In the Linux kernel, the following vulnerability has been resolved:
ice: fix eswitch code memory leak in reset scenario
Add simple eswitch mode checker in attaching VF procedure and allocate required port representor memory structures only in switchdev mode. The reset flows triggers VF (if present) detach/attach procedure. It might involve VF port representor(s) re-creation if the device is configured is switchdev mode (not legacy one). The memory was blindly allocated in current implementation, regardless of the mode and not freed if in legacy mode.
Kmemeleak trace: unreferenced object (percpu) 0x7e3bce5b888458 (size 40): comm "bash", pid 1784, jiffies 4295743894 hex dump (first 32 bytes on cpu 45): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): pcpuallocnoprof+0x4c4/0x7c0 icereprcreate+0x66/0x130 [ice] icereprcreatevf+0x22/0x70 [ice] iceeswitchattachvf+0x1b/0xa0 [ice] iceresetallvfs+0x1dd/0x2f0 [ice] icepcierrresume+0x3b/0xb0 [ice] pciresetfunction+0x8f/0x120 resetstore+0x56/0xa0 kernfsfopwriteiter+0x120/0x1b0 vfswrite+0x31c/0x430 ksyswrite+0x61/0xd0 dosyscall64+0x5b/0x180 entrySYSCALL64afterhwframe+0x76/0x7e
Testing hints (ethX is PF netdev): - create at least one VF echo 1 > /sys/class/net/ethX/device/sriov_numvfs - trigger the reset echo 1 > /sys/class/net/ethX/device/reset