]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
iommufd/selftest: Fix buffer read overrrun in the dirty test
authorJason Gunthorpe <jgg@nvidia.com>
Thu, 22 Aug 2024 14:47:09 +0000 (11:47 -0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 4 Oct 2024 14:33:08 +0000 (16:33 +0200)
[ Upstream commit 79ea4a496ab5c970a3a793d863ed8893b1af107c ]

test_bit() is used to read the memory storing the bitmap, however
test_bit() always uses a unsigned long 8 byte access.

If the bitmap is not an aligned size of 64 bits this will now trigger a
KASAN warning reading past the end of the buffer.

Properly round the buffer allocation to an unsigned long size. Continue to
copy_from_user() using a byte granularity.

Fixes: 9560393b830b ("iommufd/selftest: Fix iommufd_test_dirty() to handle <u8 bitmaps")
Link: https://patch.msgid.link/r/0-v1-113e8d9e7861+5ae-iommufd_kasan_jgg@nvidia.com
Reviewed-by: Joao Martins <joao.m.martins@oracle.com>
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/iommu/iommufd/selftest.c

index 654ed33390957916669f59b9b892bf4219d8d2a7..62bfeb7a35d850d89936baae5c557d2d8f77cd0e 100644 (file)
@@ -1313,7 +1313,7 @@ static int iommufd_test_dirty(struct iommufd_ucmd *ucmd, unsigned int mockpt_id,
                              unsigned long page_size, void __user *uptr,
                              u32 flags)
 {
-       unsigned long bitmap_size, i, max;
+       unsigned long i, max;
        struct iommu_test_cmd *cmd = ucmd->cmd;
        struct iommufd_hw_pagetable *hwpt;
        struct mock_iommu_domain *mock;
@@ -1334,15 +1334,14 @@ static int iommufd_test_dirty(struct iommufd_ucmd *ucmd, unsigned int mockpt_id,
        }
 
        max = length / page_size;
-       bitmap_size = DIV_ROUND_UP(max, BITS_PER_BYTE);
-
-       tmp = kvzalloc(bitmap_size, GFP_KERNEL_ACCOUNT);
+       tmp = kvzalloc(DIV_ROUND_UP(max, BITS_PER_LONG) * sizeof(unsigned long),
+                      GFP_KERNEL_ACCOUNT);
        if (!tmp) {
                rc = -ENOMEM;
                goto out_put;
        }
 
-       if (copy_from_user(tmp, uptr, bitmap_size)) {
+       if (copy_from_user(tmp, uptr,DIV_ROUND_UP(max, BITS_PER_BYTE))) {
                rc = -EFAULT;
                goto out_free;
        }