Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4506586pxv; Tue, 29 Jun 2021 08:33:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDBYv2+HVMUeRj6zRWtqBxITGqAXoAd4vO5jTQ3OfGHYk78SRY3gyqCUTVYeBznm3q0bOn X-Received: by 2002:a6b:5b11:: with SMTP id v17mr4478395ioh.19.1624980833264; Tue, 29 Jun 2021 08:33:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624980833; cv=none; d=google.com; s=arc-20160816; b=NQQJ0pcthETN5KcuPqkH5EPgnwk30f9bgq77XDRSXXPwkawYzz4U+ao3U2BY9txoL6 8cdA+ztANG/7/gwxeyrzadNzUSORGmfEN2y5gb6A8VWoWlVmJwjhUAeRYHmBqz45+eyG NVMobOQYHzDwBufkNRYiNIXKv3bdWlbj7KdUVXzdfFY+sjiI252nCmxMV9CPdimF7Zpf aXeMYOameFRsKZBqUOg3LYUh73soKsyJ8kOC83XtJOl1umEUZc6z5Qs1ZsDjfzG0TopO 07PDtWLChGXvpX00tGohEuG6s14Nzgwal+7t0Tpw/8ku1zJIoDa2C+LRll02of5TYgVp KJFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=8u9/LGHCVwZ4midNSAwp0N6rAWr4KVJQJiuvperVNgM=; b=tpI59ayty+GTsx73ZAcZB8miX2qo64gLd6iTATZEPIGuwFUkTs0gcnzwTN+A/e/w5z UdDBz0yO+WTdcY2frmdqV+uHjGL+wwZa+ZCd449zLb1A35b7ep6lIwV6RHY7L7un7f69 BQE1k2yJlqUVQ26xFGo99Jdi0bP8Lsd5YeoSaryZlsrem2P+M2wlhqWKZDa3Ly2efJ4t ZJZt9fKcvkl0j6Km9xCbjb3QLzLbqH3fKZ4/9aWo1DM97B0Kh786B8YBclALB/8EZLeH 68RR8g1YYHHN9fzPGrwij8RZA7U+kCzzlprzAxEo16Z+9+jR062aw8iMwdJoss26zCJg biew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=cEDzvMJS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e25si15805254ioh.19.2021.06.29.08.33.40; Tue, 29 Jun 2021 08:33:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=cEDzvMJS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234669AbhF2Pfa (ORCPT + 99 others); Tue, 29 Jun 2021 11:35:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60420 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234700AbhF2Pf1 (ORCPT ); Tue, 29 Jun 2021 11:35:27 -0400 Received: from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com [IPv6:2607:f8b0:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC5A3C061766 for ; Tue, 29 Jun 2021 08:32:59 -0700 (PDT) Received: by mail-pg1-x52c.google.com with SMTP id 80so3084263pgg.10 for ; Tue, 29 Jun 2021 08:32:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=8u9/LGHCVwZ4midNSAwp0N6rAWr4KVJQJiuvperVNgM=; b=cEDzvMJSf0V/qxS792iiW7NtANHon/YY/N4MPAq+K+5xEQgpqY43aNa4uy2J0526WD hKc9tjpd+YRD003F0FPzxwcuHPW78q0epDHUcvNjH2zTxlS2g0FeyBw4KOAH9r7OdGq4 qqrH+2IryC/LKBTWoqL1wZuInSfMVch5La0d9zI42Cd50cbjEl8RKXXJi3UT/0E6ycXW +UTJfkkEeIupxO1T7jbux79yHmLNf1TE9TnsF/m60f5uNw9j5sue8Mf3BldZvWqqwQOj NrLjzX99DqL3KhV7gLshphXaaUJIBWv95KGy8fAJtSFChaxKXdKYXfOb7amtp78XBP5Y OUcQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=8u9/LGHCVwZ4midNSAwp0N6rAWr4KVJQJiuvperVNgM=; b=n0MNL6d9ofOih2z4vZpiagtNfbNk1eZUH9GmIU9HHGsbztSt1DbZ4BuyBD1v9AZkbt 6kcPKjJX5PIVHaebzfcIbOndrse0+4rYAm9udKRz/N8kBD/dmhnc8d4SKlPKShHZSeez +JHh2Jk5f3ncHHfNYQ0rE4VnD7xOK2C+KkHS2NgNIc0uLi8yVSEmBIk/Eg+qDrrIhpnZ +5Gwbb7A1t60/hIraqjrfqcKMbcKU09ZUwB1D9w9MDTk8RVRhCVuNq+xYEhiSmf+336G 