]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
iommu/vt-d: Avoid NULL pointer dereference or refcount corruption
authorZhenzhong Duan <zhenzhong.duan@intel.com>
Sat, 9 May 2026 02:43:46 +0000 (10:43 +0800)
committerJoerg Roedel <joerg.roedel@amd.com>
Mon, 11 May 2026 08:19:37 +0000 (10:19 +0200)
Commit 60f030f7418d ("iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE")
fixed a NULL pointer dereference in an unlikely situation partly.

If dev_pasid is not found in the dev_pasids list, it remains NULL.
However, the teardown operations are executed unconditionally, this lead
to a NULL pointer dereference or refcount corruption.

If the domain was never attached to this IOMMU, info will be NULL, which
would cause an immediate dereference when checking --info->refcnt.

Even if info is not NULL, decrementing the refcount without having removed
a valid PASID might unbalance the count. This could lead to premature
dropping of the refcount to 0, potentially causing a use-after-free for the
remaining active devices sharing the domain.

Fix it by returning early if dev_pasid is NULL, before executing the
teardown operations.

Issue found by AI review and suggested by Kevin Tian.
https://sashiko.dev/#/patchset/20260421031347.1408890-1-zhenzhong.duan%40intel.com

Fixes: 60f030f7418d ("iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE")
Cc: stable@vger.kernel.org
Suggested-by: Kevin Tian <kevin.tian@intel.com>
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Link: https://lore.kernel.org/r/20260422033538.95000-1-zhenzhong.duan@intel.com
Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
drivers/iommu/intel/iommu.c

index a4b123c330221fc796e5f1e7df6ccc4b98958efe..4d0e65bc131d7776014187eca77431aca85562af 100644 (file)
@@ -3545,12 +3545,13 @@ void domain_remove_dev_pasid(struct iommu_domain *domain,
        }
        spin_unlock_irqrestore(&dmar_domain->lock, flags);
 
+       if (WARN_ON_ONCE(!dev_pasid))
+               return;
+
        cache_tag_unassign_domain(dmar_domain, dev, pasid);
        domain_detach_iommu(dmar_domain, iommu);
-       if (!WARN_ON_ONCE(!dev_pasid)) {
-               intel_iommu_debugfs_remove_dev_pasid(dev_pasid);
-               kfree(dev_pasid);
-       }
+       intel_iommu_debugfs_remove_dev_pasid(dev_pasid);
+       kfree(dev_pasid);
 }
 
 static int blocking_domain_set_dev_pasid(struct iommu_domain *domain,