vhost/crypto: check request pointer before dereference
authorThierry Herbelot <thierry.herbelot@6wind.com>
Mon, 24 May 2021 09:08:21 +0000 (11:08 +0200)
committerChenbo Xia <chenbo.xia@intel.com>
Wed, 23 Jun 2021 07:55:23 +0000 (09:55 +0200)
Use vc_req only after it was checked not to be NULL.

Fixes: 2d962bb736521 ("vhost/crypto: fix possible TOCTOU attack")
Cc: stable@dpdk.org
Signed-off-by: Thierry Herbelot <thierry.herbelot@6wind.com>
Reviewed-by: Maxime Coquelin <maxime.coquelin@redhat.com>
lib/vhost/vhost_crypto.c

index 6689c52..926b5c0 100644 (file)
@@ -1337,13 +1337,15 @@ vhost_crypto_finalize_one_request(struct rte_crypto_op *op,
        struct rte_mbuf *m_src = op->sym->m_src;
        struct rte_mbuf *m_dst = op->sym->m_dst;
        struct vhost_crypto_data_req *vc_req = rte_mbuf_to_priv(m_src);
-       struct vhost_virtqueue *vq = vc_req->vq;
-       uint16_t used_idx = vc_req->desc_idx, desc_idx;
+       struct vhost_virtqueue *vq;
+       uint16_t used_idx, desc_idx;
 
        if (unlikely(!vc_req)) {
                VC_LOG_ERR("Failed to retrieve vc_req");
                return NULL;
        }
+       vq = vc_req->vq;
+       used_idx = vc_req->desc_idx;
 
        if (old_vq && (vq != old_vq))
                return vq;