lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 2 Nov 2018 08:48:43 +0800
From:   Yunsheng Lin <linyunsheng@...wei.com>
To:     John Garry <john.garry@...wei.com>, <davem@...emloft.net>
CC:     <huangdaode@...ilicon.com>, <xuwei5@...ilicon.com>,
        <liguozhu@...ilicon.com>, <Yisen.Zhuang@...wei.com>,
        <linuxarm@...wei.com>, <salil.mehta@...wei.com>,
        <lipeng321@...wei.com>, <netdev@...r.kernel.org>,
        <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH net] net: hns3: Fix for out-of-bounds access when setting
 pfc back pressure

On 2018/11/1 20:49, John Garry wrote:
> On 01/11/2018 12:12, Yunsheng Lin wrote:
>> The vport should be initialized to hdev->vport for each bp group,
>> otherwise it will cause out-of-bounds access and bp setting not
>> correct problem.
>>
>> [   35.254124] BUG: KASAN: slab-out-of-bounds in hclge_pause_setup_hw+0x2a0/0x3f8 [hclge]
>> [   35.254126] Read of size 2 at addr ffff803b6651581a by task kworker/0:1/14
>>
>> [   35.254132] CPU: 0 PID: 14 Comm: kworker/0:1 Not tainted 4.19.0-rc7-hulk+ #85
>> [   35.254133] Hardware name: Huawei D06/D06, BIOS Hisilicon D06 UEFI RC0 - B052 (V0.52) 09/14/2018
>> [   35.254141] Workqueue: events work_for_cpu_fn
>> [   35.254144] Call trace:
>> [   35.254147]  dump_backtrace+0x0/0x2f0
>> [   35.254149]  show_stack+0x24/0x30
>> [   35.254154]  dump_stack+0x110/0x184
>> [   35.254157]  print_address_description+0x168/0x2b0
>> [   35.254160]  kasan_report+0x184/0x310
>> [   35.254162]  __asan_load2+0x7c/0xa0
>> [   35.254170]  hclge_pause_setup_hw+0x2a0/0x3f8 [hclge]
>> [   35.254177]  hclge_tm_init_hw+0x794/0x9f0 [hclge]
>> [   35.254184]  hclge_tm_schd_init+0x48/0x58 [hclge]
>> [   35.254191]  hclge_init_ae_dev+0x778/0x1168 [hclge]
>> [   35.254196]  hnae3_register_ae_dev+0x14c/0x298 [hnae3]
>> [   35.254206]  hns3_probe+0x88/0xa8 [hns3]
>> [   35.254210]  local_pci_probe+0x7c/0xf0
>> [   35.254212]  work_for_cpu_fn+0x34/0x50
>> [   35.254214]  process_one_work+0x4d4/0xa38
>> [   35.254216]  worker_thread+0x55c/0x8d8
>> [   35.254219]  kthread+0x1b0/0x1b8
>> [   35.254222]  ret_from_fork+0x10/0x1c
>>
>> [   35.254224] The buggy address belongs to the page:
>> [   35.254228] page:ffff7e00ed994400 count:1 mapcount:0 mapping:0000000000000000 index:0x0 compound_mapcount: 0
>> [   35.273835] flags: 0xfffff8000008000(head)
>> [   35.282007] raw: 0fffff8000008000 dead000000000100 dead000000000200 0000000000000000
>> [   35.282010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
>> [   35.282012] page dumped because: kasan: bad access detected
>>
>> [   35.282014] Memory state around the buggy address:
>> [   35.282017]  ffff803b66515700: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
>> [   35.282019]  ffff803b66515780: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
>> [   35.282021] >ffff803b66515800: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
>> [   35.282022]                             ^
>> [   35.282024]  ffff803b66515880: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
>> [   35.282026]  ffff803b66515900: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
>> [   35.282028] ==================================================================
>> [   35.282029] Disabling lock debugging due to kernel taint
>> [   35.282747] hclge driver initialization finished.
>>
>> Fixes: 67bf2541f4b9 ("net: hns3: Fixes the back pressure setting when sriov is enabled")
>> Signed-off-by: Yunsheng Lin <linyunsheng@...wei.com>
>> ---
>>  drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c | 3 ++-
>>  1 file changed, 2 insertions(+), 1 deletion(-)
>>
>> diff --git a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c
>> index aa5cb98..0c9c6ae 100644
>> --- a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c
>> +++ b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c
>> @@ -1168,11 +1168,12 @@ static int hclge_pfc_setup_hw(struct hclge_dev *hdev)
>>   */
>>  static int hclge_bp_setup_hw(struct hclge_dev *hdev, u8 tc)
>>  {
>> -    struct hclge_vport *vport = hdev->vport;
>>      u32 i, k, qs_bitmap;
>>      int ret;
>>
>>      for (i = 0; i < HCLGE_BP_GRP_NUM; i++) {
>> +        struct hclge_vport *vport = hdev->vport;
>> +
> 
> It seems to me that the bug is fixed but the code is not much better.
> 
> Since variable vport is only referenced in the inner loop, I would define it there.


I am agree that it is always better to have better and safer code.
I will provide another verion to limit local variable as much as possible.
Thanks for the reviewing and suggestion.

> 
>>          qs_bitmap = 0;
>>
>>          for (k = 0; k < hdev->num_alloc_vport; k++) {
>>
> 
> static int hclge_bp_setup_hw(struct hclge_dev *hdev, u8 tc)
>  {
> -       struct hclge_vport *vport = hdev->vport;
> -       u32 i, k, qs_bitmap;
> -       int ret;
> +       int ret, i;
> 
>         for (i = 0; i < HCLGE_BP_GRP_NUM; i++) {
> -               qs_bitmap = 0;
> +               u32 qs_bitmap = 0;
> +               int k;
> 
>                 for (k = 0; k < hdev->num_alloc_vport; k++) {
> +                       struct hclge_vport *vport = &hdev->vport[k];
>                         u16 qs_id = vport->qs_offset + tc;
>                         u8 grp, sub_grp;
> 
> ...
> 
>                         if (i == grp)
>                                 qs_bitmap |= (1 << sub_grp);
> -
> -                       vport++;
> 
> 
> ... so this seems better and safer, as you're explicitly limiting vport within bounds of hdev->num_alloc_vport.
> 
> 
> 
> .
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