373-brcmfmac-avoid-null-pointer-access-when-brcmf_msgbuf.patch 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. From: Arend van Spriel <[email protected]>
  2. Date: Tue, 26 May 2015 13:19:46 +0200
  3. Subject: [PATCH] brcmfmac: avoid null pointer access when
  4. brcmf_msgbuf_get_pktid() fails
  5. The function brcmf_msgbuf_get_pktid() may return a NULL pointer so
  6. the callers should check the return pointer before accessing it to
  7. avoid the crash below (see [1]):
  8. brcmfmac: brcmf_msgbuf_get_pktid: Invalid packet id 273 (not in use)
  9. BUG: unable to handle kernel NULL pointer dereference at 0000000000000080
  10. IP: [<ffffffff8145b225>] skb_pull+0x5/0x50
  11. PGD 0
  12. Oops: 0000 [#1] PREEMPT SMP
  13. Modules linked in: pci_stub vboxpci(O) vboxnetflt(O) vboxnetadp(O) vboxdrv(O)
  14. snd_hda_codec_hdmi bnep mousedev hid_generic ushwmon msr ext4 crc16 mbcache
  15. jbd2 sd_mod uas usb_storage ahci libahci libata scsi_mod xhci_pci xhci_hcd
  16. usbcore usb_common
  17. CPU: 0 PID: 1661 Comm: irq/61-brcmf_pc Tainted: G O 4.0.1-MacbookPro-ARCH #1
  18. Hardware name: Apple Inc. MacBookPro12,1/Mac-E43C1C25D4880AD6,
  19. BIOS MBP121.88Z.0167.B02.1503241251 03/24/2015
  20. task: ffff880264203cc0 ti: ffff88025ffe4000 task.ti: ffff88025ffe4000
  21. RIP: 0010:[<ffffffff8145b225>] [<ffffffff8145b225>] skb_pull+0x5/0x50
  22. RSP: 0018:ffff88025ffe7d40 EFLAGS: 00010202
  23. RAX: 0000000000000000 RBX: ffff88008a33c000 RCX: 0000000000000044
  24. RDX: 0000000000000000 RSI: 000000000000004a RDI: 0000000000000000
  25. RBP: ffff88025ffe7da8 R08: 0000000000000096 R09: 000000000000004a
  26. R10: 0000000000000000 R11: 000000000000048e R12: ffff88025ff14f00
  27. R13: 0000000000000000 R14: ffff880263b48200 R15: ffff88008a33c000
  28. FS: 0000000000000000(0000) GS:ffff88026ec00000(0000) knlGS:0000000000000000
  29. CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  30. CR2: 0000000000000080 CR3: 000000000180b000 CR4: 00000000003407f0
  31. Stack:
  32. ffffffffa06aed74 ffff88025ffe7dc8 ffff880263b48270 ffff880263b48278
  33. 05ea88020000004a 0002ffff81014635 000000001720b2f6 ffff88026ec116c0
  34. ffff880263b48200 0000000000010000 ffff880263b4ae00 ffff880264203cc0
  35. Call Trace:
  36. [<ffffffffa06aed74>] ? brcmf_msgbuf_process_rx+0x404/0x480 [brcmfmac]
  37. [<ffffffff810cea60>] ? irq_finalize_oneshot.part.30+0xf0/0xf0
  38. [<ffffffffa06afb55>] brcmf_proto_msgbuf_rx_trigger+0x35/0xf0 [brcmfmac]
  39. [<ffffffffa06baf2a>] brcmf_pcie_isr_thread_v2+0x8a/0x130 [brcmfmac]
  40. [<ffffffff810cea80>] irq_thread_fn+0x20/0x50
  41. [<ffffffff810ceddf>] irq_thread+0x13f/0x170
  42. [<ffffffff810cebf0>] ? wake_threads_waitq+0x30/0x30
  43. [<ffffffff810ceca0>] ? irq_thread_dtor+0xb0/0xb0
  44. [<ffffffff81092a08>] kthread+0xd8/0xf0
  45. [<ffffffff81092930>] ? kthread_create_on_node+0x1c0/0x1c0
  46. [<ffffffff8156d898>] ret_from_fork+0x58/0x90
  47. [<ffffffff81092930>] ? kthread_create_on_node+0x1c0/0x1c0
  48. Code: 01 83 e2 f7 88 50 01 48 83 c4 08 5b 5d f3 c3 0f 1f 80 00 00 00 00 83 e2
  49. f7 88 50 01 c3 66 0f 1f 84 00 00 00 00 00 0f 1f
  50. RIP [<ffffffff8145b225>] skb_pull+0x5/0x50
  51. RSP <ffff88025ffe7d40>
  52. CR2: 0000000000000080
  53. ---[ end trace b074c0f90e7c997d ]---
  54. [1] http://mid.gmane.org/[email protected]
  55. Cc: <[email protected]> # v3.18, v3.19, v4.0, v4.1
  56. Reported-by: Michael Hornung <[email protected]>
  57. Reviewed-by: Hante Meuleman <[email protected]>
  58. Reviewed-by: Pieter-Paul Giesberts <[email protected]>
  59. Signed-off-by: Arend van Spriel <[email protected]>
  60. ---
  61. --- a/drivers/net/wireless/brcm80211/brcmfmac/msgbuf.c
  62. +++ b/drivers/net/wireless/brcm80211/brcmfmac/msgbuf.c
  63. @@ -500,11 +500,9 @@ static int brcmf_msgbuf_query_dcmd(struc
  64. msgbuf->rx_pktids,
  65. msgbuf->ioctl_resp_pktid);
  66. if (msgbuf->ioctl_resp_ret_len != 0) {
  67. - if (!skb) {
  68. - brcmf_err("Invalid packet id idx recv'd %d\n",
  69. - msgbuf->ioctl_resp_pktid);
  70. + if (!skb)
  71. return -EBADF;
  72. - }
  73. +
  74. memcpy(buf, skb->data, (len < msgbuf->ioctl_resp_ret_len) ?
  75. len : msgbuf->ioctl_resp_ret_len);
  76. }
  77. @@ -866,10 +864,8 @@ brcmf_msgbuf_process_txstatus(struct brc
  78. flowid -= BRCMF_NROF_H2D_COMMON_MSGRINGS;
  79. skb = brcmf_msgbuf_get_pktid(msgbuf->drvr->bus_if->dev,
  80. msgbuf->tx_pktids, idx);
  81. - if (!skb) {
  82. - brcmf_err("Invalid packet id idx recv'd %d\n", idx);
  83. + if (!skb)
  84. return;
  85. - }
  86. set_bit(flowid, msgbuf->txstatus_done_map);
  87. commonring = msgbuf->flowrings[flowid];
  88. @@ -1148,6 +1144,8 @@ brcmf_msgbuf_process_rx_complete(struct
  89. skb = brcmf_msgbuf_get_pktid(msgbuf->drvr->bus_if->dev,
  90. msgbuf->rx_pktids, idx);
  91. + if (!skb)
  92. + return;
  93. if (data_offset)
  94. skb_pull(skb, data_offset);