From nobody Thu Apr 9 09:02:42 2026 Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6A14F3A961B for ; Tue, 10 Mar 2026 02:45:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.52 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773110703; cv=none; b=RWOTBxPbKq6ARoC/WIrghDMIomnpCcKbBtyZccrE5dZsvE80JKg+FoZ0dcQdrC6JS2JsV55D2oW6/EMn77WXtFdoAxqUsXmVCp9tpkHo++wy/zW+LtrC5k/nWK77pPubL7ToyOzICBrsjALJeBX7QOrvZYX4MBhrcw2Yur0f/M0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773110703; c=relaxed/simple; bh=NrhFoEUS4s5magNSiO6aI8PRbcPWRr/xNciVIxz9CFA=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=OzeJrM0FXsgOU5sC96Avj4zW4NTwnJ9ckmFlkvge5323wBFsMLdfITC+Mg0IHPj7VTygu1fV6u1XfI3wRLFW7uGlCLG+ia7vjFqaTxnIrlL1F482ZGrRI4AL+MI1zjuUXmliUlBB/X3zi++Ys+8TUMSAM6SVSfGeskjIZOqWi1E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=MUVUxvjI; arc=none smtp.client-ip=209.85.216.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="MUVUxvjI" Received: by mail-pj1-f52.google.com with SMTP id 98e67ed59e1d1-3597c40a838so3736053a91.1 for ; Mon, 09 Mar 2026 19:45:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1773110702; x=1773715502; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=WOboup7oLRUcKhmnSCiuT0y1k3/298+wfQJlrTpRp68=; b=MUVUxvjI5Eg8uIeFnC5pF45jmSlIRzicpoA8JzQBKGm/f3S7PLJl4JvALX/AJyiOy/ pyLcceYgFK56XBIn0Tgfhto523mrf+1Lvnr0wC77M2RlH9YpVsdl1d0tFyFDMZtMRfg+ 9TdqlGAJRXpFPHl7eCRQdaeQEn40XPk8EgjNeMdQIjL9E5sFNiyMiqQ5CbJj2M9/LKF3 Wg7oFI9r9IfgWLGRCgP8hbffN2n0+XpkSB71WzYfUEwKSduoyD2yrQtN+PKsLIuiM9ay Ew5iUG8SuKXQtLOQ8kobdkzvM3wXaHmHkYaUjo1P2xGK0pPpSiLPvs82u33tfM0JrWA/ KmlA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1773110702; x=1773715502; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=WOboup7oLRUcKhmnSCiuT0y1k3/298+wfQJlrTpRp68=; b=IZQqwLfG5+RPDEGRgf9dXnFFc/znXm3060M0U19UsqPIPgQO1yOVN5hIC3UhvFw06t qI3jUUwlRl33iKiIQBqxXrw3OrdjFaAV/Xjg3S/25rVFweaJ6WJRtIIzOAt4pF+dy1DT eSZ+oQBGokyfFKtNO59/av3DhnPnOGtWa7J9xEeStZrGufyMGdS9qnzHlsj/k5z9dLeH kMxrpTHjFXIk+aFipE21in3pqFBA+trw90KwnUDIgt0YjQwxFTpSexHRf6d2WadRN1Ge kZ+aBawy4zLh3Bsc7weV7uh+2YDJYBDrlMeJEMDFNHYqGGijuIAF0VbaJJinEQZSOqYt tlpg== X-Forwarded-Encrypted: i=1; AJvYcCW2BRMoLs0XYQhckm/cmhEXEKV/ekxOGLJSYO7eeL8eCm82ZWrIKjLVENj3M46eZALOslDXFdhmz/iZr9A=@vger.kernel.org X-Gm-Message-State: AOJu0YyE/bgmrh7sKYQIl6SAoRh/+B/uETYxUYYfKJEjfDlBXYhNnJsr y+1Uht+wigiEEI1gui7FVyGzZ6uH5J4MJ4l9WClTlD4g6W5MMHPHYwtliLwNtOFX X-Gm-Gg: ATEYQzwgMmStYH0xL3rDLLfYHBE6vJHJHf2U6fKtjN/lWGgv7Ub0QVhmQ+C8DqsOhof Lgt+/0Fdvf2OvO6KyK4cIZ44WYs+p7pPfbOGjoHKNyw3eqa6n4SM4zBJ0qZiXHkAVV0sAOMqYUl 0c0UE3TWXmtieeUy7yESOc29jLLRkwmdz+nu4KBSdYcCuRZ8CNvZr9wjoiRoe/KDlqzQR6BVnR/ ojnNUfCDpQg3L1OWlQkS6Hj5DRg12+IyJT4TX9YaZ1i5w7Bz10rEwt05yqy4ZQp3ksEsOebyjsf w03xW+ht87UkBD95ixuvDW6MjyljXGk/5T2jyLkrGS/N6+iLVS+cy+DDzP0lRHCsc3TxbUqrvt9 