On Fri, Dec 08, 2023 at 09:00:59PM +0800, Xingyuan Mo wrote:
> This function may copy the pad0 field of struct hl_info_sec_attest to user
> mode which has not been initialized, resulting in leakage of kernel heap
> data to user mode. To prevent this, use kzalloc() to allocate and zero out
> the buffer, which can also eliminate other uninitilized holes, if any.
> 
> Fixes: 0c88760f8f5e ("habanalabs/gaudi2: add secured attestation info uapi")
> Signed-off-by: Xingyuan Mo <hdth...@gmail.com>
> ---
>  drivers/accel/habanalabs/common/habanalabs_ioctl.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/drivers/accel/habanalabs/common/habanalabs_ioctl.c 
> b/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> index 8ef36effb95b..a7cd625d82c0 100644
> --- a/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> +++ b/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> @@ -685,7 +685,7 @@ static int sec_attest_info(struct hl_fpriv *hpriv, struct 
> hl_info_args *args)
>       if (!sec_attest_info)
>               return -ENOMEM;
>  
> -     info = kmalloc(sizeof(*info), GFP_KERNEL);
> +     info = kzalloc(sizeof(*info), GFP_KERNEL);
>       if (!info) {
>               rc = -ENOMEM;
>               goto free_sec_attest_info;
> -- 
> 2.34.1
> 

Reviewed-by: Oded Gabbay <ogab...@kernel.org>
Applied to -next.

Thanks,
Oded

Reply via email to