Received: by 2002:a05:6358:701b:b0:131:369:b2a3 with SMTP id 27csp2545460rwo; Sun, 23 Jul 2023 18:34:43 -0700 (PDT) X-Google-Smtp-Source: APBJJlGVbASsNIEhL6pfbRIK93jyu8nRLcreIj1xMR9DHqZmPQns2naSXjVQSIxx5An41pY2KNXH X-Received: by 2002:a17:907:7711:b0:987:f6d6:572c with SMTP id kw17-20020a170907771100b00987f6d6572cmr1331901ejc.25.1690162482782; Sun, 23 Jul 2023 18:34:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690162482; cv=none; d=google.com; s=arc-20160816; b=BUIxhT8kxeAAaAbEBAoS+N8eo516K48TTv8ZCpZ3WfGJm4vhuEJRZ5YTB7T+GgYYEi /Q1eEPRlix4rGXxrkIISTcIMpjrFeIjaU5aUGr8YJ3ZZpmkh/v03M4XopKJLriaBoaIW jkmA7iJBWATfFnDy9DkmShEb8eGRqVWfXU8yASCXQzqRpXsi6O0fc83Rc0RE5WfXK3Zl JUALJpqxpV9dsZTPjbj+ocWlCA2fmxHBky30/pGjvaHCbN4HQLicyFLKo7Q0OGZA1FTU TdsA5SfJpyXOIB/pImh/aQnFzQ12KnkxKO/xOZXCjuQ4y49ahyJLGMSLrVX17TPGODRx dw9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=amvqFpoo+YV+ZcaR9FsyBlsumj+rHbwF/U6trb8W8NU=; fh=uV5igJLwPCMmvz5umy2/FGC24prudMvp7FTwiNugOtE=; b=qpcv/rOwAMQ44QPNUAZ1qv7mINQ6I8oel9BJGex6I+TJ4RHBCEQJekVmPT5jPWouMs sM588mkE5HRtBlj/Dz4yhKu8/9QaZXTPv2kU51EbyvLAVtI/AvvQswFKuIbcTctlH/f2 LLaupUHYmlySR6hUTuNjfhb8QZjxVmOpBKSjNaDIgX0zWydJm32BnmpX9/kK26PTz3a4 MXiMgqRkfU+CVI9rhy2xv+BepaTDAENJccUSzeHsA0J0etX9S/30VLeB+7Fn0OOgiPyt V3cW8IOgq8MWtLP/k2gnUPCR4lyeET9VQYHpeuYQF5C+WsO3Eh/fiyLor7qBn10d9N7q SOKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=g7QiEpW7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h12-20020a170906398c00b00993150ec3c7si6036839eje.966.2023.07.23.18.34.19; Sun, 23 Jul 2023 18:34:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=g7QiEpW7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229898AbjGXBOS (ORCPT + 99 others); Sun, 23 Jul 2023 21:14:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229768AbjGXBOM (ORCPT ); Sun, 23 Jul 2023 21:14:12 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 44B1AE4A; Sun, 23 Jul 2023 18:14:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id EBA7E60F02; Mon, 24 Jul 2023 01:13:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D6D8FC433C8; Mon, 24 Jul 2023 01:13:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1690161239; bh=VP7xfuHDmq0OQ+Wm2bMJRWf/CZ8k3F9XkTXxs9Z2R3U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=g7QiEpW7Y/mG3sF3R0g3ad/KjghsgZip87VJQhLChaEs67CpUO6yOadLnE/gQ6KIA N6Njr4lgb9ohQX29LMe6Cps4De5wJZFvTyY4NkzgBRoZxQPEiq/Ibl5h5nrCs8ILVw qfWKKXWGPCawL7KIlzONUAl0ZFQvBsNjjLHuVbn/AOOINhruK12bXNMW7r2NUiursg lyCkx6wqcWaJXuhfxMTQOs/GYQtvwlRoVjcr6ZOR/M1evLs3ZVXNPdohCJzxI6dOjc BeLHExOXd5JzVmSBSN3YBp9h8okfnVzJCO7Qm0OMnLPWlDrV50fHDEzirioAwrHJrL dQxmDekkJmgww== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: hackyzh002 , =?UTF-8?q?Christian=20K=C3=B6nig?= , Alex Deucher , Sasha Levin , Xinhui.Pan@amd.com, airlied@gmail.com, daniel@ffwll.ch, luben.tuikov@amd.com, guchun.chen@amd.com, Felix.Kuehling@amd.com, dongchenchen2@huawei.com, Philip.Yang@amd.com, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org Subject: [PATCH AUTOSEL 6.4 06/58] drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 Date: Sun, 23 Jul 2023 21:12:34 -0400 Message-Id: <20230724011338.2298062-6-sashal@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230724011338.2298062-1-sashal@kernel.org> References: <20230724011338.2298062-1-sashal@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.4.5 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: hackyzh002 [ Upstream commit 87c2213e85bd81e4a9a4d0880c256568794ae388 ] The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later. Reviewed-by: Christian König Signed-off-by: hackyzh002 Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin --- drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c b/drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c index 2eb2c66843a88..d3b7148a4e30f 100644 --- a/drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c +++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c @@ -192,7 +192,7 @@ static int amdgpu_cs_pass1(struct amdgpu_cs_parser *p, uint64_t *chunk_array_user; uint64_t *chunk_array; uint32_t uf_offset = 0; - unsigned int size; + size_t size; int ret; int i; -- 2.39.2