Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3667821pxv; Mon, 26 Jul 2021 09:03:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWW9KGgFH+0rUG2zB+sq3axi7cO3rDuMlYhVjRc4SHFAylMhAVrICGOwpJhAxHPk6aYN5/ X-Received: by 2002:aa7:d146:: with SMTP id r6mr8995303edo.264.1627315411118; Mon, 26 Jul 2021 09:03:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627315411; cv=none; d=google.com; s=arc-20160816; b=Q815MIBG+H3kc2JLPy/P88VN78oGJksWumGFMPR7QPeU5ShzdoO3KzrJ6H8dohE+7f 8bcGwOfUbwQey1vrTn2JkXL7rAZW8Jvy/Wbzs0DMn7c19RDB94obptJ79ziTB1TSS3H6 PXH8IRcre6GP4fJLN+JlSu17CF9itwg8zLQBcZJty83UB17AFf+nhMVqHItiee9wGh84 buC05Itjma3+jQa1oKkOL9GBAalX9x0BdhBJKio75DSr5gAEVHXKp3+kVFmjxxG6vLVv tM00J+TFtPAPE4O8qCetrRh2v/bsYwdrgc6zbj89qGyiwjMgDI3vSXz5CynfbXuQDD6x 1pbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yzNMKgZ+n3sPHOy5HLFeTAcVFzjEmJQRDz0GGtn6DGk=; b=TAVp1hJKN9d1/mjAIQ3h7svBpWeiN/f2rroy1/CueFBCeJRjvkCeRffPSSJMg8IMZs u5kq0TW+WnWkxLgAOg0CaTrwLbK0vN1Qc11CJ+Mp5i7+KkdlsyNIIS7ZjVIn6ODFkBO2 bdpSw3hbouiA6P7MybZZAbHmX7Nu8wCRWzCZoFwPk0Pu9/ByXQ0lbGBIZth1PQThN9ak /kYOVqcLwlNe4m+a/J1XKxEcXshZpJDHvNgatochaLDxulUMypLwhTaE0ysP6dCKI6YE 3fJNe5z7vxhAvoLIcxxVsLvBUP/pUxKKHuAPrIcO/Zwrj98fVJCsZxrSiS3vIWGYAYiZ lVlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=V+e5O53H; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c4si350337edd.252.2021.07.26.09.03.07; Mon, 26 Jul 2021 09:03:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=V+e5O53H; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237110AbhGZPVE (ORCPT + 99 others); Mon, 26 Jul 2021 11:21:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:51910 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236471AbhGZPLO (ORCPT ); Mon, 26 Jul 2021 11:11:14 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C700460F44; Mon, 26 Jul 2021 15:51:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627314702; bh=MQJQYRf8jqtglYF2/ToZQ1Z8XEKoYNADqffqVFJzq1k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=V+e5O53Har6v5D9+/OEhrDV98ShMBWcsUP/hAaJB4ciWlVNduwLWNJ8NSrVM/Ult6 n25iaaovjOI17eXBg45WGh4BMa4H/K/o53lokS0vsXW4/M/ztQdIUf/cm5SLIF/wc1 XRRqik02wEohpJtj9ULJ4o2hhKj8IMYwRVWB+nmE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aleksandr Loktionov , Grzegorz Siwik , Arkadiusz Kubalewski , Slawomir Laba , Sylwester Dziedziuch , Mateusz Palczewski , Tony Brelinski , Tony Nguyen , Sasha Levin Subject: [PATCH 4.19 059/120] igb: Check if num of q_vectors is smaller than max before array access Date: Mon, 26 Jul 2021 17:38:31 +0200 Message-Id: <20210726153834.272782368@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210726153832.339431936@linuxfoundation.org> References: <20210726153832.339431936@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aleksandr Loktionov [ Upstream commit 6c19d772618fea40d9681f259368f284a330fd90 ] Ensure that the adapter->q_vector[MAX_Q_VECTORS] array isn't accessed beyond its size. It was fixed by using a local variable num_q_vectors as a limit for loop index, and ensure that num_q_vectors is not bigger than MAX_Q_VECTORS. Fixes: 047e0030f1e6 ("igb: add new data structure for handling interrupts and NAPI") Signed-off-by: Aleksandr Loktionov Reviewed-by: Grzegorz Siwik Reviewed-by: Arkadiusz Kubalewski Reviewed-by: Slawomir Laba Reviewed-by: Sylwester Dziedziuch Reviewed-by: Mateusz Palczewski Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/igb/igb_main.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c index 8558d2e4ec18..243e304c35cd 100644 --- a/drivers/net/ethernet/intel/igb/igb_main.c +++ b/drivers/net/ethernet/intel/igb/igb_main.c @@ -938,6 +938,7 @@ static void igb_configure_msix(struct igb_adapter *adapter) **/ static int igb_request_msix(struct igb_adapter *adapter) { + unsigned int num_q_vectors = adapter->num_q_vectors; struct net_device *netdev = adapter->netdev; int i, err = 0, vector = 0, free_vector = 0; @@ -946,7 +947,13 @@ static int igb_request_msix(struct igb_adapter *adapter) if (err) goto err_out; - for (i = 0; i < adapter->num_q_vectors; i++) { + if (num_q_vectors > MAX_Q_VECTORS) { + num_q_vectors = MAX_Q_VECTORS; + dev_warn(&adapter->pdev->dev, + "The number of queue vectors (%d) is higher than max allowed (%d)\n", + adapter->num_q_vectors, MAX_Q_VECTORS); + } + for (i = 0; i < num_q_vectors; i++) { struct igb_q_vector *q_vector = adapter->q_vector[i]; vector++; -- 2.30.2