Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp3031443rwb; Mon, 15 Aug 2022 16:30:46 -0700 (PDT) X-Google-Smtp-Source: AA6agR6QtOPjMFYMi5j/FHMWIaimzTUTouaZBsZ01hKQf8WtYjj/i5FNUMnAik5yFwEZG6e5yrS1 X-Received: by 2002:a17:906:a089:b0:72f:826b:e084 with SMTP id q9-20020a170906a08900b0072f826be084mr12330725ejy.708.1660606246400; Mon, 15 Aug 2022 16:30:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660606246; cv=none; d=google.com; s=arc-20160816; b=dLYJz5uCNnG9bRQdhU57DLDQG8IhLbdEXKjvG/De2Bfn4fwzvIW9hVBjuCcMvGlWEQ 0n9YZEoy4h7wT2AXHpXFG/hq7ZR3cQwYY9ppBBIHNiUb/fXZr4pWbSoMkXX2+Vu7wvoy gS/dSvz6jPSdpufD+y2e1fWyoDkf8i+lnPaiM0DWfdn1LramTCdRPbtfXfLcq17vj3Zi OQbuE5GmMDQus+/TLDU2DYvyD9w+ERA+axJaxG3X0kFMt1wJcjWFRAOYEer9jZLioDWk 5gpyTQSm8bpwsxQ8nJS0YH6nmgtC4/TYY45S661UUH3XcOlSzWaxiPj+Fi2JcSmpI+Ur h0cA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pWCxXQZmG9fAvQWdc0b/c3/e4JRIZKm1EZcQiSXaoi8=; b=eVSCgdW16jtX7BGVPgSG1Q0gAZCp7w83vz3p9eM3oXqI5DZaBwScaHE2GvEfkbsr0E im6pQSbfRR6mctxJuJUd1IbpGJSKEStYTiAChk5Giw9XFQezRmrpKHpbI2sTS0FplImh 9Zu+mVTOScb9UD7/jh8B+EQ2aKSaNWsuVvpfEV0BIbpPChfrq3w4Tq+KKrRiV5peq14B mcVPdJ3MaJXy4an7WHSNjfJI8lnu1QydTz7tCnIrZ6QQ10dVazBHzQZVeJtxWqsKwmhH +y4PgdWMdUwBrb6TX2Jms0uUU70jlHbUJTEFq529V76rSwseX8qCF6TtQ3LdYbX2rGkL wlzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=s7e2BMbt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f18-20020a056402161200b0043d01fe042dsi7705743edv.518.2022.08.15.16.30.18; Mon, 15 Aug 2022 16:30:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=s7e2BMbt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245101AbiHOXYt (ORCPT + 99 others); Mon, 15 Aug 2022 19:24:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54086 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344767AbiHOXUz (ORCPT ); Mon, 15 Aug 2022 19:20:55 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 891F57E033; Mon, 15 Aug 2022 13:04:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 44F5FB80EA8; Mon, 15 Aug 2022 20:04:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AE59DC433C1; Mon, 15 Aug 2022 20:04:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660593856; bh=sFF/GLrtKkldifMSHkZh0cLIrumrBiRtQIFmzUP1GiI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=s7e2BMbtwsQqqUjS+6uTffCoR7lw/uiiXWzS/lOjMIvTtaZT/NK8sjVnpQuN/BwN3 a20Y/zGBOFqsDpTicQwhFBe+Mb9nyUsi3HvzsGy6Cuqmc7zEVLEd+63MLzq2SfyTcU 5DrsIef+a2rCvEObxLtG08RH9D+ja7lzhjqZffvc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kodanev , Alex Deucher , Sasha Levin Subject: [PATCH 5.19 0336/1157] drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() Date: Mon, 15 Aug 2022 19:54:52 +0200 Message-Id: <20220815180453.110296283@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220815180439.416659447@linuxfoundation.org> References: <20220815180439.416659447@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexey Kodanev [ Upstream commit 136f614931a2bb73616b292cf542da3a18daefd5 ] The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE since there are no checks for this value in both case labels after the last 'j++'. Instead of changing '>' to '>=' there, add the bounds check at the start of the second 'case' (the first one already has it). Also, remove redundant last checks for 'j' index bigger than array size. The expression is always false. Moreover, before or after the patch 'table->last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it seems it can be a valid value. Detected using the static analysis tool - Svace. Fixes: 69e0b57a91ad ("drm/radeon/kms: add dpm support for cayman (v5)") Signed-off-by: Alexey Kodanev Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin --- drivers/gpu/drm/radeon/ni_dpm.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/drivers/gpu/drm/radeon/ni_dpm.c b/drivers/gpu/drm/radeon/ni_dpm.c index 769f666335ac..672d2239293e 100644 --- a/drivers/gpu/drm/radeon/ni_dpm.c +++ b/drivers/gpu/drm/radeon/ni_dpm.c @@ -2741,10 +2741,10 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, table->mc_reg_table_entry[k].mc_data[j] |= 0x100; } j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; case MC_SEQ_RESERVE_M >> 2: + if (j >= SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) + return -EINVAL; temp_reg = RREG32(MC_PMG_CMD_MRS1); table->mc_reg_address[j].s1 = MC_PMG_CMD_MRS1 >> 2; table->mc_reg_address[j].s0 = MC_SEQ_PMG_CMD_MRS1_LP >> 2; @@ -2753,8 +2753,6 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, (temp_reg & 0xffff0000) | (table->mc_reg_table_entry[k].mc_data[i] & 0x0000ffff); j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; default: break; -- 2.35.1