Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3469725rwa; Tue, 23 Aug 2022 05:24:22 -0700 (PDT) X-Google-Smtp-Source: AA6agR6vdIrE+bLoUCQFvM5R9U9rmZ3aoBYmfdNDxUBAxLD3o4iaJ32HWNMI5RbQQzbz+OjbARPz X-Received: by 2002:a17:902:e5c2:b0:172:f66b:c760 with SMTP id u2-20020a170902e5c200b00172f66bc760mr5937814plf.92.1661257461781; Tue, 23 Aug 2022 05:24:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661257461; cv=none; d=google.com; s=arc-20160816; b=KDlwnsD/iIQ/aJiGUvPU0ZzjAib35kOl4RCs+A2uFxVVburhI+jylFgX8Y0ZoSBnS4 8ggO+enHCnVR5jNQauEe4cvYloQs+huOQAbm10EC6xYNnz3yfibd6jS/BRUJEXAY7naD oGygSrq/F77uITBZCayB79mh5Sn0dl6Yl12gQhco6uQhfIF+Rx7ER6CfrXU3vwi9Hwa3 V+NnN6b7SBtrJyvkrqGg+lxd3pHNEIlnZnkK97IpvYBB5OhvMESJRbFrZTXe1/8n8MbM wKEdfRmYXVoJB5lPU5R8MaQP6nVg/jX4uqwhNmUkS8yU9WDQaiC+SMQqnFH09UcW6tjy sVbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+wwfT0Oqmk9qaczibdKy5cwGCA2yHNS+g5XMhy+at50=; b=ljFRE+j4GA4Fpf1tuX9FEqA+cPmmJoNPpdhgpieV6fzZB+RLchRPc7f1gYVsWwc1mL yUvoMe/VJ02CjUbWCwKVZEHqC4XvNm15kk5rgCAIgDi1TYH7qDvR3GSgU/O5wJ0ETY9A 0HGRIJmKyFCn91TvqaD4HvNOoKgatbOhUJ+b2NmFFcUDV7cLXK4o3c1BKgH8bdUEbLzk 2P49E34QDsCcMgRRWY796c3fmy0kXz+l+TED0k+OblgKR2n6XpkF9KuPF9ozn7EEQ5Pa GWc+qWpgcbEaoaQrXTAseLGI8Oj9A3nxdKcVOb9vJmCoMhXcYuhBsW0+P8HmTag1aKc/ rF2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="p/VXF0kI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x12-20020a17090300cc00b0016f965f49dbsi13896624plc.485.2022.08.23.05.24.10; Tue, 23 Aug 2022 05:24:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="p/VXF0kI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355542AbiHWKjM (ORCPT + 99 others); Tue, 23 Aug 2022 06:39:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244046AbiHWKX2 (ORCPT ); Tue, 23 Aug 2022 06:23:28 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F223A832C1; Tue, 23 Aug 2022 02:04:30 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id BE4EAB8105C; Tue, 23 Aug 2022 09:04:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 19AE7C433C1; Tue, 23 Aug 2022 09:04:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661245467; bh=R9mVadXHaS5xspBheWQX2CP25D+fdWydUR/Iv+zRx6s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=p/VXF0kI4x1jcFx8e0KXsjjWQBkhjHrv5A+DM3i3EqhqszPD0LHAeGzEb1OsXvbIg eKnXzOP2mitVC9Jb7ZSOgeKWsssccLD0BQdV1olMRFtCBuMjYfbUFWWAz9dUHoQ8gg i5H9nReEfHFO22VAtDCXzrNQnpxTSYFofhd0EMv0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kodanev , Alex Deucher , Sasha Levin Subject: [PATCH 4.19 070/287] drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() Date: Tue, 23 Aug 2022 10:23:59 +0200 Message-Id: <20220823080102.594220603@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080100.268827165@linuxfoundation.org> References: <20220823080100.268827165@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexey Kodanev [ Upstream commit 136f614931a2bb73616b292cf542da3a18daefd5 ] The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE since there are no checks for this value in both case labels after the last 'j++'. Instead of changing '>' to '>=' there, add the bounds check at the start of the second 'case' (the first one already has it). Also, remove redundant last checks for 'j' index bigger than array size. The expression is always false. Moreover, before or after the patch 'table->last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it seems it can be a valid value. Detected using the static analysis tool - Svace. Fixes: 69e0b57a91ad ("drm/radeon/kms: add dpm support for cayman (v5)") Signed-off-by: Alexey Kodanev Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin --- drivers/gpu/drm/radeon/ni_dpm.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/drivers/gpu/drm/radeon/ni_dpm.c b/drivers/gpu/drm/radeon/ni_dpm.c index f86ca163dcf3..a7273c01de34 100644 --- a/drivers/gpu/drm/radeon/ni_dpm.c +++ b/drivers/gpu/drm/radeon/ni_dpm.c @@ -2738,10 +2738,10 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, table->mc_reg_table_entry[k].mc_data[j] |= 0x100; } j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; case MC_SEQ_RESERVE_M >> 2: + if (j >= SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) + return -EINVAL; temp_reg = RREG32(MC_PMG_CMD_MRS1); table->mc_reg_address[j].s1 = MC_PMG_CMD_MRS1 >> 2; table->mc_reg_address[j].s0 = MC_SEQ_PMG_CMD_MRS1_LP >> 2; @@ -2750,8 +2750,6 @@ static int ni_set_mc_special_registers(struct radeon_device *rdev, (temp_reg & 0xffff0000) | (table->mc_reg_table_entry[k].mc_data[i] & 0x0000ffff); j++; - if (j > SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE) - return -EINVAL; break; default: break; -- 2.35.1