VaemIOjlT1hFggRHcLB3P/TWZMfJYn2P1LI2oAU4jepZknnPPDzzbWy4HNUYbpdEv0TtQUTJmnr VqlBeo6c/Arx24Xv5DhPhFGFvgLTtPdagIIeIUudvmi1lRAoTiSNyeHQ8= X-Received: by 2002:a17:90b:1848:b0:359:7a1f:1b83 with SMTP id 98e67ed59e1d1-359be34da3dmr12193517a91.26.1773110701749; Mon, 09 Mar 2026 19:45:01 -0700 (PDT) Received: from localhost.localdomain ([119.204.109.25]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-359bcbc6fe9sm4781365a91.12.2026.03.09.19.44.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Mar 2026 19:45:01 -0700 (PDT) From: James Kim To: jjohnson@kernel.org Cc: quic_srirrama@quicinc.com, quic_ramess@quicinc.com, kvalo@kernel.org, stable@vger.kernel.org, linux-wireless@vger.kernel.org, ath12k@lists.infradead.org, linux-kernel@vger.kernel.org, James Kim Subject: [PATCH] wifi: ath12k: fix use-after-free of arvif in assign_vif_chanctx() Date: Tue, 10 Mar 2026 11:43:05 +0900 Message-ID: <20260310024305.555408-1-james010kim@gmail.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable In ath12k_mac_op_assign_vif_chanctx(), arvif is obtained from ath12k_mac_assign_link_vif() and then passed to ath12k_mac_assign_vif_to_vdev(). Inside that function, when the target radio (ar) differs from arvif->ar (multi-radio configuration), the old arvif is freed via ath12k_mac_unassign_link_vif() -> kfree() and a new one is allocated internally. However, only the ar pointer is returned to the caller =E2=80=94 the caller's arvif still points to the freed memory. The caller then continues to dereference this stale arvif pointer at multiple locations (arvif->vdev_id, arvif->punct_bitmap, arvif->is_started, etc.), resulting in a use-after-free. Fix this by re-fetching arvif from ahvif->link[link_id] after ath12k_mac_assign_vif_to_vdev() returns, since the link pointer is always updated when a new arvif is assigned. Fixes: 477cabfdb776 ("wifi: ath12k: modify link arvif creation and removal = for MLO") Cc: stable@vger.kernel.org Signed-off-by: James Kim --- drivers/net/wireless/ath/ath12k/mac.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/drivers/net/wireless/ath/ath12k/mac.c b/drivers/net/wireless/a= th/ath12k/mac.c index b253d1e3f405..ee44a8b59e9b 100644 --- a/drivers/net/wireless/ath/ath12k/mac.c +++ b/drivers/net/wireless/ath/ath12k/mac.c @@ -12069,6 +12069,17 @@ ath12k_mac_op_assign_vif_chanctx(struct ieee80211_= hw *hw, return -EINVAL; } =20 + /* ath12k_mac_assign_vif_to_vdev() may free and reassign arvif + * internally when switching radios (ar !=3D arvif->ar). Refresh + * arvif from ahvif->link[]. + */ + arvif =3D wiphy_dereference(hw->wiphy, ahvif->link[link_id]); + if (!arvif) { + ath12k_hw_warn(ah, "failed to get arvif for link %u after vdev assignmen= t", + link_id); + return -ENOENT; + } + ab =3D ar->ab; =20 ath12k_dbg(ab, ATH12K_DBG_MAC, --=20 2.43.0