* [PATCH net] net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
@ 2022-02-14 23:42 Vladimir Oltean
2022-02-15 14:40 ` patchwork-bot+netdevbpf
0 siblings, 1 reply; 2+ messages in thread
From: Vladimir Oltean @ 2022-02-14 23:42 UTC (permalink / raw)
To: netdev
Cc: David S. Miller, Jakub Kicinski, Andrew Lunn, Vivien Didelot,
Florian Fainelli, Claudiu Manoil, Alexandre Belloni,
UNGLinuxDriver
ocelot_vlan_member_del() will free the struct ocelot_bridge_vlan, so if
this is the same as the port's pvid_vlan which we access afterwards,
what we're accessing is freed memory.
Fix the bug by determining whether to clear ocelot_port->pvid_vlan prior
to calling ocelot_vlan_member_del().
Fixes: d4004422f6f9 ("net: mscc: ocelot: track the port pvid using a pointer")
Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
---
drivers/net/ethernet/mscc/ocelot.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/net/ethernet/mscc/ocelot.c b/drivers/net/ethernet/mscc/ocelot.c
index e6de86552df0..fd3ceb74620d 100644
--- a/drivers/net/ethernet/mscc/ocelot.c
+++ b/drivers/net/ethernet/mscc/ocelot.c
@@ -549,14 +549,18 @@ EXPORT_SYMBOL(ocelot_vlan_add);
int ocelot_vlan_del(struct ocelot *ocelot, int port, u16 vid)
{
struct ocelot_port *ocelot_port = ocelot->ports[port];
+ bool del_pvid = false;
int err;
+ if (ocelot_port->pvid_vlan && ocelot_port->pvid_vlan->vid == vid)
+ del_pvid = true;
+
err = ocelot_vlan_member_del(ocelot, port, vid);
if (err)
return err;
/* Ingress */
- if (ocelot_port->pvid_vlan && ocelot_port->pvid_vlan->vid == vid)
+ if (del_pvid)
ocelot_port_set_pvid(ocelot, port, NULL);
/* Egress */
--
2.25.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH net] net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
2022-02-14 23:42 [PATCH net] net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() Vladimir Oltean
@ 2022-02-15 14:40 ` patchwork-bot+netdevbpf
0 siblings, 0 replies; 2+ messages in thread
From: patchwork-bot+netdevbpf @ 2022-02-15 14:40 UTC (permalink / raw)
To: Vladimir Oltean
Cc: netdev, davem, kuba, andrew, vivien.didelot, f.fainelli,
claudiu.manoil, alexandre.belloni, UNGLinuxDriver
Hello:
This patch was applied to netdev/net.git (master)
by David S. Miller <davem@davemloft.net>:
On Tue, 15 Feb 2022 01:42:00 +0200 you wrote:
> ocelot_vlan_member_del() will free the struct ocelot_bridge_vlan, so if
> this is the same as the port's pvid_vlan which we access afterwards,
> what we're accessing is freed memory.
>
> Fix the bug by determining whether to clear ocelot_port->pvid_vlan prior
> to calling ocelot_vlan_member_del().
>
> [...]
Here is the summary with links:
- [net] net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
https://git.kernel.org/netdev/net/c/ef5764057540
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2022-02-15 14:40 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-02-14 23:42 [PATCH net] net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() Vladimir Oltean
2022-02-15 14:40 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).