drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
authorDan Carpenter <dan.carpenter@linaro.org>
Fri, 15 Nov 2024 14:50:08 +0000 (17:50 +0300)
committerRob Clark <robdclark@chromium.org>
Fri, 3 Jan 2025 15:20:27 +0000 (07:20 -0800)
The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32
values that come from the user via the submit_lookup_cmds() function.
This addition could lead to an integer wrapping bug so use size_add()
to prevent that.

Fixes: 198725337ef1 ("drm/msm: fix cmdstream size check")
Cc: stable@vger.kernel.org
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Patchwork: https://patchwork.freedesktop.org/patch/624696/
Signed-off-by: Rob Clark <robdclark@chromium.org>
drivers/gpu/drm/msm/msm_gem_submit.c

index fba78193127dee1efcdee9f8dd960d2e9e433523..f775638d239a5c6e0c3fe6109230d725fcc74fdf 100644 (file)
@@ -787,8 +787,7 @@ int msm_ioctl_gem_submit(struct drm_device *dev, void *data,
                        goto out;
 
                if (!submit->cmd[i].size ||
-                       ((submit->cmd[i].size + submit->cmd[i].offset) >
-                               obj->size / 4)) {
+                   (size_add(submit->cmd[i].size, submit->cmd[i].offset) > obj->size / 4)) {
                        SUBMIT_ERROR(submit, "invalid cmdstream size: %u\n", submit->cmd[i].size * 4);
                        ret = -EINVAL;
                        goto out;