Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1534523rdb; Thu, 7 Dec 2023 01:41:18 -0800 (PST) X-Google-Smtp-Source: AGHT+IGPwG2hiCaperscgGCz841skaGWYgKV6sYP+iJrUGFRpG7CleIsb0g/9H7Ke2v+BtfsY8jk X-Received: by 2002:aa7:8882:0:b0:6ce:2731:c235 with SMTP id z2-20020aa78882000000b006ce2731c235mr2284283pfe.36.1701942078040; Thu, 07 Dec 2023 01:41:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701942078; cv=none; d=google.com; s=arc-20160816; b=Nmi8+TjZqy3cJSNto9VwM4IpgIz/s4ZWcHG02ey1OWG2INPSPT5MdTBLEsM2ldCNOB KRuLhvIgGQn4ZLnTlnIyEpFrrx+1eC+ushMHt4fWRcbNUWVlKRoVtjUMbcPeYMBwDb5r ckT3TOytdZ0whFK1oA8lw3dtTgYbwSHxtoRuw7+/nxl1iRPSWdIOO/2nzWsF+EKOO6Bb nwq57a3GWHmLjbgTAJWvdOPTQnEaJQe1QQzN2WB8pmzX6Yg6BN/Je4ag9TvNVccarWD0 FLdY1mnnqfcVfM0b2OSeR55W2ZF4vAj2cjp6aCNDvNbvObZOsB0GKA2nBNaxBmmYlgJt Mw0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=EoU5bKP77oHOfxJLawEeuhYPQEuu0tN2Kw0NmbJ/3dc=; fh=K0Wr/lpZZXQPRg4zlVZEj+EFE/otAusXOEelsMQtSLI=; b=lDEqR+3m7uLNyasaG0hhM1YJ3i6x8O4XKwv0ZwFFD7L7M/xoxcpUqyH6VTCTolGDZw cfdZxiAkQ6+Npc359PXAHKot3idHkfcckh1yHkhgFcZQKa22wyvUGw3matcLoNa95b+F TK5+DI8xuR+PbbWG2QOXKqKifIUXUFgiWyqook1nTQ9eYxJR+95FiE99mKw/AphuTozt +p4iIMVAtNf7gugF3WwHoZnEmr+L9ntnpuvleAm6ZRjhPuyO+8pmOEWMJnLdGSCedvoQ AqgiMiaM9eYc2VoFkeuOH+tEfME3XSMdyGe67SDpG6JMc6jHxaD+So0+gIMw7fMEyY69 iBmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id t11-20020a056a0021cb00b006ce51863712si935655pfj.330.2023.12.07.01.41.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 01:41:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 02339804437A; Thu, 7 Dec 2023 01:41:15 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231440AbjLGJlA (ORCPT + 99 others); Thu, 7 Dec 2023 04:41:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54402 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229379AbjLGJk6 (ORCPT ); Thu, 7 Dec 2023 04:40:58 -0500 Received: from zju.edu.cn (spam.zju.edu.cn [61.164.42.155]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 03979FA; Thu, 7 Dec 2023 01:40:59 -0800 (PST) Received: from localhost.localdomain (unknown [10.190.66.146]) by mail-app2 (Coremail) with SMTP id by_KCgCHj08pknFlatRXAA--.45476S4; Thu, 07 Dec 2023 17:36:49 +0800 (CST) From: Dinghao Liu To: dinghao.liu@zju.edu.cn Cc: Ariel Elior , Manish Chopra , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Yuval Mintz , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] [v2] qed: Fix a potential use-after-free in qed_cxt_tables_alloc Date: Thu, 7 Dec 2023 17:36:06 +0800 Message-Id: <20231207093606.17868-1-dinghao.liu@zju.edu.cn> X-Mailer: git-send-email 2.17.1 X-CM-TRANSID: by_KCgCHj08pknFlatRXAA--.45476S4 X-Coremail-Antispam: 1UD129KBjvJXoW7Cw1fuw1fWFykCFyxtF1kZrb_yoW8tw1fpr 4xJFy2vF40qwn8Xa1kuw1rtFy5Zay7KFy7Gry0kw4ruFn8XFn7X3W7Aa4ruw1xur98JF45 tFWjkFnagw1qkFUanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUvm1xkIjI8I6I8E6xAIw20EY4v20xvaj40_Wr0E3s1l1IIY67AE w4v_Jr0_Jr4l8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xvwVC0I7IYx2 