linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
@ 2021-04-26  1:16 Lv Yunlong
  2021-04-26  5:08 ` Leon Romanovsky
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: Lv Yunlong @ 2021-04-26  1:16 UTC (permalink / raw)
  To: bmt, dledford, jgg; +Cc: linux-rdma, linux-kernel, Lv Yunlong

Our code analyzer reported a uaf.

In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the implementation
of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed
via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point
to a freed object. After, the execution continue up to the err_out branch
of siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).

My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
section, to avoid the uaf.

Fixes: 2251334dcac9e ("rdma/siw: application buffer management")
Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
---
 drivers/infiniband/sw/siw/siw_mem.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/drivers/infiniband/sw/siw/siw_mem.c b/drivers/infiniband/sw/siw/siw_mem.c
index 34a910cf0edb..96b38cfbb513 100644
--- a/drivers/infiniband/sw/siw/siw_mem.c
+++ b/drivers/infiniband/sw/siw/siw_mem.c
@@ -106,8 +106,6 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
 	mem->perms = rights & IWARP_ACCESS_MASK;
 	kref_init(&mem->ref);
 
-	mr->mem = mem;
-
 	get_random_bytes(&next, 4);
 	next &= 0x00ffffff;
 
@@ -116,6 +114,8 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
 		kfree(mem);
 		return -ENOMEM;
 	}
+
+	mr->mem = mem;
 	/* Set the STag index part */
 	mem->stag = id << 8;
 	mr->base_mr.lkey = mr->base_mr.rkey = mem->stag;
-- 
2.25.1



^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
  2021-04-26  1:16 [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr Lv Yunlong
@ 2021-04-26  5:08 ` Leon Romanovsky
  2021-04-26  9:26   ` lyl2019
  2021-04-26  7:26 ` Bernard Metzler
  2021-04-27 18:31 ` Jason Gunthorpe
  2 siblings, 1 reply; 5+ messages in thread
From: Leon Romanovsky @ 2021-04-26  5:08 UTC (permalink / raw)
  To: Lv Yunlong; +Cc: bmt, dledford, jgg, linux-rdma, linux-kernel

On Sun, Apr 25, 2021 at 06:16:47PM -0700, Lv Yunlong wrote:
> Our code analyzer reported a uaf.

Can you please share more details about this "code analyzer"?

Thanks

> 
> In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the implementation
> of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed
> via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point
> to a freed object. After, the execution continue up to the err_out branch
> of siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).
> 
> My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
> section, to avoid the uaf.
> 
> Fixes: 2251334dcac9e ("rdma/siw: application buffer management")
> Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
> ---
>  drivers/infiniband/sw/siw/siw_mem.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/drivers/infiniband/sw/siw/siw_mem.c b/drivers/infiniband/sw/siw/siw_mem.c
> index 34a910cf0edb..96b38cfbb513 100644
> --- a/drivers/infiniband/sw/siw/siw_mem.c
> +++ b/drivers/infiniband/sw/siw/siw_mem.c
> @@ -106,8 +106,6 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
>  	mem->perms = rights & IWARP_ACCESS_MASK;
>  	kref_init(&mem->ref);
>  
> -	mr->mem = mem;
> -
>  	get_random_bytes(&next, 4);
>  	next &= 0x00ffffff;
>  
> @@ -116,6 +114,8 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
>  		kfree(mem);
>  		return -ENOMEM;
>  	}
> +
> +	mr->mem = mem;
>  	/* Set the STag index part */
>  	mem->stag = id << 8;
>  	mr->base_mr.lkey = mr->base_mr.rkey = mem->stag;
> -- 
> 2.25.1
> 
> 

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
  2021-04-26  1:16 [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr Lv Yunlong
  2021-04-26  5:08 ` Leon Romanovsky
@ 2021-04-26  7:26 ` Bernard Metzler
  2021-04-27 18:31 ` Jason Gunthorpe
  2 siblings, 0 replies; 5+ messages in thread
From: Bernard Metzler @ 2021-04-26  7:26 UTC (permalink / raw)
  To: Lv Yunlong; +Cc: dledford, jgg, linux-rdma, linux-kernel, leon

-----"Lv Yunlong" <lyl2019@mail.ustc.edu.cn> wrote: -----

>To: bmt@zurich.ibm.com, dledford@redhat.com, jgg@ziepe.ca
>From: "Lv Yunlong" <lyl2019@mail.ustc.edu.cn>
>Date: 04/26/2021 03:17AM
>Cc: linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, "Lv
>Yunlong" <lyl2019@mail.ustc.edu.cn>
>Subject: [EXTERNAL] [PATCH v2] rdma/siw: Fix a use after free in
>siw_alloc_mr
>
>Our code analyzer reported a uaf.
>
>In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the
>implementation
>of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed
>via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point
>to a freed object. After, the execution continue up to the err_out
>branch
>of siw_alloc_mr, and the freed mr->mem is used in
>siw_mr_drop_mem(mr).
>
>My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0)
>{}
>section, to avoid the uaf.
>
>Fixes: 2251334dcac9e ("rdma/siw: application buffer management")
>Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
>---
> drivers/infiniband/sw/siw/siw_mem.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
>diff --git a/drivers/infiniband/sw/siw/siw_mem.c
>b/drivers/infiniband/sw/siw/siw_mem.c
>index 34a910cf0edb..96b38cfbb513 100644
>--- a/drivers/infiniband/sw/siw/siw_mem.c
>+++ b/drivers/infiniband/sw/siw/siw_mem.c
>@@ -106,8 +106,6 @@ int siw_mr_add_mem(struct siw_mr *mr, struct
>ib_pd *pd, void *mem_obj,
> 	mem->perms = rights & IWARP_ACCESS_MASK;
> 	kref_init(&mem->ref);
> 
>-	mr->mem = mem;
>-
> 	get_random_bytes(&next, 4);
> 	next &= 0x00ffffff;
> 
>@@ -116,6 +114,8 @@ int siw_mr_add_mem(struct siw_mr *mr, struct
>ib_pd *pd, void *mem_obj,
> 		kfree(mem);
> 		return -ENOMEM;
> 	}
>+
>+	mr->mem = mem;
> 	/* Set the STag index part */
> 	mem->stag = id << 8;
> 	mr->base_mr.lkey = mr->base_mr.rkey = mem->stag;
>-- 
>2.25.1
>
>
>
Lv Yunlong, many thanks for catching, and thanks to
Leon for improving it.

