Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3285969pxk; Mon, 21 Sep 2020 09:42:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwgHNmFeUjFfFrWEoowMmnRDHcqwQrMQJVtoObN0N3Ow2mTxztUjiOS6FdWze6XBb9ilpVL X-Received: by 2002:a50:f1cd:: with SMTP id y13mr538721edl.358.1600706554493; Mon, 21 Sep 2020 09:42:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600706554; cv=none; d=google.com; s=arc-20160816; b=0AqbWaI7vBr4JMKnTFtWnIkmK13Ygr7a/d1ulfBx3+YFyCU4AAEAlg2QrdC+5HLiQb t6qTG7g61D0HNLMsSR1RkxB0C2zfzuDNOUxgwd8Z++S3/DneeRC/0o6byC8ERHiQud2c XwlEaqhfKrTeSQW0gHwzblvUIgO9GBy219pIFKHMjZIGa9/auyyO7eb/HuR4jIAIsNIF WXBSemMUKhAaRFwpCPBmNhwpprIkxFSKaAv80IoA3jeZpw3xxdnnSxcN+TZqczTlB+go f6e4SZ0RWUgYWG8UerZtOIz2Ya4Cd803lcii2X8nRtagcaSswCwFlvkzyWS4BJ4GMmPg 1M9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/Brp0JfeKRGEVw/ODIokjQnhl7jEM0voNaVlQKhdfVM=; b=KO5B5Eyy9Ql4DjvXjKSfydMk5mZap+MbEO/p1Ka4aIIgM9I9i49Y0KhoS2FPAn49Oa zp5vpJYHq62lddydHCWC1oOTnwH8Z5U2TuGYGydoKwEdBz1uS8selLBCBQxgWIwcJ6Pn KVhhb9vh6ItL2k9sZEO2qgaPdRPpq/dVLQo5wO9RYW5dz1ZxDeT1aSy3p5pQhV+qOWbm fufjd/HNtwS1vzumM4VYD+Qi2mN0WX6sM5zLvxzI3H2r24v7J1rZHaztn0A5f/hXKZ+V psYkepCv9Dv2vHE54oljz8ArcSkSmhUzyElQTbfoOYFBN0cnSs4PjmQocBU66VKjazPU YAmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VMBw+NxR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y24si9049854eju.401.2020.09.21.09.42.10; Mon, 21 Sep 2020 09:42:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VMBw+NxR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728539AbgIUQi5 (ORCPT + 99 others); Mon, 21 Sep 2020 12:38:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:40380 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729202AbgIUQi4 (ORCPT ); Mon, 21 Sep 2020 12:38:56 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE1A4238E6; Mon, 21 Sep 2020 16:38:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600706334; bh=xWfbtvQi6jRbi8I/P0rqnE1igmz3Uiqjn4b6VweDl4k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VMBw+NxRFQkp3Jm56pdYKgZ3rTGydrgGlsw5Jc32fncFDC8v40lini5NpbVTkhb5M GOjX94mk8JRyiVZ44bdJtc6SVWBz+qMaBJeYVhV5FpeuIExzqfZbPiQeGAmemV1XKs 3zgQdpOjuzFKeUk5W0W+Kk3fuMrkDo+uOfsrieHM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lars-Peter Clausen , =?UTF-8?q?M=C3=A5rten=20Lindahl?= , Jonathan Cameron , Andy Shevchenko , Stable@vger.kernel.org Subject: [PATCH 4.14 28/94] iio:adc:ti-adc084s021 Fix alignment and data leak issues. Date: Mon, 21 Sep 2020 18:27:15 +0200 Message-Id: <20200921162036.847880785@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200921162035.541285330@linuxfoundation.org> References: <20200921162035.541285330@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jonathan Cameron commit a661b571e3682705cb402a5cd1e970586a3ec00f upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver which uses an array of smaller elements on the stack. As Lars also noted this anti pattern can involve a leak of data to userspace and that indeed can happen here. We close both issues by moving to a suitable structure in the iio_priv(). This data is allocated with kzalloc so no data can leak apart from previous readings. The force alignment of ts is not strictly necessary in this case but reduces the fragility of the code. Fixes: 3691e5a69449 ("iio: adc: add driver for the ti-adc084s021 chip") Reported-by: Lars-Peter Clausen Cc: MÃ¥rten Lindahl Signed-off-by: Jonathan Cameron Reviewed-by: Andy Shevchenko Cc: Signed-off-by: Greg Kroah-Hartman --- drivers/iio/adc/ti-adc084s021.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) --- a/drivers/iio/adc/ti-adc084s021.c +++ b/drivers/iio/adc/ti-adc084s021.c @@ -28,6 +28,11 @@ struct adc084s021 { struct spi_transfer spi_trans; struct regulator *reg; struct mutex lock; + /* Buffer used to align data */ + struct { + __be16 channels[4]; + s64 ts __aligned(8); + } scan; /* * DMA (thus cache coherency maintenance) requires the * transfer buffers to live in their own cache line. @@ -143,14 +148,13 @@ static irqreturn_t adc084s021_buffer_tri struct iio_poll_func *pf = pollfunc; struct iio_dev *indio_dev = pf->indio_dev; struct adc084s021 *adc = iio_priv(indio_dev); - __be16 data[8] = {0}; /* 4 * 16-bit words of data + 8 bytes timestamp */ mutex_lock(&adc->lock); - if (adc084s021_adc_conversion(adc, &data) < 0) + if (adc084s021_adc_conversion(adc, adc->scan.channels) < 0) dev_err(&adc->spi->dev, "Failed to read data\n"); - iio_push_to_buffers_with_timestamp(indio_dev, data, + iio_push_to_buffers_with_timestamp(indio_dev, &adc->scan, iio_get_time_ns(indio_dev)); mutex_unlock(&adc->lock); iio_trigger_notify_done(indio_dev->trig);