Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2827047pxb; Mon, 1 Nov 2021 02:38:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzuqQo0n+ORBX+XxjzlfrgIs9WT3I11id9ZakHGc23+ZO4YXSLC/xXGY9UIeEScyYoS+VUz X-Received: by 2002:a17:906:7304:: with SMTP id di4mr34500747ejc.179.1635759516757; Mon, 01 Nov 2021 02:38:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635759516; cv=none; d=google.com; s=arc-20160816; b=uRfDen/FBZ7sNAFOb8v0BfDK7wAl2wZhm0UcIid4q3vcoj1Inw848dOyhnzcyf3Nau P0VIHUx8rUyXBNoUIZznigAPMQDSGOeIuBfl8aWU82P+Q8HihXTtT3OtrraNZ+8RGTAc soJhOVVDa1thKwaABSOI2Hi6wcn4/WERkHBFkA+oXQxr37n9CDFbkebQCqbN0O5O6qsv sYfP5POd2sfrMx+VgNEkEkiYUtjLc2Ys79DEvIJLErVVDO7ceVTen0/M51UYYWOZhVp2 38z8iPx2Lwz5myU0CXFz3b1BQLTtFFcUohS++DnrQN2fCBvzGIzKyshazVn8r3K1071n MGvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PPtYM2Fb6J77BibmN8b4ACFkDXUhOW4/0dK0DBYjmM0=; b=dmPIF/SbRaJP/ZFtrUBMc5pK5eOPjF5pu6c7PpkJj0Pq4gbKUlC/yF+wsTHuVYwLoR +bX2H13b/SJKxniVJjMjoXy8VhmILMDDOlVhdsQD9PBoItJB0wc0VuhDiTtk7K+sS/Gb 7q+in77vmA6ww1g+92Qsa1CRwn0d6E7jiee8BW4NDB66glMcEHsApDBPvEJPZxM24JSc 2zo60VvXWWRN/vhHIKViDUlytI5BO87uKP6GLAPP1OAIHzgEabiydMkxGNe3Wh0BMsKT 6Ag/ur2cRvDTcOuFuxvQR1izVO+tgpAvdqpPQX4BeLagySdEMPpROfzZt51vfmViuzEI 7R0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lYAmRi5e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qf32si23125484ejc.47.2021.11.01.02.38.13; Mon, 01 Nov 2021 02:38:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lYAmRi5e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232161AbhKAJgX (ORCPT + 99 others); Mon, 1 Nov 2021 05:36:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:37006 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232593AbhKAJcM (ORCPT ); Mon, 1 Nov 2021 05:32:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3F0C861246; Mon, 1 Nov 2021 09:24:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1635758660; bh=se536qyWgd+Saudg8JzNo5S9uEwyH7QnCMCSpXHPrBI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lYAmRi5eX0lgsBDhGwJj+Sa2KZzWx4nNfDPACaoBZMfg1ojgaHSQ4hr8kw9f98VX0 vc8rm7PT1dLw+rQhVfjvL4Kws59aqX76SLk2sxyZpdkjHJvlw5GKNVIDPZoHKXZmHz dvq4QZxvsE0Aei1IkSQ28YI8gkfLntdhxsLuvb5c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ilja Van Sprundel , Dennis Dalessandro , Mike Marciniszyn , Jason Gunthorpe Subject: [PATCH 5.4 24/51] IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields Date: Mon, 1 Nov 2021 10:17:28 +0100 Message-Id: <20211101082506.113656197@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211101082500.203657870@linuxfoundation.org> References: <20211101082500.203657870@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mike Marciniszyn commit d39bf40e55e666b5905fdbd46a0dced030ce87be upstream. Overflowing either addrlimit or bytes_togo can allow userspace to trigger a buffer overflow of kernel memory. Check for overflows in all the places doing math on user controlled buffers. Fixes: f931551bafe1 ("IB/qib: Add new qib driver for QLogic PCIe InfiniBand adapters") Link: https://lore.kernel.org/r/20211012175519.7298.77738.stgit@awfm-01.cornelisnetworks.com Reported-by: Ilja Van Sprundel Reviewed-by: Dennis Dalessandro Signed-off-by: Mike Marciniszyn Signed-off-by: Dennis Dalessandro Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/qib/qib_user_sdma.c | 33 ++++++++++++++++++++---------- 1 file changed, 23 insertions(+), 10 deletions(-) --- a/drivers/infiniband/hw/qib/qib_user_sdma.c +++ b/drivers/infiniband/hw/qib/qib_user_sdma.c @@ -602,7 +602,7 @@ done: /* * How many pages in this iovec element? */ -static int qib_user_sdma_num_pages(const struct iovec *iov) +static size_t qib_user_sdma_num_pages(const struct iovec *iov) { const unsigned long addr = (unsigned long) iov->iov_base; const unsigned long len = iov->iov_len; @@ -658,7 +658,7 @@ static void qib_user_sdma_free_pkt_frag( static int qib_user_sdma_pin_pages(const struct qib_devdata *dd, struct qib_user_sdma_queue *pq, struct qib_user_sdma_pkt *pkt, - unsigned long addr, int tlen, int npages) + unsigned long addr, int tlen, size_t npages) { struct page *pages[8]; int i, j; @@ -722,7 +722,7 @@ static int qib_user_sdma_pin_pkt(const s unsigned long idx; for (idx = 0; idx < niov; idx++) { - const int npages = qib_user_sdma_num_pages(iov + idx); + const size_t npages = qib_user_sdma_num_pages(iov + idx); const unsigned long addr = (unsigned long) iov[idx].iov_base; ret = qib_user_sdma_pin_pages(dd, pq, pkt, addr, @@ -824,8 +824,8 @@ static int qib_user_sdma_queue_pkts(cons unsigned pktnw; unsigned pktnwc; int nfrags = 0; - int npages = 0; - int bytes_togo = 0; + size_t npages = 0; + size_t bytes_togo = 0; int tiddma = 0; int cfur; @@ -885,7 +885,11 @@ static int qib_user_sdma_queue_pkts(cons npages += qib_user_sdma_num_pages(&iov[idx]); - bytes_togo += slen; + if (check_add_overflow(bytes_togo, slen, &bytes_togo) || + bytes_togo > type_max(typeof(pkt->bytes_togo))) { + ret = -EINVAL; + goto free_pbc; + } pktnwc += slen >> 2; idx++; nfrags++; @@ -904,8 +908,7 @@ static int qib_user_sdma_queue_pkts(cons } if (frag_size) { - int tidsmsize, n; - size_t pktsize; + size_t tidsmsize, n, pktsize, sz, addrlimit; n = npages*((2*PAGE_SIZE/frag_size)+1); pktsize = struct_size(pkt, addr, n); @@ -923,14 +926,24 @@ static int qib_user_sdma_queue_pkts(cons else tidsmsize = 0; - pkt = kmalloc(pktsize+tidsmsize, GFP_KERNEL); + if (check_add_overflow(pktsize, tidsmsize, &sz)) { + ret = -EINVAL; + goto free_pbc; + } + pkt = kmalloc(sz, GFP_KERNEL); if (!pkt) { ret = -ENOMEM; goto free_pbc; } pkt->largepkt = 1; pkt->frag_size = frag_size; - pkt->addrlimit = n + ARRAY_SIZE(pkt->addr); + if (check_add_overflow(n, ARRAY_SIZE(pkt->addr), + &addrlimit) || + addrlimit > type_max(typeof(pkt->addrlimit))) { + ret = -EINVAL; + goto free_pbc; + } + pkt->addrlimit = addrlimit; if (tiddma) { char *tidsm = (char *)pkt + pktsize;