From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 62465C433FE for ; Tue, 17 May 2022 10:17:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243414AbiEQKRY (ORCPT ); Tue, 17 May 2022 06:17:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57584 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344541AbiEQKRA (ORCPT ); Tue, 17 May 2022 06:17:00 -0400 Received: from mail.toke.dk (mail.toke.dk [IPv6:2a0c:4d80:42:2001::664]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 843D44CD49; Tue, 17 May 2022 03:14:01 -0700 (PDT) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1652782439; bh=FgLlz7yX3If1Y6jUp+qPllpmpLPTg7kdgt59d0KH3GU=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=kvpDqQveB2NW67xPPY6OyXlsFGsGQ+9IgrnaHQ09tj25bU6d5fC4v0rs5uMf1Clum tgEnkIIYgCsOY+EU2zm25nkrz/bieQom7u6OAIbFw3JoL67esL3eXhazO14fvQWzdQ L0dEv1VVn+66gwn7kxJbuek5YbVwZoopUgnDQNWUZ3WFAXDPTLzr6hZpCFpjZCPLSp GDmeh0EzvfAc62RVv5Ocm13EDJ2FDfPGZq9l+JbuZMAxgPqTV9WFWUy/DV1sz+V8zY Mgb3xNr2yIo/whq1DKzqjNF4wIjVkK1gGaTAQM+GJ6UcbQRF5gAwAsb4aKZ2/7inHZ 67IaLaZaGTfLQ== To: Pavel Skripkin , kvalo@kernel.org, davem@davemloft.net, kuba@kernel.org, pabeni@redhat.com Cc: linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Pavel Skripkin , syzbot+03110230a11411024147@syzkaller.appspotmail.com, syzbot+c6dde1f690b60e0b9fbe@syzkaller.appspotmail.com Subject: Re: [PATCH v4 1/2] ath9k: fix use-after-free in ath9k_hif_usb_rx_cb In-Reply-To: References: Date: Tue, 17 May 2022 12:13:58 +0200 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <874k1ocvq1.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Pavel Skripkin writes: > Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The > problem was in incorrect htc_handle->drv_priv initialization. > > Probable call trace which can trigger use-after-free: > > ath9k_htc_probe_device() > /* htc_handle->drv_priv = priv; */ > ath9k_htc_wait_for_target() <--- Failed > ieee80211_free_hw() <--- priv pointer is freed > > > ... > ath9k_hif_usb_rx_cb() > ath9k_hif_usb_rx_stream() > RX_STAT_INC() <--- htc_handle->drv_priv access > > In order to not add fancy protection for drv_priv we can move > htc_handle->drv_priv initialization at the end of the > ath9k_htc_probe_device() and add helper macro to make > all *_STAT_* macros NULL save, since syzbot has reported related NULL s/save/safe here as well :) -Toke