accel/qaic: Fix integer overflow in qaic_validate_req()
authorDan Carpenter <dan.carpenter@linaro.org>
Fri, 7 Mar 2025 08:41:48 +0000 (11:41 +0300)
committerJeff Hugo <jeff.hugo@oss.qualcomm.com>
Fri, 14 Mar 2025 16:47:15 +0000 (10:47 -0600)
These are u64 variables that come from the user via
qaic_attach_slice_bo_ioctl().  Use check_add_overflow() to ensure that
the math doesn't have an integer wrapping bug.

Cc: stable@vger.kernel.org
Fixes: ff13be830333 ("accel/qaic: Add datapath")
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Reviewed-by: Jeff Hugo <jeff.hugo@oss.qualcomm.com>
Signed-off-by: Jeff Hugo <jeff.hugo@oss.qualcomm.com>
Link: https://patchwork.freedesktop.org/patch/msgid/176388fa-40fe-4cb4-9aeb-2c91c22130bd@stanley.mountain
drivers/accel/qaic/qaic_data.c

index ffcdf5738d099989153e3c2705db4ceab358a8d0..43aba57b48f05f590927efc74a5924e47ec94381 100644 (file)
@@ -557,6 +557,7 @@ static bool invalid_sem(struct qaic_sem *sem)
 static int qaic_validate_req(struct qaic_device *qdev, struct qaic_attach_slice_entry *slice_ent,
                             u32 count, u64 total_size)
 {
+       u64 total;
        int i;
 
        for (i = 0; i < count; i++) {
@@ -566,7 +567,8 @@ static int qaic_validate_req(struct qaic_device *qdev, struct qaic_attach_slice_
                      invalid_sem(&slice_ent[i].sem2) || invalid_sem(&slice_ent[i].sem3))
                        return -EINVAL;
 
-               if (slice_ent[i].offset + slice_ent[i].size > total_size)
+               if (check_add_overflow(slice_ent[i].offset, slice_ent[i].size, &total) ||
+                   total > total_size)
                        return -EINVAL;
        }