Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp856737yba; Wed, 24 Apr 2019 10:42:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqzHJJkvGE2nJ8jc2gK7yxdTimnY3zg1ONgTFh9TP5qlZ9EVTmrDY3ctc9RI/anF45Lc8DLF X-Received: by 2002:a65:410c:: with SMTP id w12mr32241360pgp.268.1556127761756; Wed, 24 Apr 2019 10:42:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556127761; cv=none; d=google.com; s=arc-20160816; b=bdqtxmSjuAmjvIauKmUVGP6Zz6pdY1HycNyWqHk0K1zz9C3PEA0oSrfeGMgRDLg2OF vQj7oDeSK5j9+0MCKYRZVGBujTtg0X/VwauDRG2bBRodfb+vAIUlXO43DIBL1ECk4i+1 XMmecGK4wYkBanWxXzqyl7Y+17imjr4l29QgILomuRDrhRdbahHutqPZWV3DrB8/7d75 QRguxozRKmhehWddClBfFsX6yILTF8rDBqqJKzJdJpY+n4IHD+yXI3AZ2x8+0B4kR3eG m6zBW6Iu2dhNCyLjLMYGDWBc82YTXtwnHdrZZandk6u1svmaqiLnsZPE/rUAJ7HcnNG2 8Uag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=X9tCPFBpGgukosZrJdqmK9Gm92cqKEHtAj8+r+54pPY=; b=k3fmIc9e8bovjj30RpRusCfPPnuHH3rJ1YXoCpkU/PMfh0bx/DZ8qj49LBP/09KDqL TnGL6ingwx9EvSDmOmIAPDwfh4EV/dW5IF1Z90fhp5mhHbzluxhLccC3ts3X3kQ9fmXL XPZ+RNwS4i+mFP7xPkAT/NgVjeoM5unK1fw0i+Uszoq4QJspw4TAIzaWfIN0Io0pa7VH jUfRzMPkdP3HppNolcW7z49wsBs31rIHTT/e7Eo0buy73ewJXUAzG10eP8tNeLDXOF3n w/JJJQIcrg17FmNvNao87fM+UWz9ZhbDnWNQmkavmKiOhD9pa7pUl3pKp+AuvQWvaXoW +mjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1DGsbQXg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o123si20719792pfb.116.2019.04.24.10.42.25; Wed, 24 Apr 2019 10:42:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1DGsbQXg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403947AbfDXRhD (ORCPT + 99 others); Wed, 24 Apr 2019 13:37:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:35864 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403930AbfDXRg7 (ORCPT ); Wed, 24 Apr 2019 13:36:59 -0400 Received: from localhost (62-193-50-229.as16211.net [62.193.50.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4F6DD21905; Wed, 24 Apr 2019 17:36:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556127418; bh=eh6lIBAXDpsw2b52R9Pjo6gZXMHMR62LSLtu9wqG9a0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1DGsbQXgn452APQ4C21spJw1vYk8Owg46fa5zk0dsn2+TZTqpj26Rsyb/SQBfoUom oHjdILMwO3DXcqtzoOnuM1BxV2i57y1gO215PCQx+pTKX8/zkkKa168YPl+ZAmdYO8 XbLWZglUa78HFtuwXUH8OknADO94Wst5GcO6jL+g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jann Horn , =?UTF-8?q?Christian=20K=C3=B6nig?= , =?UTF-8?q?Michel=20D=C3=A4nzer?= , Junwei Zhang , Huang Rui , Alex Deucher Subject: [PATCH 5.0 085/115] drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 Date: Wed, 24 Apr 2019 19:10:21 +0200 Message-Id: <20190424170929.882488036@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190424170924.797924502@linuxfoundation.org> References: <20190424170924.797924502@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christian König commit a66477b0efe511d98dde3e4aaeb189790e6f0a39 upstream. When ttm_put_pages() tries to figure out whether it's dealing with transparent hugepages, it just reads past the bounds of the pages array without a check. v2: simplify the test if enough pages are left in the array (Christian). Signed-off-by: Jann Horn Signed-off-by: Christian König Fixes: 5c42c64f7d54 ("drm/ttm: fix the fix for huge compound pages") Cc: stable@vger.kernel.org Reviewed-by: Michel Dänzer Reviewed-by: Junwei Zhang Reviewed-by: Huang Rui Signed-off-by: Alex Deucher Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/ttm/ttm_page_alloc.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/drivers/gpu/drm/ttm/ttm_page_alloc.c +++ b/drivers/gpu/drm/ttm/ttm_page_alloc.c @@ -730,7 +730,8 @@ static void ttm_put_pages(struct page ** } #ifdef CONFIG_TRANSPARENT_HUGEPAGE - if (!(flags & TTM_PAGE_FLAG_DMA32)) { + if (!(flags & TTM_PAGE_FLAG_DMA32) && + (npages - i) >= HPAGE_PMD_NR) { for (j = 0; j < HPAGE_PMD_NR; ++j) if (p++ != pages[i + j]) break; @@ -759,7 +760,7 @@ static void ttm_put_pages(struct page ** unsigned max_size, n2free; spin_lock_irqsave(&huge->lock, irq_flags); - while (i < npages) { + while ((npages - i) >= HPAGE_PMD_NR) { struct page *p = pages[i]; unsigned j;