Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2491458pxj; Mon, 10 May 2021 04:23:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzK6h8SJ7IZr6FExqcfnKUgE6tSbfA/C4fY/LuUboIwjB2qVu4pzChibkl0kZbv1wmR8cK5 X-Received: by 2002:a05:6402:2712:: with SMTP id y18mr29978455edd.41.1620645808888; Mon, 10 May 2021 04:23:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620645808; cv=none; d=google.com; s=arc-20160816; b=s2j0Jluh7Hyg4Yq/1koG0oDr2Ob+ANwiIHl0Zeh495p7uAR5O1sQQQa3+uU9qmvVrS mTIg43/nSqxK+OEaaaEAR1kXapKfbmrFTGPM87KcB3y/kj54jvljByoun7e9MXWA4eOC Za/symIg3efT0dRwLizYbmQwJV1GI7Yff19h0Ngps2xd2W9AixPhbaUq3oIWy7Ewodbq w4pa68HUdvPUzIz/jgUKmAuERHTbWeN7+VS0iLT0Pl5IFe+NbUlh9S7N73pZJ+M7bo4r ZKTAvc1Br34gM92NXgvBHyQ22N2uG97BQqZfyV0PDaXi0rqip8Ycrxye4knocyE9TJVB /IIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TYPubZ1Zlzb+Enq45ENuVHZhIRqzbvsNOPOeCuzB0p8=; b=m52ZeZX2PBB+GKhJBw134xMQbIaUuTYHEA6/nU1RcnyLMweANcouVHJ+vyZ2Xh4bJ+ +DIIC7pz1dSSHO7tAurTPQYWmd0bjb9J2mSEkyFAwhNUrU82JQBbYCJNCtv46GZWPU4H Yg+21GDEyVjsQXmGEACdjUyoIZ3IRL4icIZeToA3vcuPMq1+nzOvpGlm5+jCFfrBAaEr MHw8gnCrKhBBrD84djKHA6nyr8ztwwNCF5X7Uv5a95H2BYgwSfnDPXMgVfs52dwKOmQk Avmk5d8uciUtRYdj7rv9pbhQY+fTjigqVNx5pTyfQD6odU/5F7kNiN01W8QXBXmQmxfc u2nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NyIqweKU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v29si12729093eda.308.2021.05.10.04.23.05; Mon, 10 May 2021 04:23:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NyIqweKU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234440AbhEJLXL (ORCPT + 99 others); Mon, 10 May 2021 07:23:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:52778 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234178AbhEJK4B (ORCPT ); Mon, 10 May 2021 06:56:01 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B337761464; Mon, 10 May 2021 10:44:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620643467; bh=+hon7tRePnHNKSbakAjM6yRj1+EL6QAEwD/NoxkqwHg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NyIqweKU9vVubIdvBHKnOADFaMp9qFsEAaLy7wiP4ULc4q5Zf3CMCopiFaqwOguz+ Ja+aHVnG6SoQefXfPoGVNsF9DrnWexDmMhk0ytsTOf2x1Qhxz0ZxzhvVsOH9GKSKiu PdIO0vdy2kSzBvUt0GIYsx3Ulu0nMRGrjev/5IA8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Gustavo A. R. Silva" , Serge Semin , Miquel Raynal Subject: [PATCH 5.11 027/342] mtd: physmap: physmap-bt1-rom: Fix unintentional stack access Date: Mon, 10 May 2021 12:16:57 +0200 Message-Id: <20210510102011.004875267@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210510102010.096403571@linuxfoundation.org> References: <20210510102010.096403571@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gustavo A. R. Silva commit 683313993dbe1651c7aa00bb42a041d70e914925 upstream. Cast &data to (char *) in order to avoid unintentionally accessing the stack. Notice that data is of type u32, so any increment to &data will be in the order of 4-byte chunks, and this piece of code is actually intended to be a byte offset. Fixes: b3e79e7682e0 ("mtd: physmap: Add Baikal-T1 physically mapped ROM support") Addresses-Coverity-ID: 1497765 ("Out-of-bounds access") Cc: stable@vger.kernel.org Signed-off-by: Gustavo A. R. Silva Acked-by: Serge Semin Signed-off-by: Miquel Raynal Link: https://lore.kernel.org/linux-mtd/20210212104022.GA242669@embeddedor Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/maps/physmap-bt1-rom.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/mtd/maps/physmap-bt1-rom.c +++ b/drivers/mtd/maps/physmap-bt1-rom.c @@ -79,7 +79,7 @@ static void __xipram bt1_rom_map_copy_fr if (shift) { chunk = min_t(ssize_t, 4 - shift, len); data = readl_relaxed(src - shift); - memcpy(to, &data + shift, chunk); + memcpy(to, (char *)&data + shift, chunk); src += chunk; to += chunk; len -= chunk;