From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B84DE1D130C for ; Wed, 21 Aug 2024 12:13:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724242390; cv=none; b=uHtg13tCknPNaoxjj026dBw+1iRrVIL3eYhsBInNitFgCxt+HNxheCarqTTXCPwFVhf1+GpnfsFrNziXPDagghHKTlNYzYFEX1A7NR+Dm+7XcGZ/X2iGxqAYbt4z5N6n3VhQ/dxEyz26BumRHM4qM+oAsXgGQ3Lf0izLlb2P2Dg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724242390; c=relaxed/simple; bh=DDWu1HqNHaS6DMEZKuJATbXl4MjOmQ8bHx+zMGTvh/E=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Dwbd8SdKAwILnqrmQv/O5CbpsQbejSEb5PzDv59R7jbSqiIMKswaHx8uIMuelqzrBH3fzwFqpDtEOKKnU9dDqui7kVK7WfwftIjXBYWEKIMx0GxwYrbpP+A0uELG4uxM9eKO7FRjz9Ogj/ZJ1scr/JMdSV7kKpOTALg5Htuu87k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=UubX1HUw; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="UubX1HUw" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1724242387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=TSBk3tiwYk5OG97kBGDXG+0Y8CDnp1Ut323qDsoZ2kI=; b=UubX1HUwYa45/kCYyMuP4bMoTnXAxmkfvv9ke/B2KIaWGjgjUIHdFR6c4ur2eiUcEc0zsD YaxBHptZpNQ7R9us+priZQ1xU2IInkNS1T5cvFWU+s2O1HzpLzZvkZQcb9iqEo8flOxjlt UU+Rry0hGSs5VhDMgF5xSd/CzfeN6WQ= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-269-DgxqlEc-P_GZKxEFLEr3YQ-1; Wed, 21 Aug 2024 08:13:06 -0400 X-MC-Unique: DgxqlEc-P_GZKxEFLEr3YQ-1 Received: by mail-wr1-f71.google.com with SMTP id ffacd0b85a97d-3719cee43abso2771100f8f.0 for ; Wed, 21 Aug 2024 05:13:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1724242385; x=1724847185; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=TSBk3tiwYk5OG97kBGDXG+0Y8CDnp1Ut323qDsoZ2kI=; b=lbLtazb2iP63K49XrlljeqQzb1wO/Qn2Y3ROBkh9ec6gfj1PPmwhOBgmLE5tBtUTLk eVDjepZB96LBmemu/j4nw4ieRG57obngXdxXfd/UiXykH73/BFymIWe+M3s4M/AUD/Hd f962TSQ4u2kikktBSVlcI11xYF0JFfJ4byPWMuOWB0dwyI/Vg0sGDta7drCxHh2afYoC kQU5wT+ilZuyCr53kTn0qyZs+9SNZ5h/RFjw9uyu39C5/JBostB/uXhT+PFuBeLCsUQs as0X6o3+lZfrYH71whdkWV+sFFkN63A+6V3oNu3QskoGxfelvmKAIjgRUSw8AKe8J5E5 6drA== X-Forwarded-Encrypted: i=1; AJvYcCUwCeKe7yvMT0rq5X8HqvlX/3h/tqwmuekAdsyxicrP7PFyH8MOu2mMNKiDyv3JR9UZ9so/cjupu9ss@vger.kernel.org X-Gm-Message-State: AOJu0Yym5LV0OY3vcpGLUY6LsXROgmwCQP78alClU9kCK53CS00P965Y fZR53ps++UoCgu6ubvYjmg8nGcBHthbKMi8WZx/+tIhzIq9JmQ0/oSnkwEvf1mmN5kY0W39M0lF MtkBF4GrHRTUkKSXUjBs61fnE224ynxoC0JNDe5utH6EzObEYZndHztjrQuA= X-Received: by 2002:adf:f005:0:b0:371:8a8e:bf34 with SMTP id ffacd0b85a97d-372fd92b361mr1353665f8f.62.1724242385057; Wed, 21 Aug 2024 05:13:05 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEMB/ggUo/vRUxhw5fu4gZQwLE961KLd/t4ur3YDaHKN+uT6R+5KIUihWYpnfVR7FqX1I8YOw== X-Received: by 2002:adf:f005:0:b0:371:8a8e:bf34 with SMTP id ffacd0b85a97d-372fd92b361mr1353594f8f.62.1724242384136; Wed, 21 Aug 2024 05:13:04 -0700 (PDT) Received: from redhat.com ([2a0d:6fc7:443:61f9:60b2:d178:7b81:4387]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-42abefa20b9sm23302285e9.30.2024.08.21.05.12.