Reviewed-by: Bernard Metzler <bmt@zurich.ihm.com>


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Re: [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
  2021-04-26  5:08 ` Leon Romanovsky
@ 2021-04-26  9:26   ` lyl2019
  0 siblings, 0 replies; 5+ messages in thread
From: lyl2019 @ 2021-04-26  9:26 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: bmt, dledford, jgg, linux-rdma, linux-kernel




> -----原始邮件-----
> 发件人: "Leon Romanovsky" <leon@kernel.org>
> 发送时间: 2021-04-26 13:08:50 (星期一)
> 收件人: "Lv Yunlong" <lyl2019@mail.ustc.edu.cn>
> 抄送: bmt@zurich.ibm.com, dledford@redhat.com, jgg@ziepe.ca, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org
> 主题: Re: [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
> 
> On Sun, Apr 25, 2021 at 06:16:47PM -0700, Lv Yunlong wrote:
> > Our code analyzer reported a uaf.
> 
> Can you please share more details about this "code analyzer"?
> 
> Thanks
> 
> > 
> > In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the implementation
> > of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed
> > via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point
> > to a freed object. After, the execution continue up to the err_out branch
> > of siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).
> > 
> > My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
> > section, to avoid the uaf.
> > 
> > Fixes: 2251334dcac9e ("rdma/siw: application buffer management")
> > Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
> > ---
> >  drivers/infiniband/sw/siw/siw_mem.c | 4 ++--
> >  1 file changed, 2 insertions(+), 2 deletions(-)
> > 
> > diff --git a/drivers/infiniband/sw/siw/siw_mem.c b/drivers/infiniband/sw/siw/siw_mem.c
> > index 34a910cf0edb..96b38cfbb513 100644
> > --- a/drivers/infiniband/sw/siw/siw_mem.c
> > +++ b/drivers/infiniband/sw/siw/siw_mem.c
> > @@ -106,8 +106,6 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
> >  	mem->perms = rights & IWARP_ACCESS_MASK;
> >  	kref_init(&mem->ref);
> >  
> > -	mr->mem = mem;
> > -
> >  	get_random_bytes(&next, 4);
> >  	next &= 0x00ffffff;
> >  
> > @@ -116,6 +114,8 @@ int siw_mr_add_mem(struct siw_mr *mr, struct ib_pd *pd, void *mem_obj,
> >  		kfree(mem);
> >  		return -ENOMEM;
> >  	}
> > +
> > +	mr->mem = mem;
> >  	/* Set the STag index part */
> >  	mem->stag = id << 8;
> >  	mr->base_mr.lkey = mr->base_mr.rkey = mem->stag;
> > -- 
> > 2.25.1
> > 
> > 

Yes, i would like to share some details about it although it still has no name.
We designed this analzyer by adopt a deep learning model to recognize the
memory allocation and deallocation in kernel first. And then use Clang Static
Analyzer to scan the kernel code.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr
  2021-04-26  1:16 [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr Lv Yunlong
  2021-04-26  5:08 ` Leon Romanovsky
  2021-04-26  7:26 ` Bernard Metzler
@ 2021-04-27 18:31 ` Jason Gunthorpe
  2 siblings, 0 replies; 5+ messages in thread
From: Jason Gunthorpe @ 2021-04-27 18:31 UTC (permalink / raw)
  To: Lv Yunlong; +Cc: bmt, dledford, linux-rdma, linux-kernel

On Sun, Apr 25, 2021 at 06:16:47PM -0700, Lv Yunlong wrote:
> Our code analyzer reported a uaf.
> 
> In siw_alloc_mr, it calls siw_mr_add_mem(mr,..). In the implementation
> of siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed
> via kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point
> to a freed object. After, the execution continue up to the err_out branch
> of siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).
> 
> My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
> section, to avoid the uaf.
> 
> Fixes: 2251334dcac9e ("rdma/siw: application buffer management")
> Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
> Reviewed-by: Bernard Metzler <bmt@zurich.ihm.com>
> ---
>  drivers/infiniband/sw/siw/siw_mem.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)

Applied to for-next, thanks

Jason

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2021-04-27 18:31 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-04-26  1:16 [PATCH v2] rdma/siw: Fix a use after free in siw_alloc_mr Lv Yunlong
2021-04-26  5:08 ` Leon Romanovsky
2021-04-26  9:26   ` lyl2019
2021-04-26  7:26 ` Bernard Metzler
2021-04-27 18:31 ` Jason Gunthorpe

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).