7DbbZKuqz5bmWoYV6VeXJx+BWhmZp1VWhV9NDk3qGugPpvsbrTuzJR1uPx+HQwRXifez fQ/g== X-Gm-Message-State: AOAM532E+NaV0Bm7ytOxZWSstcqrKrU01ks1icated4coRHIlHkTeDse 5rUQNssAyAddVy0E0lB22LtE X-Received: by 2002:a63:4a53:: with SMTP id j19mr28440176pgl.144.1624980779312; Tue, 29 Jun 2021 08:32:59 -0700 (PDT) Received: from localhost.localdomain ([120.138.12.32]) by smtp.gmail.com with ESMTPSA id s79sm11444492pfc.87.2021.06.29.08.32.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Jun 2021 08:32:58 -0700 (PDT) From: Manivannan Sadhasivam To: bjorn.andersson@linaro.org Cc: linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, thara.gopinath@linaro.org, mka@chromium.org, Manivannan Sadhasivam , stable@vger.kernel.org Subject: [PATCH v2] soc: qcom: aoss: Fix the out of bound usage of cooling_devs Date: Tue, 29 Jun 2021 21:02:49 +0530 Message-Id: <20210629153249.73428-1-manivannan.sadhasivam@linaro.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In "qmp_cooling_devices_register", the count value is initially QMP_NUM_COOLING_RESOURCES, which is 2. Based on the initial count value, the memory for cooling_devs is allocated. Then while calling the "qmp_cooling_device_add" function, count value is post-incremented for each child node. This makes the out of bound access to the cooling_dev array. Fix it by passing the QMP_NUM_COOLING_RESOURCES definition to devm_kzalloc() and initializing the count to 0. While at it, let's also free the memory allocated to cooling_dev if no cooling device is found in DT and during unroll phase. Cc: stable@vger.kernel.org # 5.4 Fixes: 05589b30b21a ("soc: qcom: Extend AOSS QMP driver to support resources that are used to wake up the SoC.") Signed-off-by: Manivannan Sadhasivam --- Changes in v2: * Used QMP_NUM_COOLING_RESOURCES directly and initialized count to 0 drivers/soc/qcom/qcom_aoss.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/soc/qcom/qcom_aoss.c b/drivers/soc/qcom/qcom_aoss.c index 934fcc4d2b05..7b6b94332510 100644 --- a/drivers/soc/qcom/qcom_aoss.c +++ b/drivers/soc/qcom/qcom_aoss.c @@ -476,12 +476,12 @@ static int qmp_cooling_device_add(struct qmp *qmp, static int qmp_cooling_devices_register(struct qmp *qmp) { struct device_node *np, *child; - int count = QMP_NUM_COOLING_RESOURCES; + int count = 0; int ret; np = qmp->dev->of_node; - qmp->cooling_devs = devm_kcalloc(qmp->dev, count, + qmp->cooling_devs = devm_kcalloc(qmp->dev, QMP_NUM_COOLING_RESOURCES, sizeof(*qmp->cooling_devs), GFP_KERNEL); @@ -497,12 +497,16 @@ static int qmp_cooling_devices_register(struct qmp *qmp) goto unroll; } + if (!count) + devm_kfree(qmp->dev, qmp->cooling_devs); + return 0; unroll: while (--count >= 0) thermal_cooling_device_unregister (qmp->cooling_devs[count].cdev); + devm_kfree(qmp->dev, qmp->cooling_devs); return ret; } -- 2.25.1