* [PATCH] vhost: fix possible null pointer dereference
@ 2023-03-09 11:36 Maxime Coquelin
2023-03-10 2:52 ` Xia, Chenbo
2023-03-16 14:47 ` Maxime Coquelin
0 siblings, 2 replies; 3+ messages in thread
From: Maxime Coquelin @ 2023-03-09 11:36 UTC (permalink / raw)
To: dev, mkp, chenbo.xia, david.marchand; +Cc: Maxime Coquelin
When handling VHOST_USER_SET_MEM_TABLE request ending
up in changing existing memory map, a device's memory
pointer may ends up being dereference while being NULL in
IOTLB cache flush function.
Coverity issue: 383646
Fixes: dea092d0addb ("vhost: fix madvise arguments alignment")
Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
---
lib/vhost/vhost_user.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 9e361082dc..23a6a4e2bd 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -1355,16 +1355,16 @@ vhost_user_set_mem_table(struct virtio_net **pdev,
async_notify = true;
}
+ /* Flush IOTLB cache as previous HVAs are now invalid */
+ if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
+ for (i = 0; i < dev->nr_vring; i++)
+ vhost_user_iotlb_flush_all(dev, dev->virtqueue[i]);
+
free_mem_region(dev);
rte_free(dev->mem);
dev->mem = NULL;
}
- /* Flush IOTLB cache as previous HVAs are now invalid */
- if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
- for (i = 0; i < dev->nr_vring; i++)
- vhost_user_iotlb_flush_all(dev, dev->virtqueue[i]);
-
/*
* If VQ 0 has already been allocated, try to allocate on the same
* NUMA node. It can be reallocated later in numa_realloc().
--
2.39.2
^ permalink raw reply [flat|nested] 3+ messages in thread
* RE: [PATCH] vhost: fix possible null pointer dereference
2023-03-09 11:36 [PATCH] vhost: fix possible null pointer dereference Maxime Coquelin
@ 2023-03-10 2:52 ` Xia, Chenbo
2023-03-16 14:47 ` Maxime Coquelin
1 sibling, 0 replies; 3+ messages in thread
From: Xia, Chenbo @ 2023-03-10 2:52 UTC (permalink / raw)
To: Maxime Coquelin, dev, mkp, david.marchand
> -----Original Message-----
> From: Maxime Coquelin <maxime.coquelin@redhat.com>
> Sent: Thursday, March 9, 2023 7:37 PM
> To: dev@dpdk.org; mkp@redhat.com; Xia, Chenbo <chenbo.xia@intel.com>;
> david.marchand@redhat.com
> Cc: Maxime Coquelin <maxime.coquelin@redhat.com>
> Subject: [PATCH] vhost: fix possible null pointer dereference
>
> When handling VHOST_USER_SET_MEM_TABLE request ending
> up in changing existing memory map, a device's memory
> pointer may ends up being dereference while being NULL in
> IOTLB cache flush function.
>
> Coverity issue: 383646
> Fixes: dea092d0addb ("vhost: fix madvise arguments alignment")
>
> Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
> ---
> lib/vhost/vhost_user.c | 10 +++++-----
> 1 file changed, 5 insertions(+), 5 deletions(-)
>
> diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
> index 9e361082dc..23a6a4e2bd 100644
> --- a/lib/vhost/vhost_user.c
> +++ b/lib/vhost/vhost_user.c
> @@ -1355,16 +1355,16 @@ vhost_user_set_mem_table(struct virtio_net **pdev,
> async_notify = true;
> }
>
> + /* Flush IOTLB cache as previous HVAs are now invalid */
> + if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
> + for (i = 0; i < dev->nr_vring; i++)
> + vhost_user_iotlb_flush_all(dev, dev->virtqueue[i]);
> +
> free_mem_region(dev);
> rte_free(dev->mem);
> dev->mem = NULL;
> }
>
> - /* Flush IOTLB cache as previous HVAs are now invalid */
> - if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
> - for (i = 0; i < dev->nr_vring; i++)
> - vhost_user_iotlb_flush_all(dev, dev->virtqueue[i]);
> -
> /*
> * If VQ 0 has already been allocated, try to allocate on the same
> * NUMA node. It can be reallocated later in numa_realloc().
> --
> 2.39.2
Reviewed-by: Chenbo Xia <chenbo.xia@intel.com>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] vhost: fix possible null pointer dereference
2023-03-09 11:36 [PATCH] vhost: fix possible null pointer dereference Maxime Coquelin
2023-03-10 2:52 ` Xia, Chenbo
@ 2023-03-16 14:47 ` Maxime Coquelin
1 sibling, 0 replies; 3+ messages in thread
From: Maxime Coquelin @ 2023-03-16 14:47 UTC (permalink / raw)
To: dev, mkp, chenbo.xia, david.marchand
On 3/9/23 12:36, Maxime Coquelin wrote:
> When handling VHOST_USER_SET_MEM_TABLE request ending
> up in changing existing memory map, a device's memory
> pointer may ends up being dereference while being NULL in
> IOTLB cache flush function.
>
> Coverity issue: 383646
> Fixes: dea092d0addb ("vhost: fix madvise arguments alignment")
>
> Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
> ---
> lib/vhost/vhost_user.c | 10 +++++-----
> 1 file changed, 5 insertions(+), 5 deletions(-)
>
Applied to dpdk-next-virtio/main.
Thanks,
Maxime
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2023-03-16 14:47 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-03-09 11:36 [PATCH] vhost: fix possible null pointer dereference Maxime Coquelin
2023-03-10 2:52 ` Xia, Chenbo
2023-03-16 14:47 ` Maxime Coquelin
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).