]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.2-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 19 Sep 2019 14:03:09 +0000 (16:03 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 19 Sep 2019 14:03:09 +0000 (16:03 +0200)
added patches:
firmware-google-check-if-size-is-valid-when-decoding-vpd-data.patch
kvm-coalesced_mmio-add-bounds-checking.patch
serial-sprd-correct-the-wrong-sequence-of-arguments.patch
tty-serial-atmel-reschedule-tx-after-rx-was-started.patch

queue-5.2/firmware-google-check-if-size-is-valid-when-decoding-vpd-data.patch [new file with mode: 0644]
queue-5.2/kvm-coalesced_mmio-add-bounds-checking.patch [new file with mode: 0644]
queue-5.2/serial-sprd-correct-the-wrong-sequence-of-arguments.patch [new file with mode: 0644]
queue-5.2/series
queue-5.2/tty-serial-atmel-reschedule-tx-after-rx-was-started.patch [new file with mode: 0644]

diff --git a/queue-5.2/firmware-google-check-if-size-is-valid-when-decoding-vpd-data.patch b/queue-5.2/firmware-google-check-if-size-is-valid-when-decoding-vpd-data.patch
new file mode 100644 (file)
index 0000000..d46f72b
--- /dev/null
@@ -0,0 +1,158 @@
+From 4b708b7b1a2c09fbdfff6b942ebe3a160213aacd Mon Sep 17 00:00:00 2001
+From: Hung-Te Lin <hungte@chromium.org>
+Date: Fri, 30 Aug 2019 10:23:58 +0800
+Subject: firmware: google: check if size is valid when decoding VPD data
+
+From: Hung-Te Lin <hungte@chromium.org>
+
+commit 4b708b7b1a2c09fbdfff6b942ebe3a160213aacd upstream.
+
+The VPD implementation from Chromium Vital Product Data project used to
+parse data from untrusted input without checking if the meta data is
+invalid or corrupted. For example, the size from decoded content may
+be negative value, or larger than whole input buffer. Such invalid data
+may cause buffer overflow.
+
+To fix that, the size parameters passed to vpd_decode functions should
+be changed to unsigned integer (u32) type, and the parsing of entry
+header should be refactored so every size field is correctly verified
+before starting to decode.
+
+Fixes: ad2ac9d5c5e0 ("firmware: Google VPD: import lib_vpd source files")
+Signed-off-by: Hung-Te Lin <hungte@chromium.org>
+Cc: stable <stable@vger.kernel.org>
+Reviewed-by: Guenter Roeck <linux@roeck-us.net>
+Reviewed-by: Stephen Boyd <swboyd@chromium.org>
+Link: https://lore.kernel.org/r/20190830022402.214442-1-hungte@chromium.org
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/firmware/google/vpd.c        |    4 +-
+ drivers/firmware/google/vpd_decode.c |   55 ++++++++++++++++++++---------------
+ drivers/firmware/google/vpd_decode.h |    6 +--
+ 3 files changed, 37 insertions(+), 28 deletions(-)
+
+--- a/drivers/firmware/google/vpd.c
++++ b/drivers/firmware/google/vpd.c
+@@ -92,8 +92,8 @@ static int vpd_section_check_key_name(co
+       return VPD_OK;
+ }
+-static int vpd_section_attrib_add(const u8 *key, s32 key_len,
+-                                const u8 *value, s32 value_len,
++static int vpd_section_attrib_add(const u8 *key, u32 key_len,
++                                const u8 *value, u32 value_len,
+                                 void *arg)
+ {
+       int ret;
+--- a/drivers/firmware/google/vpd_decode.c
++++ b/drivers/firmware/google/vpd_decode.c
+@@ -11,8 +11,8 @@
+ #include "vpd_decode.h"
+-static int vpd_decode_len(const s32 max_len, const u8 *in,
+-                        s32 *length, s32 *decoded_len)
++static int vpd_decode_len(const u32 max_len, const u8 *in,
++                        u32 *length, u32 *decoded_len)
+ {
+       u8 more;
+       int i = 0;
+@@ -32,18 +32,39 @@ static int vpd_decode_len(const s32 max_
+       } while (more);
+       *decoded_len = i;
++      return VPD_OK;
++}
++
++static int vpd_decode_entry(const u32 max_len, const u8 *input_buf,
++                          u32 *_consumed, const u8 **entry, u32 *entry_len)
++{