IY67AKxVWDJVCq3wA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVWxJr0_GcWl84ACjcxK6I8E 87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_GcCE3s1le2I262IYc4CY6c 8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_ Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwI xGrwACjI8F5VA0II8E6IAqYI8I648v4I1lFIxGxcIEc7CjxVA2Y2ka0xkIwI1l42xK82IY c2Ij64vIr41l42xK82IY6x8ErcxFaVAv8VW8uw4UJr1UMxC20s026xCaFVCjc4AY6r1j6r 4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF 67AKxVWUtVW8ZwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2I x0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2 z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2KfnxnU UI43ZEXa7VUbXdbUUUUUU== X-CM-SenderInfo: qrrzjiaqtzq6lmxovvfxof0/1tbiAgwCBmVwRZREWwAAsR X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 07 Dec 2023 01:41:15 -0800 (PST) qed_ilt_shadow_alloc() will call qed_ilt_shadow_free() to free p_hwfn->p_cxt_mngr->ilt_shadow on error. However, qed_cxt_tables_alloc() accesses the freed pointer on failure of qed_ilt_shadow_alloc() through calling qed_cxt_mngr_free(), which may lead to use-after-free. Fix this issue by setting p_hwfn->p_cxt_mngr->ilt_shadow to NULL in qed_ilt_shadow_free(). Fixes: fe56b9e6a8d9 ("qed: Add module with basic common support") Signed-off-by: Dinghao Liu --- Changelog: v2: -Change the bug type from double-free to use-after-free. -Move the null check against p_mngr->ilt_shadow to the beginning of the function qed_ilt_shadow_free(). -When kcalloc() fails in qed_ilt_shadow_alloc(), just return because there is nothing to free. --- drivers/net/ethernet/qlogic/qed/qed_cxt.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/qlogic/qed/qed_cxt.c b/drivers/net/ethernet/qlogic/qed/qed_cxt.c index 65e20693c549..911e0c0d3563 100644 --- a/drivers/net/ethernet/qlogic/qed/qed_cxt.c +++ b/drivers/net/ethernet/qlogic/qed/qed_cxt.c @@ -921,9 +921,12 @@ static void qed_ilt_shadow_free(struct qed_hwfn *p_hwfn) struct qed_cxt_mngr *p_mngr = p_hwfn->p_cxt_mngr; u32 ilt_size, i; + if (!p_mngr->ilt_shadow) + return; + ilt_size = qed_cxt_ilt_shadow_size(p_cli); - for (i = 0; p_mngr->ilt_shadow && i < ilt_size; i++) { + for (i = 0; i < ilt_size; i++) { struct phys_mem_desc *p_dma = &p_mngr->ilt_shadow[i]; if (p_dma->virt_addr) @@ -933,6 +936,7 @@ static void qed_ilt_shadow_free(struct qed_hwfn *p_hwfn) p_dma->virt_addr = NULL; } kfree(p_mngr->ilt_shadow); + p_hwfn->p_cxt_mngr->ilt_shadow = NULL; } static int qed_ilt_blk_alloc(struct qed_hwfn *p_hwfn, @@ -995,10 +999,8 @@ static int qed_ilt_shadow_alloc(struct qed_hwfn *p_hwfn) size = qed_cxt_ilt_shadow_size(clients); p_mngr->ilt_shadow = kcalloc(size, sizeof(struct phys_mem_desc), GFP_KERNEL); - if (!p_mngr->ilt_shadow) { - rc = -ENOMEM; - goto ilt_shadow_fail; - } + if (!p_mngr->ilt_shadow) + return -ENOMEM; DP_VERBOSE(p_hwfn, QED_MSG_ILT, "Allocated 0x%x bytes for ilt shadow\n", -- 2.17.1