mirror of https://gitee.com/openkylin/linux.git
bnx2x: Don't post statistics to malicious VFs
Once firmware indicates that a given VF is malicious and until that VF passes an FLR all bets are off - PF can't know anything is happening to the VF [since VF can't communicate anything to its PF]. But PF is currently still periodically asking device to collect statistics for the VF which might in turn fill logs by IOMMU blocking memory access done by the VF's PCI function [in the case VF has unmapped its buffers]. Signed-off-by: Yuval Mintz <Yuval.Mintz@cavium.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
92f85f05ca
commit
3523882229
|
@ -901,6 +901,8 @@ static void bnx2x_vf_flr(struct bnx2x *bp, struct bnx2x_virtf *vf)
|
||||||
/* release VF resources */
|
/* release VF resources */
|
||||||
bnx2x_vf_free_resc(bp, vf);
|
bnx2x_vf_free_resc(bp, vf);
|
||||||
|
|
||||||
|
vf->malicious = false;
|
||||||
|
|
||||||
/* re-open the mailbox */
|
/* re-open the mailbox */
|
||||||
bnx2x_vf_enable_mbx(bp, vf->abs_vfid);
|
bnx2x_vf_enable_mbx(bp, vf->abs_vfid);
|
||||||
return;
|
return;
|
||||||
|
@ -1822,9 +1824,11 @@ int bnx2x_iov_eq_sp_event(struct bnx2x *bp, union event_ring_elem *elem)
|
||||||
vf->abs_vfid, qidx);
|
vf->abs_vfid, qidx);
|
||||||
bnx2x_vf_handle_rss_update_eqe(bp, vf);
|
bnx2x_vf_handle_rss_update_eqe(bp, vf);
|
||||||
case EVENT_RING_OPCODE_VF_FLR:
|
case EVENT_RING_OPCODE_VF_FLR:
|
||||||
case EVENT_RING_OPCODE_MALICIOUS_VF:
|
|
||||||
/* Do nothing for now */
|
/* Do nothing for now */
|
||||||
return 0;
|
return 0;
|
||||||
|
case EVENT_RING_OPCODE_MALICIOUS_VF:
|
||||||
|
vf->malicious = true;
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -1905,6 +1909,13 @@ void bnx2x_iov_adjust_stats_req(struct bnx2x *bp)
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (vf->malicious) {
|
||||||
|
DP_AND((BNX2X_MSG_IOV | BNX2X_MSG_STATS),
|
||||||
|
"vf %d malicious so no stats for it\n",
|
||||||
|
vf->abs_vfid);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
DP_AND((BNX2X_MSG_IOV | BNX2X_MSG_STATS),
|
DP_AND((BNX2X_MSG_IOV | BNX2X_MSG_STATS),
|
||||||
"add addresses for vf %d\n", vf->abs_vfid);
|
"add addresses for vf %d\n", vf->abs_vfid);
|
||||||
for_each_vfq(vf, j) {
|
for_each_vfq(vf, j) {
|
||||||
|
|
|
@ -141,6 +141,7 @@ struct bnx2x_virtf {
|
||||||
#define VF_RESET 3 /* VF FLR'd, pending cleanup */
|
#define VF_RESET 3 /* VF FLR'd, pending cleanup */
|
||||||
|
|
||||||
bool flr_clnup_stage; /* true during flr cleanup */
|
bool flr_clnup_stage; /* true during flr cleanup */
|
||||||
|
bool malicious; /* true if FW indicated so, until FLR */
|
||||||
|
|
||||||
/* dma */
|
/* dma */
|
||||||
dma_addr_t fw_stat_map;
|
dma_addr_t fw_stat_map;
|
||||||
|
|
Loading…
Reference in New Issue