Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4546196pxj; Wed, 12 May 2021 07:56:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/q3ccchZfVkYOzGRwipNToNRYLj29ehadTII2EC/XdJxQ0nuJaRBhOlgAxHqNGLfluVvB X-Received: by 2002:a17:906:b03:: with SMTP id u3mr37440268ejg.381.1620831417051; Wed, 12 May 2021 07:56:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620831417; cv=none; d=google.com; s=arc-20160816; b=tsQWHnFNBvCtpxPE/EaTob1gcWjK2dvlZDXGcM2Q/J40taUEZCuG8yj6Hqtq9ECp6L 1/wff7gyIRnznXJn6ZBIKBJoPEPiIyHPmmRlDbMFa6JosNTPTMUa0EDTj+Nw5KpxPTeC YBiKGeuXJ4yRclwTlMq/MuP7lqDOgQlBB9JJ/gpmRfBE6qgv83hGh8tfX15KXogHqaH5 czo0ozDiLqD5CAAeaKGKN/P2CN6hG6Z8HKz+p6SXKDb1t/tlCIyDEvJ6Bi7MeNLMpyYN sJ3nKTim6/saXN6XRQ6cG9upJY8QUFCxSUTh3WyEyxKk3wNwSKL2QBYHriqiMIR+u/E9 GGdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=l1Qr39wzZVh0dEfE6CPaWqxVknJbJIVPxlQlM1/htIQ=; b=TvuBKju+4Ss+JCTP0oBouWPJhnXbCJUsqdRtS40J+yUuYutbWkwTIuhDpwfiMBguNU uAPjACXj+f2YJW0OJ+MgYKWVzAXVF2ifsglYpQ3W+G77bfCVkN0UB9GS/FHr38UZP4NN BlS8oiKY/Y00TJz8v+qyErD0eFTqICOjalIS7INaQOXIXSNCSNiw9hnM/NYNUddwER+V nA8NcDyghzVtxXlMAf9yXAjeeN2W71eP2/+Jc5bKxyf8NInqJM+nigQvSBDlL9XbTQ+t /QBlG/bnZ+C9mlASz5Azya6LQZ3WnpMzMA5xn+H2VgODXV+JZ1A9a+jiSJqUaYS55NCc VDhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=grhBsQLA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d12si12077597edo.215.2021.05.12.07.56.33; Wed, 12 May 2021 07:56:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=grhBsQLA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230442AbhELOzx (ORCPT + 99 others); Wed, 12 May 2021 10:55:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:43384 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231904AbhELOzG (ORCPT ); Wed, 12 May 2021 10:55:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E3F366142E; Wed, 12 May 2021 14:53:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620831237; bh=/TGn1ylnDOkxje5xAdCTcJJcxT70LSEBYIgHAvb7fHI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=grhBsQLA7uee843DukVT34bzjYL2CpqHYjgbO/1BPXWI6W86DbuDlf1wKjGnlgoGD YzsTkIgS7H3R4Ykb8citEUsanp6Jt0j7BUidIQxdnPbrx/k+nnRr28ys+o0hEr0UPI EfczzUOyvYCUDiTWo1l9LNprhyLczQzlDYV5Hjis= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?=D0=91=D0=BE=D0=B3=D0=B4=D0=B0=D0=BD=20=D0=9F=D0=B8=D0=BB=D0=B8=D0=BF=D0=B5=D0=BD=D0=BA=D0=BE?= , Larry Finger , Ping-Ke Shih , Kalle Valo Subject: [PATCH 5.4 038/244] rtw88: Fix array overrun in rtw_get_tx_power_params() Date: Wed, 12 May 2021 16:46:49 +0200 Message-Id: <20210512144744.273087613@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144743.039977287@linuxfoundation.org> References: <20210512144743.039977287@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ping-Ke Shih commit 2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e upstream. Using a kernel with the Undefined Behaviour Sanity Checker (UBSAN) enabled, the following array overrun is logged: ================================================================================ UBSAN: array-index-out-of-bounds in /home/finger/wireless-drivers-next/drivers/net/wireless/realtek/rtw88/phy.c:1789:34 