++      u32 decoded_len;
++      u32 consumed = *_consumed;
++      if (vpd_decode_len(max_len - consumed, &input_buf[consumed],
++                         entry_len, &decoded_len) != VPD_OK)
++              return VPD_FAIL;
++      if (max_len - consumed < decoded_len)
++              return VPD_FAIL;
++
++      consumed += decoded_len;
++      *entry = input_buf + consumed;
++
++      /* entry_len is untrusted data and must be checked again. */
++      if (max_len - consumed < *entry_len)
++              return VPD_FAIL;
++
++      consumed += decoded_len;
++      *_consumed = consumed;
+       return VPD_OK;
+ }
+-int vpd_decode_string(const s32 max_len, const u8 *input_buf, s32 *consumed,
++int vpd_decode_string(const u32 max_len, const u8 *input_buf, u32 *consumed,
+                     vpd_decode_callback callback, void *callback_arg)
+ {
+       int type;
+-      int res;
+-      s32 key_len;
+-      s32 value_len;
+-      s32 decoded_len;
++      u32 key_len;
++      u32 value_len;
+       const u8 *key;
+       const u8 *value;
+@@ -58,26 +79,14 @@ int vpd_decode_string(const s32 max_len,
+       case VPD_TYPE_STRING:
+               (*consumed)++;
+-              /* key */
+-              res = vpd_decode_len(max_len - *consumed, &input_buf[*consumed],
+-                                   &key_len, &decoded_len);
+-              if (res != VPD_OK || *consumed + decoded_len >= max_len)
++              if (vpd_decode_entry(max_len, input_buf, consumed, &key,
++                                   &key_len) != VPD_OK)
+                       return VPD_FAIL;
+-              *consumed += decoded_len;
+-              key = &input_buf[*consumed];
+-              *consumed += key_len;
+-
+-              /* value */
+-              res = vpd_decode_len(max_len - *consumed, &input_buf[*consumed],
+-                                   &value_len, &decoded_len);
+-              if (res != VPD_OK || *consumed + decoded_len > max_len)
++              if (vpd_decode_entry(max_len, input_buf, consumed, &value,
++                                   &value_len) != VPD_OK)
+                       return VPD_FAIL;
+-              *consumed += decoded_len;
+-              value = &input_buf[*consumed];
+-              *consumed += value_len;
+-
+               if (type == VPD_TYPE_STRING)
+                       return callback(key, key_len, value, value_len,
+                                       callback_arg);
+--- a/drivers/firmware/google/vpd_decode.h
++++ b/drivers/firmware/google/vpd_decode.h
+@@ -25,8 +25,8 @@ enum {
+ };
+ /* Callback for vpd_decode_string to invoke. */
+-typedef int vpd_decode_callback(const u8 *key, s32 key_len,
+-                              const u8 *value, s32 value_len,
++typedef int vpd_decode_callback(const u8 *key, u32 key_len,
++                              const u8 *value, u32 value_len,
+                               void *arg);
+ /*
+@@ -44,7 +44,7 @@ typedef int vpd_decode_callback(const u8
+  * If one entry is successfully decoded, sends it to callback and returns the
+  * result.
+  */
+-int vpd_decode_string(const s32 max_len, const u8 *input_buf, s32 *consumed,
++int vpd_decode_string(const u32 max_len, const u8 *input_buf, u32 *consumed,
+                     vpd_decode_callback callback, void *callback_arg);
+ #endif  /* __VPD_DECODE_H */
diff --git a/queue-5.2/kvm-coalesced_mmio-add-bounds-checking.patch b/queue-5.2/kvm-coalesced_mmio-add-bounds-checking.patch
new file mode 100644 (file)
index 0000000..0e6ae6f
--- /dev/null
@@ -0,0 +1,84 @@
+From b60fe990c6b07ef6d4df67bc0530c7c90a62623a Mon Sep 17 00:00:00 2001
+From: Matt Delco <delco@chromium.org>
+Date: Mon, 16 Sep 2019 14:16:54 -0700
+Subject: KVM: coalesced_mmio: add bounds checking
+
+From: Matt Delco <delco@chromium.org>
+
+commit b60fe990c6b07ef6d4df67bc0530c7c90a62623a upstream.
