Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1745428pxb; Thu, 16 Sep 2021 14:39:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwAdXY8qaC6KlOuqNNxeEYenZj3bTkcW4GS25xu1yKvfK6CoApQqUQpMSIUUSoBmkpmsU3M X-Received: by 2002:a17:906:1454:: with SMTP id q20mr8743191ejc.446.1631828351581; Thu, 16 Sep 2021 14:39:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631828351; cv=none; d=google.com; s=arc-20160816; b=KAi5iC851VqQWwT9yKv6yX9+Ze3ihjmX59y85ocN1j+dHHFnX69nfWCYoxOTxEIUTo 4c+9UwU1swfZTd+Ac+4w1xOWSYjlji8VSnanY7o+Yyg1+gI+ISZtMnih9eb3VxsHELYS yZGAE628awiu0C6aA5ZEmlxlBYY7gy9nlfd9muBna84UXDqsov56uC6q0E+SUVbEjv2h qkVixFNBFLJ9JvtOORbEJ4by33tgP3KislBbRnw7q3qMabUhuqR2WsKZAFA6o/iKQp2C +vljo8Xb0kTPmZvjtX6CMBffY680DMRuoSaPio8MY+FaI5FzbmM4I101fpYwAfmR4HqQ OHlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=t2Ey+agezt2X68UcZ6FTJ8wikMZQHWJSfTP/2SoRALo=; b=DMcD9cfjlKUViog/1a8lGakonInFMhYa5LzcAe5vS8h7X6m5MXjf7Jjtmf717YXh0u dXEDeqpcGhPa61qAvXJxxXAH1AAuB+sg5iql3od9gSkNSrpv7G/ETGsvKccNSyLDhW+r hPGarpwphh1Km5kpCL+5mPEReNWZN9SeO7k4Mlcga74Je/oLMGjNVX45dlRyqbrQIhHF /1xIVM03io1IOdu4MoldCba463dS9hii+XoKkW53rQ9tcuKaCZZhcrjpQ4WsFhh+7ufA oUMP3Jadu75NLErfHIdUrXyUPUCKm6GuSbHxFBLCuP+SYjwmEYRCc7e++YozhIsZxRmd bRsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=I39rhNeP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z9si5147766edp.633.2021.09.16.14.38.47; Thu, 16 Sep 2021 14:39:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=I39rhNeP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242199AbhIPQgN (ORCPT + 99 others); Thu, 16 Sep 2021 12:36:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:37000 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240930AbhIPQ2s (ORCPT ); Thu, 16 Sep 2021 12:28:48 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4026961354; Thu, 16 Sep 2021 16:18:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631809093; bh=d6LoCSuTnfwIgOGiuZ/lv40mgJX33fKMA5AkF0j1eIE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I39rhNeP30TeoItn7jjmTonbgcUgfqfdYzEePv7WIsKCB277+olgi9BnRW2vwSYrw 4GZmDwiv6A+gf4uhW9QJXQKA8gpm8+YdWQHxsVWWR3xJkAY6ueI8DOHfPino4Yac5U ma5skcRqTvm61UmMQoxyjniZr5JgE/NPrZpxS51o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Iwona Winiarska , Andrew Jeffery , Joel Stanley , Joel Stanley Subject: [PATCH 5.13 028/380] soc: aspeed: lpc-ctrl: Fix boundary check for mmap Date: Thu, 16 Sep 2021 17:56:25 +0200 Message-Id: <20210916155804.922880193@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210916155803.966362085@linuxfoundation.org> References: <20210916155803.966362085@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Iwona Winiarska commit b49a0e69a7b1a68c8d3f64097d06dabb770fec96 upstream. The check mixes pages (vm_pgoff) with bytes (vm_start, vm_end) on one side of the comparison, and uses resource address (rather than just the resource size) on the other side of the comparison. This can allow malicious userspace to easily bypass the boundary check and map pages that are located outside memory-region reserved by the driver. Fixes: 6c4e97678501 ("drivers/misc: Add Aspeed LPC control driver") Cc: stable@vger.kernel.org Signed-off-by: Iwona Winiarska Reviewed-by: Andrew Jeffery Tested-by: Andrew Jeffery Reviewed-by: Joel Stanley Signed-off-by: Joel Stanley Signed-off-by: Greg Kroah-Hartman --- drivers/soc/aspeed/aspeed-lpc-ctrl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/soc/aspeed/aspeed-lpc-ctrl.c +++ b/drivers/soc/aspeed/aspeed-lpc-ctrl.c @@ -51,7 +51,7 @@ static int aspeed_lpc_ctrl_mmap(struct f unsigned long vsize = vma->vm_end - vma->vm_start; pgprot_t prot = vma->vm_page_prot; - if (vma->vm_pgoff + vsize > lpc_ctrl->mem_base + lpc_ctrl->mem_size) + if (vma->vm_pgoff + vma_pages(vma) > lpc_ctrl->mem_size >> PAGE_SHIFT) return -EINVAL; /* ast2400/2500 AHB accesses are not cache coherent */