Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp2873079pxy; Sun, 25 Apr 2021 06:56:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyY2Klb7rO82MgPb59EY7poiN6y7vCj7xrhObDPxSHNme/G5UXpHZibp+bqiyyqIn0vx0mM X-Received: by 2002:a17:907:3f8e:: with SMTP id hr14mr13640250ejc.258.1619358996409; Sun, 25 Apr 2021 06:56:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619358996; cv=none; d=google.com; s=arc-20160816; b=XEwC9CicaYLJKyJGJcZxGUUR6EtTUbnldKsyl2Rt5/VDznRbUWzeirtInjeVlsr7LI vOsNAHrpy0cg9WFTjaBxYm8XRf1K4PH9NwSIkF+IqVa3DbEvKxB4aW6KSAnlX4vde4Ac y4yCOE0j4qqC5/Ai/SKLx1fQ0CJjxUjk2v2d2PjIcIHvgtIrOdImUeaOsgpMW3maBZe8 xGAcHe01zdt7eEzlCUFPKPbSknFQ3EyWW2cn20FHbnWamAOzTT7kMkG+vYxmCwU7WsKD /Tf6Pctq1rIqZFU8YOpg9EoN4JBupZXgdCfwSflltKysNCWM77EHVwdbM+Cx+A5A4BON TN7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=78sEqPLLd0jYHpjnr5AEe5dLZhkSl8yhIpWPxUpqRv4=; b=xTWHkCSNvaEbJ7hS766TppKHjKy9MYjPX6eId/Xs+yVFShAc2F0NMV3PXOed2AxtP0 fqDlYlDuXWHmnqyCdO93QbIeiLpEV5RF8alTqIuu7DmxbmrRxHjSw1aMjG4AtICKCGbc pvU1otohpqpbp7bAAnjY4NEYw4YWXmkblsRFjuJhaSfD7dOL1T88Tr+1AnDV5UVmRnn4 vpj3SNLdyL2A4WGbJ8wmgFC8+GVzc8FQpU9Tc+XF80draRAxMuLMIzv0sm545Wfecvu6 XOQCcxEY0ZSubejRrRkyf9YDHtWIhSgfNJYJFR18drtQ7F1db+isrS2VmZArKUCtbq02 uLuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QcdMxScW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z2si10305706edx.455.2021.04.25.06.56.05; Sun, 25 Apr 2021 06:56:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QcdMxScW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230249AbhDYNuU (ORCPT + 99 others); Sun, 25 Apr 2021 09:50:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:51392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230214AbhDYNuU (ORCPT ); Sun, 25 Apr 2021 09:50:20 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8E5F761363; Sun, 25 Apr 2021 13:49:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1619358580; bh=DGguM+dXVFEHhxP7ffgIr3ztEhgYe2f/QSBnkIvEibg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=QcdMxScWzLppYu6Iki2rSJNfB9zAS7qdSTLw6JxFGaxv9tJQc7z5EYcxMqJZQ1ynd 4BTi3TSmsEUfHXh6hTDVqYuAEsmKY8ZbDJfIUl7FhiHsy6EuxQa7VmIuXkewgIAeg6 jMnX4UBU3TBE7frm0bLeSt+cou2Cyk041SgCsFS/gT2AvSyoVUbBNfBXkfiWiMG5mO zrgM7/V8Y6n+X/x2JHmdJkqeOep+kQXzxgRkKchJpsV8xyNuZwRUNcDDOEx9WVBuVs rcW0HTPPP/1430SRaa3sHHMSh1tq5x1Bt8QPF+X4Go3dtW7Yu4Ja4B5tebdvMQJddJ hatRqgoAuxOcA== Date: Sun, 25 Apr 2021 16:49:36 +0300 From: Leon Romanovsky To: Lv Yunlong Cc: bmt@zurich.ibm.com, dledford@redhat.com, jgg@ziepe.ca, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] rdma/siw: Fix a use after free in siw_alloc_mr Message-ID: References: <20210425132001.3994-1-lyl2019@mail.ustc.edu.cn> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210425132001.3994-1-lyl2019@mail.ustc.edu.cn> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Apr 25, 2021 at 06:20:01AM -0700, Lv Yunlong wrote: > Our code analyzer reported a uaf. > > In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the implementation > of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed > via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point > to a freed object. After, the execution continue up to the err_out branch > of siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr). > > Fixes: 2251334dcac9e ("rdma/siw: application buffer management") > Signed-off-by: Lv Yunlong > --- > drivers/infiniband/sw/siw/siw_mem.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/drivers/infiniband/sw/siw/siw_mem.c b/drivers/infiniband/sw/siw/siw_mem.c > index 34a910cf0edb..3bde3b6fca05 100644 > --- a/drivers/infiniband/sw/siw/siw_mem.c > +++ b/drivers/infiniband/sw/siw/siw_mem.c > @@ -114,6 +114,7 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj, > if (xa_alloc_cyclic(&sdev->mem_xa, &id, mem, limit, &next, > GFP_KERNEL) < 0) { > kfree(mem); > + mr->mem = NULL; > return -ENOMEM; > } Please move "mr->mem = mem;" assignment to be here, after if (...) {} section. Thanks > /* Set the STag index part */ > -- > 2.25.1 > >