+
+The first/last indexes are typically shared with a user app.
+The app can change the 'last' index that the kernel uses
+to store the next result.  This change sanity checks the index
+before using it for writing to a potentially arbitrary address.
+
+This fixes CVE-2019-14821.
+
+Cc: stable@vger.kernel.org
+Fixes: 5f94c1741bdc ("KVM: Add coalesced MMIO support (common part)")
+Signed-off-by: Matt Delco <delco@chromium.org>
+Signed-off-by: Jim Mattson <jmattson@google.com>
+Reported-by: syzbot+983c866c3dd6efa3662a@syzkaller.appspotmail.com
+[Use READ_ONCE. - Paolo]
+Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ virt/kvm/coalesced_mmio.c |   19 +++++++++++--------
+ 1 file changed, 11 insertions(+), 8 deletions(-)
+
+--- a/virt/kvm/coalesced_mmio.c
++++ b/virt/kvm/coalesced_mmio.c
+@@ -40,7 +40,7 @@ static int coalesced_mmio_in_range(struc
+       return 1;
+ }
+-static int coalesced_mmio_has_room(struct kvm_coalesced_mmio_dev *dev)
++static int coalesced_mmio_has_room(struct kvm_coalesced_mmio_dev *dev, u32 last)
+ {
+       struct kvm_coalesced_mmio_ring *ring;
+       unsigned avail;
+@@ -52,7 +52,7 @@ static int coalesced_mmio_has_room(struc
+        * there is always one unused entry in the buffer
+        */
+       ring = dev->kvm->coalesced_mmio_ring;
+-      avail = (ring->first - ring->last - 1) % KVM_COALESCED_MMIO_MAX;
++      avail = (ring->first - last - 1) % KVM_COALESCED_MMIO_MAX;
+       if (avail == 0) {
+               /* full */
+               return 0;
+@@ -67,25 +67,28 @@ static int coalesced_mmio_write(struct k
+ {
+       struct kvm_coalesced_mmio_dev *dev = to_mmio(this);
+       struct kvm_coalesced_mmio_ring *ring = dev->kvm->coalesced_mmio_ring;
++      __u32 insert;
+       if (!coalesced_mmio_in_range(dev, addr, len))
+               return -EOPNOTSUPP;
+       spin_lock(&dev->kvm->ring_lock);
+-      if (!coalesced_mmio_has_room(dev)) {
++      insert = READ_ONCE(ring->last);
++      if (!coalesced_mmio_has_room(dev, insert) ||
++          insert >= KVM_COALESCED_MMIO_MAX) {
+               spin_unlock(&dev->kvm->ring_lock);
+               return -EOPNOTSUPP;
+       }
+       /* copy data in first free entry of the ring */
+-      ring->coalesced_mmio[ring->last].phys_addr = addr;
+-      ring->coalesced_mmio[ring->last].len = len;
+-      memcpy(ring->coalesced_mmio[ring->last].data, val, len);
+-      ring->coalesced_mmio[ring->last].pio = dev->zone.pio;
++      ring->coalesced_mmio[insert].phys_addr = addr;
++      ring->coalesced_mmio[insert].len = len;
++      memcpy(ring->coalesced_mmio[insert].data, val, len);
++      ring->coalesced_mmio[insert].pio = dev->zone.pio;
+       smp_wmb();
+-      ring->last = (ring->last + 1) % KVM_COALESCED_MMIO_MAX;
++      ring->last = (insert + 1) % KVM_COALESCED_MMIO_MAX;
+       spin_unlock(&dev->kvm->ring_lock);
+       return 0;
+ }
diff --git a/queue-5.2/serial-sprd-correct-the-wrong-sequence-of-arguments.patch b/queue-5.2/serial-sprd-correct-the-wrong-sequence-of-arguments.patch
new file mode 100644 (file)
index 0000000..d7f53e5
--- /dev/null
@@ -0,0 +1,35 @@
+From 9c801e313195addaf11c16e155f50789d6ebfd19 Mon Sep 17 00:00:00 2001
+From: Chunyan Zhang <chunyan.zhang@unisoc.com>
+Date: Thu, 5 Sep 2019 15:41:51 +0800
+Subject: serial: sprd: correct the wrong sequence of arguments
+
+From: Chunyan Zhang <chunyan.zhang@unisoc.com>
+
+commit 9c801e313195addaf11c16e155f50789d6ebfd19 upstream.
