT_DONE) quiesce_rx_uld(adap, type);