Skip to content

Commit 6472b56

Browse files
pvts-matPlaidCat
authored andcommitted
ibmvnic: Use kernel helpers for hex dumps
jira VULN-65341 cve CVE-2025-22104 commit-author Nick Child <[email protected]> commit d93a6ca Previously, when the driver was printing hex dumps, the buffer was cast to an 8 byte long and printed using string formatters. If the buffer size was not a multiple of 8 then a read buffer overflow was possible. Therefore, create a new ibmvnic function that loops over a buffer and calls hex_dump_to_buffer instead. This patch address KASAN reports like the one below: ibmvnic 30000003 env3: Login Buffer: ibmvnic 30000003 env3: 01000000af000000 <...> ibmvnic 30000003 env3: 2e6d62692e736261 ibmvnic 30000003 env3: 65050003006d6f63 ================================================================== BUG: KASAN: slab-out-of-bounds in ibmvnic_login+0xacc/0xffc [ibmvnic] Read of size 8 at addr c0000001331a9aa8 by task ip/17681 <...> Allocated by task 17681: <...> ibmvnic_login+0x2f0/0xffc [ibmvnic] ibmvnic_open+0x148/0x308 [ibmvnic] __dev_open+0x1ac/0x304 <...> The buggy address is located 168 bytes inside of allocated 175-byte region [c0000001331a9a00, c0000001331a9aaf) <...> ================================================================= ibmvnic 30000003 env3: 000000000033766e Fixes: 032c5e8 ("Driver for IBM System i/p VNIC protocol") Signed-off-by: Nick Child <[email protected]> Reviewed-by: Dave Marquardt <[email protected]> Reviewed-by: Simon Horman <[email protected]> Link: https://patch.msgid.link/[email protected] Signed-off-by: Jakub Kicinski <[email protected]> (cherry picked from commit d93a6ca) Signed-off-by: Marcin Wcisło <[email protected]>
1 parent a836dbb commit 6472b56

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

drivers/net/ethernet/ibm/ibmvnic.c

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4625,6 +4625,18 @@ static void vnic_add_client_data(struct ibmvnic_adapter *adapter,
46254625
strscpy(vlcd->name, adapter->netdev->name, len);
46264626
}
46274627

4628+
static void ibmvnic_print_hex_dump(struct net_device *dev, void *buf,
4629+
size_t len)
4630+
{
4631+
unsigned char hex_str[16 * 3];
4632+
4633+
for (size_t i = 0; i < len; i += 16) {
4634+
hex_dump_to_buffer((unsigned char *)buf + i, len - i, 16, 8,
4635+
hex_str, sizeof(hex_str), false);
4636+
netdev_dbg(dev, "%s\n", hex_str);
4637+
}
4638+
}
4639+
46284640
static int send_login(struct ibmvnic_adapter *adapter)
46294641
{
46304642
struct ibmvnic_login_rsp_buffer *login_rsp_buffer;
@@ -4735,10 +4747,8 @@ static int send_login(struct ibmvnic_adapter *adapter)
47354747
vnic_add_client_data(adapter, vlcd);
47364748

47374749
netdev_dbg(adapter->netdev, "Login Buffer:\n");
4738-
for (i = 0; i < (adapter->login_buf_sz - 1) / 8 + 1; i++) {
4739-
netdev_dbg(adapter->netdev, "%016lx\n",
4740-
((unsigned long *)(adapter->login_buf))[i]);
4741-
}
4750+
ibmvnic_print_hex_dump(adapter->netdev, adapter->login_buf,
4751+
adapter->login_buf_sz);
47424752

47434753
memset(&crq, 0, sizeof(crq));
47444754
crq.login.first = IBMVNIC_CRQ_CMD;
@@ -5114,15 +5124,13 @@ static void handle_query_ip_offload_rsp(struct ibmvnic_adapter *adapter)
51145124
{
51155125
struct device *dev = &adapter->vdev->dev;
51165126
struct ibmvnic_query_ip_offload_buffer *buf = &adapter->ip_offload_buf;
5117-
int i;
51185127

51195128
dma_unmap_single(dev, adapter->ip_offload_tok,
51205129
sizeof(adapter->ip_offload_buf), DMA_FROM_DEVICE);
51215130

51225131
netdev_dbg(adapter->netdev, "Query IP Offload Buffer:\n");
5123-
for (i = 0; i < (sizeof(adapter->ip_offload_buf) - 1) / 8 + 1; i++)
5124-
netdev_dbg(adapter->netdev, "%016lx\n",
5125-
((unsigned long *)(buf))[i]);
5132+
ibmvnic_print_hex_dump(adapter->netdev, buf,
5133+
sizeof(adapter->ip_offload_buf));
51265134

51275135
netdev_dbg(adapter->netdev, "ipv4_chksum = %d\n", buf->ipv4_chksum);
51285136
netdev_dbg(adapter->netdev, "ipv6_chksum = %d\n", buf->ipv6_chksum);
@@ -5353,10 +5361,8 @@ static int handle_login_rsp(union ibmvnic_crq *login_rsp_crq,
53535361
netdev->mtu = adapter->req_mtu - ETH_HLEN;
53545362

53555363
netdev_dbg(adapter->netdev, "Login Response Buffer:\n");
5356-
for (i = 0; i < (adapter->login_rsp_buf_sz - 1) / 8 + 1; i++) {
5357-
netdev_dbg(adapter->netdev, "%016lx\n",
5358-
((unsigned long *)(adapter->login_rsp_buf))[i]);
5359-
}
5364+
ibmvnic_print_hex_dump(netdev, adapter->login_rsp_buf,
5365+
adapter->login_rsp_buf_sz);
53605366

53615367
/* Sanity checks */
53625368
if (login->num_txcomp_subcrqs != login_rsp->num_txsubm_subcrqs ||

0 commit comments

Comments
 (0)