+
+The sequence of arguments which was passed to handle_lsr_errors() didn't
+match the parameters defined in that function, &lsr was passed to flag
+and &flag was passed to lsr, this patch fixed that.
+
+Fixes: b7396a38fb28 ("tty/serial: Add Spreadtrum sc9836-uart driver support")
+Signed-off-by: Chunyan Zhang <chunyan.zhang@unisoc.com>
+Signed-off-by: Chunyan Zhang <zhang.lyra@gmail.com>
+Cc: stable <stable@vger.kernel.org>
+Link: https://lore.kernel.org/r/20190905074151.5268-1-zhang.lyra@gmail.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/tty/serial/sprd_serial.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/drivers/tty/serial/sprd_serial.c
++++ b/drivers/tty/serial/sprd_serial.c
+@@ -609,7 +609,7 @@ static inline void sprd_rx(struct uart_p
+               if (lsr & (SPRD_LSR_BI | SPRD_LSR_PE |
+                          SPRD_LSR_FE | SPRD_LSR_OE))
+-                      if (handle_lsr_errors(port, &lsr, &flag))
++                      if (handle_lsr_errors(port, &flag, &lsr))
+                               continue;
+               if (uart_handle_sysrq_char(port, ch))
+                       continue;
index 03a40696c40abbd26b9462aa01c2064db678ff78..f311d29c977bd907edc0e67e126cc3b536db9a6e 100644 (file)
@@ -18,3 +18,7 @@ net_sched-let-qdisc_put-accept-null-pointer.patch
 udp-correct-reuseport-selection-with-connected-sockets.patch
 xen-netfront-do-not-assume-sk_buff_head-list-is-empty-in-error-handling.patch
 net-dsa-fix-load-order-between-dsa-drivers-and-taggers.patch
+kvm-coalesced_mmio-add-bounds-checking.patch
+firmware-google-check-if-size-is-valid-when-decoding-vpd-data.patch
+serial-sprd-correct-the-wrong-sequence-of-arguments.patch
+tty-serial-atmel-reschedule-tx-after-rx-was-started.patch
diff --git a/queue-5.2/tty-serial-atmel-reschedule-tx-after-rx-was-started.patch b/queue-5.2/tty-serial-atmel-reschedule-tx-after-rx-was-started.patch
new file mode 100644 (file)
index 0000000..2c76393
--- /dev/null
@@ -0,0 +1,34 @@
+From d2ace81bf902a9f11d52e59e5d232d2255a0e353 Mon Sep 17 00:00:00 2001
+From: Razvan Stefanescu <razvan.stefanescu@microchip.com>
+Date: Tue, 13 Aug 2019 10:40:25 +0300
+Subject: tty/serial: atmel: reschedule TX after RX was started
+
+From: Razvan Stefanescu <razvan.stefanescu@microchip.com>
+
+commit d2ace81bf902a9f11d52e59e5d232d2255a0e353 upstream.
+
+When half-duplex RS485 communication is used, after RX is started, TX
+tasklet still needs to be  scheduled tasklet. This avoids console freezing
+when more data is to be transmitted, if the serial communication is not
+closed.
+
+Fixes: 69646d7a3689 ("tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped")
+Signed-off-by: Razvan Stefanescu <razvan.stefanescu@microchip.com>
+Cc: stable <stable@vger.kernel.org>
+Link: https://lore.kernel.org/r/20190813074025.16218-1-razvan.stefanescu@microchip.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/tty/serial/atmel_serial.c |    1 -
+ 1 file changed, 1 deletion(-)
+
+--- a/drivers/tty/serial/atmel_serial.c
++++ b/drivers/tty/serial/atmel_serial.c
+@@ -1400,7 +1400,6 @@ atmel_handle_transmit(struct uart_port *
+                       atmel_port->hd_start_rx = false;
+                       atmel_start_rx(port);
+-                      return;
+               }
+               atmel_tasklet_schedule(atmel_port, &atmel_port->tasklet_tx);