Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp2015863pxb; Sun, 10 Jan 2021 20:49:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJyNflzWejL0UPEODFo8Dv0afcf1XScxkdCrwyOdReI0AN/v4GM1O+mpA6OCXPeR1TfEAzoS X-Received: by 2002:a17:906:34c3:: with SMTP id h3mr9520430ejb.132.1610340577450; Sun, 10 Jan 2021 20:49:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610340577; cv=none; d=google.com; s=arc-20160816; b=M6owvCjJQViLBtpedYy8UROLIo2nIxX6xgUnCu6kuXDhKfqRG5HFP2BrVAcH+jpTYr psbZm54rgRn8AHFoQnbkw55cJM8K3zTrcmGtTsgsWJl62xVatTboeZxxAk8ClKTUhKSd xpOq7ZuX6VgyWoW0plKmMGmAhh5WR5WMDtHw5wOyDPo13oJJ4zcUBXPu9HoX6J20qAFo bx5HXfnwEGVRJkwO32/thcCJ00GIMg+abLNDSwPKHfLtgKoOrqysLajHBMORby6P9xRF xbRE1NR9/fow89V6uqCU6Y6MDzEL2+8Aatfnu7t5vYOb/x4x+qZWZPqHbwGD2dT5XzF/ Lm4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ePgHeop/fVLvV8lkn6R2oyK+HtP0yp2Mb/h0aIJiDwM=; b=X5cngxFOee6/oqGOWOhg/SHjQVEFAaPfz382z6WgqAdfL+Yndj34rzPrz87NVljQLa rcU+q/HbvmiAF8tHaw7YEQnqxN5qVz+CCupkaRq9V3BdyOCD0J6qqt7bcH7dUf1vSw+I a440v/M/ImMkbfJgVP2auDPP4ccrYQ+rMl8Kbgg2Qal86vINY7IG2KC8L7JDNV6mytut atocZKMz4TT4GFoXdVbI3rOgwJhdL571CtqAdbFQXWWaxbBZXHwz5Gz1qkSCqTpKimc2 6nGuBjrhK+1azvb2ey/icOlSd343YM1gxpHh5M5duXC1/Z522oMDXePcW8SOtMku52Nq guyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=I048932A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dv23si6204390ejb.408.2021.01.10.20.49.14; Sun, 10 Jan 2021 20:49:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=I048932A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727183AbhAKEp0 (ORCPT + 99 others); Sun, 10 Jan 2021 23:45:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:48238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726278AbhAKEp0 (ORCPT ); Sun, 10 Jan 2021 23:45:26 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6CDA120782; Mon, 11 Jan 2021 04:44:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1610340285; bh=v3WIruP3B1wdJRzDgEpDFElbtoKOktc9Qr4F3/oV+Bs=; h=From:To:Cc:Subject:Date:From; b=I048932AvWOMEUgGKiiTPzl/aNHr662Adg/H5au1RTIHX0KKaVdofSISatA82DIC5 ww6Am6H6aVY8xwz0yx34aD2DSzWjJpHFINujHh/FH9bwTxKTolmIOSx4L7fDW7+Qs1 rScv1TZRbDAoukxCvdmqt0c9S7SMDZkvYp9EPtmb4fUXWXV7ILmQu+L+G9RSMlK3tM 3dhvgYOARYbx+Ew+2LPW4Pd15qXzl18I3eKGrs4TKcKmioINqq4uD9sNedPW0BTTTr pLkR/sKeeEZmnxrRRHALi78t8VNbbEOk37xlQD4UNACKKznEHp0L6eS/rmPtuSsxSU nlCTHWAzZVApw== From: Jaegeuk Kim To: linux-kernel@vger.kernel.org, linux-scsi@vger.kernel.org, kernel-team@android.com Cc: cang@codeaurora.org, alim.akhtar@samsung.com, avri.altman@wdc.com, bvanassche@acm.org, martin.petersen@oracle.com, stanley.chu@mediatek.com, Jaegeuk Kim , Jaegeuk Kim Subject: [PATCH] scsi: ufs: should not override buffer lengh Date: Sun, 10 Jan 2021 20:44:43 -0800 Message-Id: <20210111044443.1405049-1-jaegeuk@kernel.org> X-Mailer: git-send-email 2.30.0.284.gd98b1dd5eaa7-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jaegeuk Kim Kernel stack violation when getting unit_descriptor/wb_buf_alloc_units from rpmb lun. The reason is the unit descriptor length is different per LU. The lengh of Normal LU is 45, while the one of rpmb LU is 35. int ufshcd_read_desc_param(struct ufs_hba *hba, ...) { param_offset=41; param_size=4; buff_len=45; ... buff_len=35 by rpmb LU; if (is_kmalloc) { /* Make sure we don't copy more data than available */ if (param_offset + param_size > buff_len) param_size = buff_len - param_offset; --> param_size = 250; memcpy(param_read_buf, &desc_buf[param_offset], param_size); --> memcpy(param_read_buf, desc_buf+41, 250); [ 141.868974][ T9174] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: wb_buf_alloc_units_show+0x11c/0x11c } } Signed-off-by: Jaegeuk Kim --- drivers/scsi/ufs/ufshcd.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/scsi/ufs/ufshcd.c b/drivers/scsi/ufs/ufshcd.c index 2a715f13fe1d..722697b57777 100644 --- a/drivers/scsi/ufs/ufshcd.c +++ b/drivers/scsi/ufs/ufshcd.c @@ -3293,8 +3293,12 @@ int ufshcd_read_desc_param(struct ufs_hba *hba, if (is_kmalloc) { /* Make sure we don't copy more data than available */ - if (param_offset + param_size > buff_len) - param_size = buff_len - param_offset; + if (param_offset + param_size > buff_len) { + if (buff_len > param_offset) + param_size = buff_len - param_offset; + else + param_size = 0; + } memcpy(param_read_buf, &desc_buf[param_offset], param_size); } out: -- 2.30.0.284.gd98b1dd5eaa7-goog