Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp2927222rwb; Mon, 15 Aug 2022 14:12:37 -0700 (PDT) X-Google-Smtp-Source: AA6agR4xNY51o8QFm1zeu9LxPdRpm4KDva1rUgCXLAaup0tzwR2sh5uCZOs0UhTFkd2JjCrudU0R X-Received: by 2002:a17:90b:1241:b0:1f3:1d9f:a933 with SMTP id gx1-20020a17090b124100b001f31d9fa933mr19862806pjb.221.1660597957589; Mon, 15 Aug 2022 14:12:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660597957; cv=none; d=google.com; s=arc-20160816; b=nsCNcXafBnvis+O1X+ziBjvE4NI9xdbSyfq1q1xggtVkgG2zU5EvCetYFa43lgV+nd uU+2SADohCZerjDyvvWPsXh2G11XOnT4N9xsv/VygkzOQFtUYldAixkyMg5UE4GtJP/X WY3+2j+2SbxRwW0KWMr/y4lEWcZJN+6Y9+ttBhNVQWNmeHKiySp84OvMpqm8IQIdnTjj n5AG3aVRUcyr/C99mvGSEUdYNqT2Awy2mlBdjnhYaW07I7FFwBb4TbrCl1rq4lPQugg4 4nbPbQocJPXc72cVsalVel9oY79CuY72LxUsuP+m4Pj0+pX+2gBvkfTMzAD1nQL7BW4x 13Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pWCxXQZmG9fAvQWdc0b/c3/e4JRIZKm1EZcQiSXaoi8=; b=q9kEtSNbfJxEMJ/IVD1qnmWD7GvNKQbkkOnnN5vtCuHWPnI/XYjsalWx/Nqmhzsb15 98B8MQo5xLksC028Y4xFTMA3lw4DaltcKrhSII3uyq+15sH1bxhFWBEbKrZokf4PdiIO Zdb0ilhrP6BppZoZOutNs7a6oD4l9uMLlB8gxBAtGpH1zE2We/xq7iSWZ3IvifrTeSrX uyhAHed2vEC8RiLihJefleKLK/6sMXlRjXFM2M0xS4z3bNcHDVKltw+rdfl+AIDuBWCT W1H2JqxmQaTg9Anhbr+RySo7yRBTDN9KrX2xW6wsjMKQpOLee3rRShSZFkoB2DRLnTaM 1AWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="DC/37QfV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d8-20020a655ac8000000b0041d67aea419si12151319pgt.149.2022.08.15.14.12.25; Mon, 15 Aug 2022 14:12:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="DC/37QfV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243764AbiHOSp0 (ORCPT + 99 others); Mon, 15 Aug 2022 14:45:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38316 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244019AbiHOSl7 (ORCPT ); Mon, 15 Aug 2022 14:41:59 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 39D2B2F01E; Mon, 15 Aug 2022 11:25:41 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E55F8B81071; Mon, 15 Aug 2022 18:25:39 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 45653C433C1; Mon, 15 Aug 2022 18:25:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660587938; bh=sFF/GLrtKkldifMSHkZh0cLIrumrBiRtQIFmzUP1GiI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DC/37QfVO/mu7o7j6bJqlEhzLRbX+W3+WUsQEnSyOmhncPZJuF8HFRPbdM7oZNjB9 50cFm4sUu0IVGgl6IUurJY8plAQ7h0s7Hxd7ocIDgsvzi8yKxu+aHA54d+7K1AOEY3 9ZB+tfzTwrtsuk8KziDxzzhCEUVk8WYLG/Fe1dWs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kodanev , Alex Deucher , Sasha Levin Subject: [PATCH 5.15 243/779] drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() Date: Mon, 15 Aug 2022 19:58:07 +0200 Message-Id: <20220815180347.697326143@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220815180337.130757997@linuxfoundation.org> References: <20220815180337.130757997@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexey Kodanev [ Upstream commit 136f614931a2bb73616b292cf542da3a18daefd5 ] The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE since there are no checks for this value in both case labels after the last 'j++'. Instead of changing '>' to '>=' there, add the bounds check at the start of the second 'case' (the first one already has it). Also, remove redundant last checks for 'j' index bigger than array size. The expression is always false. Moreover, before or after the patch 'table->last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it seems it can be a valid value. Detected using the static analysis tool - Svace. Fixes: 69e0b57a91ad ("drm/radeon/kms: add dpm support for cayman (v5)") Signed-off-by: Alexey Kodanev Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin --- drivers/gpu/drm/radeon/ni_dpm.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/drivers/gpu/drm/radeon/ni_dpm.c b/drivers/gpu/drm/radeon/ni_dpm.c index 769f666335ac..672d2239293e 100644 --- a/drivers/gpu/drm/radeon/ni_dpm.c +++ b/drivers/gpu/drm/radeon/ni_dpm.c @@ -2741,10 +2741,10 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, table->mc_reg_table_entry[k].mc_data[j] |= 0x100; } j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; case MC_SEQ_RESERVE_M >> 2: + if (j >= SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) + return -EINVAL; temp_reg = RREG32(MC_PMG_CMD_MRS1); table->mc_reg_address[j].s1 = MC_PMG_CMD_MRS1 >> 2; table->mc_reg_address[j].s0 = MC_SEQ_PMG_CMD_MRS1_LP >> 2; @@ -2753,8 +2753,6 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, (temp_reg & 0xffff0000) | (table->mc_reg_table_entry[k].mc_data[i] & 0x0000ffff); j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; default: break; -- 2.35.1