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Aug 2024 05:13:03 -0700 (PDT) Date: Wed, 21 Aug 2024 08:12:50 -0400 From: "Michael S. Tsirkin" To: Philipp Stanner Cc: Jonathan Corbet , Jens Axboe , Wu Hao , Tom Rix , Moritz Fischer , Xu Yilun , Andy Shevchenko , Linus Walleij , Bartosz Golaszewski , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandre Torgue , Jose Abreu , Maxime Coquelin , Bjorn Helgaas , Alvaro Karsz , Jason Wang , Xuan Zhuo , Eugenio =?iso-8859-1?Q?P=E9rez?= , Richard Cochran , Mark Brown , David Lechner , Uwe =?iso-8859-1?Q?Kleine-K=F6nig?= , Damien Le Moal , Hannes Reinecke , Keith Busch , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, linux-fpga@vger.kernel.org, linux-gpio@vger.kernel.org, netdev@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-pci@vger.kernel.org, virtualization@lists.linux.dev, stable@vger.kernel.org, Christophe JAILLET Subject: Re: [PATCH v2 7/9] vdpa: solidrun: Fix potential UB bug with devres Message-ID: <20240821081213-mutt-send-email-mst@kernel.org> References: <20240821071842.8591-2-pstanner@redhat.com> <20240821071842.8591-9-pstanner@redhat.com> Precedence: bulk X-Mailing-List: linux-gpio@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240821071842.8591-9-pstanner@redhat.com> On Wed, Aug 21, 2024 at 09:18:40AM +0200, Philipp Stanner wrote: > In psnet_open_pf_bar() a string later passed to pcim_iomap_regions() is > placed on the stack. Neither pcim_iomap_regions() nor the functions it > calls copy that string. > > Should the string later ever be used, this, consequently, causes > undefined behavior since the stack frame will by then have disappeared. > > Fix the bug by allocating the string on the heap through > devm_kasprintf(). > > Cc: stable@vger.kernel.org # v6.3 > Fixes: 51a8f9d7f587 ("virtio: vdpa: new SolidNET DPU driver.") > Reported-by: Christophe JAILLET > Closes: https://lore.kernel.org/all/74e9109a-ac59-49e2-9b1d-d825c9c9f891@wanadoo.fr/ > Suggested-by: Andy Shevchenko > Signed-off-by: Philipp Stanner I don't get why is this a part of a cleanup series - looks like an unrelated bugfix? > --- > drivers/vdpa/solidrun/snet_main.c | 7 +++++-- > 1 file changed, 5 insertions(+), 2 deletions(-) > > diff --git a/drivers/vdpa/solidrun/snet_main.c b/drivers/vdpa/solidrun/snet_main.c > index 99428a04068d..4d42a05d70fc 100644 > --- a/drivers/vdpa/solidrun/snet_main.c > +++ b/drivers/vdpa/solidrun/snet_main.c > @@ -555,7 +555,7 @@ static const struct vdpa_config_ops snet_config_ops = { > > static int psnet_open_pf_bar(struct pci_dev *pdev, struct psnet *psnet) > { > - char name[50]; > + char *name; > int ret, i, mask = 0; > /* We don't know which BAR will be used to communicate.. > * We will map every bar with len > 0. > @@ -573,7 +573,10 @@ static int psnet_open_pf_bar(struct pci_dev *pdev, struct psnet *psnet) > return -ENODEV; > } > > - snprintf(name, sizeof(name), "psnet[%s]-bars", pci_name(pdev)); > + name = devm_kasprintf(&pdev->dev, GFP_KERNEL, "psnet[%s]-bars", pci_name(pdev)); > + if (!name) > + return -ENOMEM; > + > ret = pcim_iomap_regions(pdev, mask, name); > if (ret) { > SNET_ERR(pdev, "Failed to request and map PCI BARs\n"); > -- > 2.46.0