index 5 is out of range for type 'u8 [5]' CPU: 2 PID: 84 Comm: kworker/u16:3 Tainted: G O 5.12.0-rc5-00086-gd88bba47038e-dirty #651 Hardware name: TOSHIBA TECRA A50-A/TECRA A50-A, BIOS Version 4.50 09/29/2014 Workqueue: phy0 ieee80211_scan_work [mac80211] Call Trace: dump_stack+0x64/0x7c ubsan_epilogue+0x5/0x40 __ubsan_handle_out_of_bounds.cold+0x43/0x48 rtw_get_tx_power_params+0x83a/drivers/net/wireless/realtek/rtw88/0xad0 [rtw_core] ? rtw_pci_read16+0x20/0x20 [rtw_pci] ? check_hw_ready+0x50/0x90 [rtw_core] rtw_phy_get_tx_power_index+0x4d/0xd0 [rtw_core] rtw_phy_set_tx_power_level+0xee/0x1b0 [rtw_core] rtw_set_channel+0xab/0x110 [rtw_core] rtw_ops_config+0x87/0xc0 [rtw_core] ieee80211_hw_config+0x9d/0x130 [mac80211] ieee80211_scan_state_set_channel+0x81/0x170 [mac80211] ieee80211_scan_work+0x19f/0x2a0 [mac80211] process_one_work+0x1dd/0x3a0 worker_thread+0x49/0x330 ? rescuer_thread+0x3a0/0x3a0 kthread+0x134/0x150 ? kthread_create_worker_on_cpu+0x70/0x70 ret_from_fork+0x22/0x30 ================================================================================ The statement where an array is being overrun is shown in the following snippet: if (rate <= DESC_RATE11M) tx_power = pwr_idx_2g->cck_base[group]; else ====> tx_power = pwr_idx_2g->bw40_base[group]; The associated arrays are defined in main.h as follows: struct rtw_2g_txpwr_idx { u8 cck_base[6]; u8 bw40_base[5]; struct rtw_2g_1s_pwr_idx_diff ht_1s_diff; struct rtw_2g_ns_pwr_idx_diff ht_2s_diff; struct rtw_2g_ns_pwr_idx_diff ht_3s_diff; struct rtw_2g_ns_pwr_idx_diff ht_4s_diff; }; The problem arises because the value of group is 5 for channel 14. The trivial increase in the dimension of bw40_base fails as this struct must match the layout of efuse. The fix is to add the rate as an argument to rtw_get_channel_group() and set the group for channel 14 to 4 if rate <= DESC_RATE11M. This patch fixes commit fa6dfe6bff24 ("rtw88: resolve order of tx power setting routines") Fixes: fa6dfe6bff24 ("rtw88: resolve order of tx power setting routines") Reported-by: Богдан Пилипенко Signed-off-by: Larry Finger Signed-off-by: Ping-Ke Shih Cc: Stable Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20210401192717.28927-1-Larry.Finger@lwfinger.net Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtw88/phy.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/drivers/net/wireless/realtek/rtw88/phy.c +++ b/drivers/net/wireless/realtek/rtw88/phy.c @@ -1451,7 +1451,7 @@ void rtw_phy_load_tables(struct rtw_dev } } -static u8 rtw_get_channel_group(u8 channel) +static u8 rtw_get_channel_group(u8 channel, u8 rate) { switch (channel) { default: @@ -1495,6 +1495,7 @@ static u8 rtw_get_channel_group(u8 chann case 106: return 4; case 14: + return rate <= DESC_RATE11M ? 5 : 4; case 108: case 110: case 112: @@ -1744,7 +1745,7 @@ void rtw_get_tx_power_params(struct rtw_ s8 *limit = &pwr_param->pwr_limit; pwr_idx = &rtwdev->efuse.txpwr_idx_table[path]; - group = rtw_get_channel_group(ch); + group = rtw_get_channel_group(ch, rate); /* base power index for 2.4G/5G */ if (ch <= 14) {