[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230206054326.89323-1-k1rh4.lee@gmail.com>
Date: Sun, 5 Feb 2023 21:43:26 -0800
From: k1rh4.lee@...il.com
To: Wu Hao <hao.wu@...el.com>
Cc: Tom Rix <trix@...hat.com>, Moritz Fischer <mdf@...nel.org>,
Xu Yilun <yilun.xu@...el.com>, linux-fpga@...r.kernel.org,
linux-kernel@...r.kernel.org, Sangsup Lee <k1rh4.lee@...il.com>
Subject: [PATCH] fpga: dfl-afu-region: Add overflow checks for region size and offset
From: Sangsup Lee <k1rh4.lee@...il.com>
The size + offset is able to be integer overflow value and it lead to mis-allocate region.
Signed-off-by: Sangsup Lee <k1rh4.lee@...il.com>
---
drivers/fpga/dfl-afu-region.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/drivers/fpga/dfl-afu-region.c b/drivers/fpga/dfl-afu-region.c
index 2e7b41629406..82b530111601 100644
--- a/drivers/fpga/dfl-afu-region.c
+++ b/drivers/fpga/dfl-afu-region.c
@@ -151,12 +151,17 @@ int afu_mmio_region_get_by_offset(struct dfl_feature_platform_data *pdata,
struct dfl_afu_mmio_region *region;
struct dfl_afu *afu;
int ret = 0;
+ u64 region_size = 0;
mutex_lock(&pdata->lock);
+ if (check_add_overflow(offset, size, ®ion_size)) {
+ ret = -EINVAL;
+ goto exit;
+ }
afu = dfl_fpga_pdata_get_private(pdata);
for_each_region(region, afu)
if (region->offset <= offset &&
- region->offset + region->size >= offset + size) {
+ region->offset + region->size >= region_size) {
*pregion = *region;
goto exit;
}
--
2.25.1
Powered by blists - more mailing lists