Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1976237ybh; Tue, 14 Jul 2020 12:05:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8wKvVV/EypNx4lQSfQ0aU7tlmWcC1IXlqQ17chd0bm9CA7qicH7iZ6HOmh4jrQsubXN+O X-Received: by 2002:a17:906:c943:: with SMTP id fw3mr5782955ejb.55.1594753539442; Tue, 14 Jul 2020 12:05:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594753539; cv=none; d=google.com; s=arc-20160816; b=e1VgSWsMnpFlDFnQE/SxOZjVk8VGoSAoLgd3cLePRjAuvBQCAyFPlWvenBgTJbzjj1 +zlQ9OgwmFejTAg4Jr9IsrY4M0BzvuAi/YdCHex6/g9YU5kDM1IJKQEDcLW0tTEa8xjj HHtRTf734GdCH94UeEneE4vvI0T+aYEdmOS1YJhcQltWgkllbkxOmej3+06zKIHb6Z+8 Z5pY8Wt2qQLOSWZkPC+/YcOht1xX3qAAx9wDwo4fFVqhURZD4lmXsYJz2cCqc1ccAnjE zBJpm7yceFXW+O6exg9zANPguB981NGUV/mHEFhVKOBX5gbhjoTnPCzEUPY/V159me6e 7PBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IwQbKXmXyfwYtizK/Zcj3HliPbpD5pd5zY4/sYJ6J7I=; b=cPRB9SioWQPcF+P4jVGjoLNkV/RArKi8fWI+xNzGvFVbyG934nyaBlIznqmataHw3W SgSvUjqUuW03Dsp09/UWU7ghhW/7FLSwi0FuEVR8ncHt+aPypnbwKoOLszhsYTcyX0EB Eazc6PlF/wY4Y1XpGIJh0eEIhqhxTbfRmorbgEAfo3Fj51WTSxfQlKuLtt5sxpXZ7oKV x0tptqqiXU6bKQZg4RW+PEpKhFmwhKYKMvt/AopEdGoE+BEuosgQtlYdV0B59reZBPK/ J1f99dYtRCd95mwSOvvohZx6LZ2RMvWpSKoMPQp1sDp4H0YoNtJALPziPFURMT7CCXfh Nn3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="DD/70Aia"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h20si12194426eje.434.2020.07.14.12.05.15; Tue, 14 Jul 2020 12:05:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="DD/70Aia"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731059AbgGNS5h (ORCPT + 99 others); Tue, 14 Jul 2020 14:57:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:55668 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729678AbgGNS5Z (ORCPT ); Tue, 14 Jul 2020 14:57:25 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF3B122B2B; Tue, 14 Jul 2020 18:57:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594753044; bh=CP5QshHsdbi112QdOMX7JdG4LdpRi4iLCU1/oUR75ro=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DD/70AiadwZIK0R5GH892KHpnmMfXtfYYncyFYt3W4M7yrBRinupd9glI8f/Dy/C9 x9Tty8PBbiAxgWnk7sLVisZBkKxa4iYY8Pb1FcK/ScMOkksh5jQGIDv0QssmVHFw6Q Q5lZorPbeCD/MqNuw36UKzxdIDrZEqCVeqz9t0fo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Fei Liu , Jonathan Toppins , Michael Chan , Davide Caratti , "David S. Miller" , Sasha Levin Subject: [PATCH 5.7 099/166] bnxt_en: fix NULL dereference in case SR-IOV configuration fails Date: Tue, 14 Jul 2020 20:44:24 +0200 Message-Id: <20200714184120.585415446@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714184115.844176932@linuxfoundation.org> References: <20200714184115.844176932@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Davide Caratti [ Upstream commit c8b1d7436045d3599bae56aef1682813ecccaad7 ] we need to set 'active_vfs' back to 0, if something goes wrong during the allocation of SR-IOV resources: otherwise, further VF configurations will wrongly assume that bp->pf.vf[x] are valid memory locations, and commands like the ones in the following sequence: # echo 2 >/sys/bus/pci/devices/${ADDR}/sriov_numvfs # ip link set dev ens1f0np0 up # ip link set dev ens1f0np0 vf 0 trust on will cause a kernel crash similar to this: bnxt_en 0000:3b:00.0: not enough MMIO resources for SR-IOV BUG: kernel NULL pointer dereference, address: 0000000000000014 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 43 PID: 2059 Comm: ip Tainted: G I 5.8.0-rc2.upstream+ #871 Hardware name: Dell Inc. PowerEdge R740/08D89F, BIOS 2.2.11 06/13/2019 RIP: 0010:bnxt_set_vf_trust+0x5b/0x110 [bnxt_en] Code: 44 24 58 31 c0 e8 f5 fb ff ff 85 c0 0f 85 b6 00 00 00 48 8d 1c 5b 41 89 c6 b9 0b 00 00 00 48 c1 e3 04 49 03 9c 24 f0 0e 00 00 <8b> 43 14 89 c2 83 c8 10 83 e2 ef 45 84 ed 49 89 e5 0f 44 c2 4c 89 RSP: 0018:ffffac6246a1f570 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000000000b RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff98b28f538900 RBP: ffff98b28f538900 R08: 0000000000000000 R09: 0000000000000008 R10: ffffffffb9515be0 R11: ffffac6246a1f678 R12: ffff98b28f538000 R13: 0000000000000001 R14: 0000000000000000 R15: ffffffffc05451e0 FS: 00007fde0f688800(0000) GS:ffff98baffd40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000014 CR3: 000000104bb0a003 CR4: 00000000007606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: do_setlink+0x994/0xfe0 __rtnl_newlink+0x544/0x8d0 rtnl_newlink+0x47/0x70 rtnetlink_rcv_msg+0x29f/0x350 netlink_rcv_skb+0x4a/0x110 netlink_unicast+0x21d/0x300 netlink_sendmsg+0x329/0x450 sock_sendmsg+0x5b/0x60 ____sys_sendmsg+0x204/0x280 ___sys_sendmsg+0x88/0xd0 __sys_sendmsg+0x5e/0xa0 do_syscall_64+0x47/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Fixes: c0c050c58d840 ("bnxt_en: New Broadcom ethernet driver.") Reported-by: Fei Liu CC: Jonathan Toppins CC: Michael Chan Signed-off-by: Davide Caratti Reviewed-by: Michael Chan Acked-by: Jonathan Toppins Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c b/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c index cea2f9958a1df..2295f539a6414 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_sriov.c @@ -396,6 +396,7 @@ static void bnxt_free_vf_resources(struct bnxt *bp) } } + bp->pf.active_vfs = 0; kfree(bp->pf.vf); bp->pf.vf = NULL; } @@ -835,7 +836,6 @@ void bnxt_sriov_disable(struct bnxt *bp) bnxt_free_vf_resources(bp); - bp->pf.active_vfs = 0; /* Reclaim all resources for the PF. */ rtnl_lock(); bnxt_restore_pf_fw_resources(bp); -- 2.25.1