soc: aspeed: p2a-ctrl: Fix boundary check for mmap
authorIwona Winiarska <iwona.winiarska@intel.com>
Tue, 3 Aug 2021 23:48:19 +0000 (01:48 +0200)
committerJoel Stanley <joel@jms.id.au>
Tue, 17 Aug 2021 08:30:44 +0000 (18:00 +0930)
The check mixes pages (vm_pgoff) with bytes (vm_start, vm_end) on one
side of the comparison, and uses resource address (rather than just the
resource size) on the other side of the comparison.
This can allow malicious userspace to easily bypass the boundary check and
map pages that are located outside memory-region reserved by the driver.

Fixes: 01c60dcea9f7 ("drivers/misc: Add Aspeed P2A control driver")
Cc: stable@vger.kernel.org
Signed-off-by: Iwona Winiarska <iwona.winiarska@intel.com>
Reviewed-by: Andrew Jeffery <andrew@aj.id.au>
Tested-by: Andrew Jeffery <andrew@aj.id.au>
Reviewed-by: Joel Stanley <joel@aj.id.au>
Signed-off-by: Joel Stanley <joel@jms.id.au>
drivers/soc/aspeed/aspeed-p2a-ctrl.c

index b60fbeaffcbd01c8b91db89a77ae9b4b4964b1b8..20b5fb2a207cc024aae1c4b4b59cb657560680a2 100644 (file)
@@ -110,7 +110,7 @@ static int aspeed_p2a_mmap(struct file *file, struct vm_area_struct *vma)
        vsize = vma->vm_end - vma->vm_start;
        prot = vma->vm_page_prot;
 
-       if (vma->vm_pgoff + vsize > ctrl->mem_base + ctrl->mem_size)
+       if (vma->vm_pgoff + vma_pages(vma) > ctrl->mem_size >> PAGE_SHIFT)
                return -EINVAL;
 
        /* ast2400/2500 AHB accesses are not cache coherent */