Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2177554pxk; Mon, 14 Sep 2020 06:48:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzu8JfH4JWyK6lAA1sZeLMVDyz2ZTubNGMviWI9D9ddteuMNu/lqrzQXnwVA9iOjfSwpQkI X-Received: by 2002:a17:906:7f0b:: with SMTP id d11mr15383300ejr.439.1600091321120; Mon, 14 Sep 2020 06:48:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600091321; cv=none; d=google.com; s=arc-20160816; b=WjiOhGQdv8drUQcQsfZPjO7q4TNmaxzDeVK5cQRPVnK3O9WoIRIbg2tkBDIc1mNtxx AIsshkQPGL/kqnivMFG9YVp+v5fo91DSx4NUEVQSqISU5B2f9dHMBrq6kfuv2XPAGKx6 v6CHSxAuTOWGo8fl6bndLTF7hyqYD2oGsZa2/K0UFujna+YWK7eYT3Eh6Zyx7B/28eEt RGlf352taDtqKkPvWqPM8saqZ8xHueY+PHK1TbsnFGLtWgKJ3r4T5JPFEXaG7tkIoUxd wJ3o1V8mEYuq+RRPeuwyKzJdZQtUUhmCvOXcixqw6EvHKNivBQD7H59OypSUR0Ce/+d3 wGog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=VDFf7hbL2ujN8s8a2I30Af1l7eed0ojFf/+W47iXnwU=; b=opCD7P89oqI9rropXnYvZjwiz82RXL3HJuGXd4fsc5Dd+Yl3LmGy0asToDGXjPqH0M m7YDy6wwnq2aqY2qf34H+/4R33JytOOtP/sokQu21SqLfFFZDgfu5tGUM+hcNyYIRi7S Dq5DSnP5k64RL29sUArkF/xLizRw1UUYtJ4DqGUUDu4btm3M2NAjW0/F6TPcUCbcN5Mf Siw1j76ctD5z1pXKnWrLjxWyKRjGmN9JQwd0B1nPoAER3DK1Ka5Okbj052T6GOnTb6Nl zNDfRu31/SeULMJCZ5X8+7Oy+90LWQXNOD7oscjJBZjYHgJry74xo0qbOG7K0s2D0jz6 9oaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZMHzV3rL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc23si6947205ejb.25.2020.09.14.06.48.18; Mon, 14 Sep 2020 06:48:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZMHzV3rL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726687AbgINNpz (ORCPT + 99 others); Mon, 14 Sep 2020 09:45:55 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:55768 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726705AbgINNhi (ORCPT ); Mon, 14 Sep 2020 09:37:38 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1600090655; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=VDFf7hbL2ujN8s8a2I30Af1l7eed0ojFf/+W47iXnwU=; b=ZMHzV3rL0l2XVtNsq5bqpNxInsY2wMIR1WhZtWhyIQWXertPiWnFJlNrfsBJpEraSa3S3m GYpnUMUxBwhjQiJG3DsdSq+lLh9FpJ82ZV7rrT6C/CCKVgRsTtYHGfM9UX5QXG+bb3tBIa dCbHqBwf3sGGtwmW/aP/NWMoMZu1lDU= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-295-5ULj2_lnPJOnQqboJzlpJg-1; Mon, 14 Sep 2020 09:37:32 -0400 X-MC-Unique: 5ULj2_lnPJOnQqboJzlpJg-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 5884D425CB; Mon, 14 Sep 2020 13:37:30 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.40.195.78]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0BCD57839F; Mon, 14 Sep 2020 13:37:26 +0000 (UTC) From: Vitaly Kuznetsov To: x86@kernel.org Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov , Paolo Bonzini , Sean Christopherson , Wanpeng Li , Jim Mattson , Joerg Roedel , Dan Carpenter , Colin King , Thomas Gleixner , Ingo Molnar Subject: [PATCH tip] KVM: nSVM: avoid freeing uninitialized pointers in svm_set_nested_state() Date: Mon, 14 Sep 2020 15:37:25 +0200 Message-Id: <20200914133725.650221-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The save and ctl pointers are passed uninitialized to kfree() when svm_set_nested_state() follows the 'goto out_set_gif' path. While the issue could've been fixed by initializing these on-stack varialbles to NULL, it seems preferable to eliminate 'out_set_gif' label completely as it is not actually a failure path and duplicating a single svm_set_gif() call doesn't look too bad. Fixes: 6ccbd29ade0d ("KVM: SVM: nested: Don't allocate VMCB structures on stack") Addresses-Coverity: ("Uninitialized pointer read") Reported-by: Dan Carpenter Reported-by: Joerg Roedel Reported-by: Colin King Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/svm/nested.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index 598a769f1961..67e6d053985d 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -1094,7 +1094,8 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu, if (!(kvm_state->flags & KVM_STATE_NESTED_GUEST_MODE)) { svm_leave_nested(svm); - goto out_set_gif; + svm_set_gif(svm, !!(kvm_state->flags & KVM_STATE_NESTED_GIF_SET)); + return 0; } if (!page_address_valid(vcpu, kvm_state->hdr.svm.vmcb_pa)) @@ -1150,7 +1151,6 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu, if (!nested_svm_vmrun_msrpm(svm)) return -EINVAL; -out_set_gif: svm_set_gif(svm, !!(kvm_state->flags & KVM_STATE_NESTED_GIF_SET)); ret = 0; -- 2.25.4