Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

drm/amdgpu: Fix integer overflow issues in amdgpu_userq_fence.c

This patch only affects 32bit systems. There are several integer
overflows bugs here but only the "sizeof(u32) * num_syncobj"
multiplication is a problem at runtime. (The last lines of this patch).

These variables are u32 variables that come from the user. The issue
is the multiplications can overflow leading to us allocating a smaller
buffer than intended. For the first couple integer overflows, the
syncobj_handles = memdup_user() allocation is immediately followed by
a kmalloc_array():

syncobj = kmalloc_array(num_syncobj_handles, sizeof(*syncobj), GFP_KERNEL);

In that situation the kmalloc_array() works as a bounds check and we
haven't accessed the syncobj_handlesp[] array yet so the integer overflow
is harmless.

But the "num_syncobj" multiplication doesn't have that and the integer
overflow could lead to an out of bounds access.

Fixes: a292fdecd728 ("drm/amdgpu: Implement userqueue signal/wait IOCTL")
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>

authored by

Dan Carpenter and committed by
Alex Deucher
98a46a40 5cccf10f

+4 -4
+4 -4
drivers/gpu/drm/amd/amdgpu/amdgpu_userq_fence.c
··· 430 430 431 431 num_syncobj_handles = args->num_syncobj_handles; 432 432 syncobj_handles = memdup_user(u64_to_user_ptr(args->syncobj_handles), 433 - sizeof(u32) * num_syncobj_handles); 433 + size_mul(sizeof(u32), num_syncobj_handles)); 434 434 if (IS_ERR(syncobj_handles)) 435 435 return PTR_ERR(syncobj_handles); 436 436 ··· 612 612 613 613 num_read_bo_handles = wait_info->num_bo_read_handles; 614 614 bo_handles_read = memdup_user(u64_to_user_ptr(wait_info->bo_read_handles), 615 - sizeof(u32) * num_read_bo_handles); 615 + size_mul(sizeof(u32), num_read_bo_handles)); 616 616 if (IS_ERR(bo_handles_read)) 617 617 return PTR_ERR(bo_handles_read); 618 618 619 619 num_write_bo_handles = wait_info->num_bo_write_handles; 620 620 bo_handles_write = memdup_user(u64_to_user_ptr(wait_info->bo_write_handles), 621 - sizeof(u32) * num_write_bo_handles); 621 + size_mul(sizeof(u32), num_write_bo_handles)); 622 622 if (IS_ERR(bo_handles_write)) { 623 623 r = PTR_ERR(bo_handles_write); 624 624 goto free_bo_handles_read; ··· 626 626 627 627 num_syncobj = wait_info->num_syncobj_handles; 628 628 syncobj_handles = memdup_user(u64_to_user_ptr(wait_info->syncobj_handles), 629 - sizeof(u32) * num_syncobj); 629 + size_mul(sizeof(u32), num_syncobj)); 630 630 if (IS_ERR(syncobj_handles)) { 631 631 r = PTR_ERR(syncobj_handles); 632 632 goto free_bo_handles_write;