Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3657407pxv; Mon, 26 Jul 2021 08:52:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLR6EyMQCKCFiXcGGSRSNSGe1hVfSp6b3P/qJVCpt+bGhBrtfjXYL+D3XKv8PskAhdUUgi X-Received: by 2002:a05:6e02:1bc1:: with SMTP id x1mr13547651ilv.33.1627314754839; Mon, 26 Jul 2021 08:52:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627314754; cv=none; d=google.com; s=arc-20160816; b=oKhKH2vJJRBoXzEb05VzFtEOjwRrDVdnDlGy/YAyMkOQJatOMxe0jAaxscCe2xYLl2 bLzU+F+WzksGEfajxeDxYl/IhTTsjsrNdYDcyJrs10TeKCvdEJl0ghj5N30UbTcAM/I+ NKGhpon6uyOHyNhf3TtLXXnp0ohEdf0M9qXqrwDGMEPSMnvi8dLuRhCot//gB9LoVWX/ vfxtIW+2QMiHPXZj3Z6loyOagjfxuqWkqtwqeb3qDCh+7vXityXEOpjbsPYoGf1388eI D9PMjM7oEBrArrALxEJmO7RpurXL0LrMs/y23dfaeSDF3bokmc4i41//bKy//aMGA5uY QgUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PjMrLEjycJO71wu1IRs2I7fmelHgl/5fEAjcQT25maw=; b=uUQv8YzmHIGbnCRiPNGEGpBLVipWYHIh1u2bj0G6ZxnrVLpQcN9vrROM+2L4+Dp9xz 7j8niaIHkMXEYGwj7K3NnEQF4uEzwDwDtggx4wJSJszzayNhyf+OMAmNfdlADvBcX7yS X0Ugnpf7j8fPA+fqoeVMxgnUG+yN33iLyfrEvGo2Ou0sr+lC/9wTZpiz9633wdzh7bwB RyWhHx5g93QHLpH4Fb453TDFEBQcJ4f6f4J/Aj7VcRkv3QHxb84XOK5FaCrPkhMncvZm vNUi1Qt5tZoLs8VgqzJThPivNzauN9bnPVsnOjEoQAvVJJNxEq9tgt/jZzA5bBPLcCzd Pz/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Gmtt1XPs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f7si328312ioq.12.2021.07.26.08.52.20; Mon, 26 Jul 2021 08:52:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Gmtt1XPs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237003AbhGZPLD (ORCPT + 99 others); Mon, 26 Jul 2021 11:11:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:46038 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236262AbhGZPGi (ORCPT ); Mon, 26 Jul 2021 11:06:38 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6BF3F60F6B; Mon, 26 Jul 2021 15:47:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627314424; bh=8NuPKRkybmUYXeVgMaIoBn/BUL1fl3Z2lejk3KOUK9M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Gmtt1XPskMoArqAsElF8v2IXzPhcW90D/OTHjHAcinAusv8MnspTLZPYUnhRq53iT UYe5OWMF2HKPEK38431JszMYG91K3kY2vpp6FXEAQqj9g7yvGHGYXRpwMN4ikZK7kw E68hCr8WsmBDfTpc+u0BZOyuryW71bgzAGbn3uKA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aleksandr Loktionov , Grzegorz Siwik , Arkadiusz Kubalewski , Slawomir Laba , Sylwester Dziedziuch , Mateusz Palczewski , Tony Brelinski , Tony Nguyen , Sasha Levin Subject: [PATCH 4.14 41/82] igb: Check if num of q_vectors is smaller than max before array access Date: Mon, 26 Jul 2021 17:38:41 +0200 Message-Id: <20210726153829.504040181@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210726153828.144714469@linuxfoundation.org> References: <20210726153828.144714469@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aleksandr Loktionov [ Upstream commit 6c19d772618fea40d9681f259368f284a330fd90 ] Ensure that the adapter->q_vector[MAX_Q_VECTORS] array isn't accessed beyond its size. It was fixed by using a local variable num_q_vectors as a limit for loop index, and ensure that num_q_vectors is not bigger than MAX_Q_VECTORS. Fixes: 047e0030f1e6 ("igb: add new data structure for handling interrupts and NAPI") Signed-off-by: Aleksandr Loktionov Reviewed-by: Grzegorz Siwik Reviewed-by: Arkadiusz Kubalewski Reviewed-by: Slawomir Laba Reviewed-by: Sylwester Dziedziuch Reviewed-by: Mateusz Palczewski Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/igb/igb_main.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c index c4898bb9896f..6bd30d51dafc 100644 --- a/drivers/net/ethernet/intel/igb/igb_main.c +++ b/drivers/net/ethernet/intel/igb/igb_main.c @@ -949,6 +949,7 @@ static void igb_configure_msix(struct igb_adapter *adapter) **/ static int igb_request_msix(struct igb_adapter *adapter) { + unsigned int num_q_vectors = adapter->num_q_vectors; struct net_device *netdev = adapter->netdev; int i, err = 0, vector = 0, free_vector = 0; @@ -957,7 +958,13 @@ static int igb_request_msix(struct igb_adapter *adapter) if (err) goto err_out; - for (i = 0; i < adapter->num_q_vectors; i++) { + if (num_q_vectors > MAX_Q_VECTORS) { + num_q_vectors = MAX_Q_VECTORS; + dev_warn(&adapter->pdev->dev, + "The number of queue vectors (%d) is higher than max allowed (%d)\n", + adapter->num_q_vectors, MAX_Q_VECTORS); + } + for (i = 0; i < num_q_vectors; i++) { struct igb_q_vector *q_vector = adapter->q_vector[i]; vector++; -- 2.30.2