* [PATCH] iio: health: afe4403: Fix oob read in afe4403_read_raw
@ 2022-11-04 11:28 Wei Yongjun
2022-11-04 15:53 ` Andrew Davis
0 siblings, 1 reply; 2+ messages in thread
From: Wei Yongjun @ 2022-11-04 11:28 UTC (permalink / raw)
To: Jonathan Cameron, Lars-Peter Clausen, Uwe Kleine-König,
Alexandre Belloni, Paul Cercueil, Jérôme Pouiller,
Andrew F. Davis
Cc: Wei Yongjun, linux-iio
From: Wei Yongjun <weiyongjun1@huawei.com>
KASAN report out-of-bounds read as follows:
BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0 [afe4403]
Read of size 4 at addr ffffffffc02ac638 by task cat/279
CPU: 2 PID: 279 Comm: cat Tainted: G N
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
<TASK>
afe4403_read_raw+0x42e/0x4c0 [afe4403 141d77410f5466ef049ee2376f5136b77a168de0]
iio_read_channel_info+0x249/0x2e0 [industrialio d0627df60a92bbb9630e68c3e2f98d20dac889ef]
dev_attr_show+0x4b/0xa0 drivers/base/core.c:2195
sysfs_kf_seq_show+0x1ec/0x390 fs/sysfs/file.c:59
seq_read_iter+0x48d/0x10b0 fs/seq_file.c:230
kernfs_fop_read_iter+0x4e6/0x710 fs/kernfs/file.c:275
call_read_iter include/linux/fs.h:2153 [inline]
new_sync_read fs/read_write.c:389 [inline]
vfs_read+0x5f2/0x890 fs/read_write.c:470
ksys_read+0x106/0x220 fs/read_write.c:613
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fd8611cf992
</TASK>
The buggy address belongs to the variable:
afe4403_channel_leds+0x18/0xffffffffffffe9e0 [afe4403]
This issue can be reproduced by singe command:
$ cat /sys/bus/spi/devices/spi0.0/iio\:device0/in_intensity6_raw
The array size of afe4403_channel_leds is less than channels, so access
with chan->address cause OOB read in afe4403_read_raw. Fix it by moving
access before use it.
Fixes: b36e8257641a ("iio: health/afe440x: Use regmap fields")
Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com>
---
drivers/iio/health/afe4403.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/iio/health/afe4403.c b/drivers/iio/health/afe4403.c
index 3bb4028c5d74..14213a48e349 100644
--- a/drivers/iio/health/afe4403.c
+++ b/drivers/iio/health/afe4403.c
@@ -246,7 +246,7 @@ static int afe4403_read_raw(struct iio_dev *indio_dev,
{
struct afe4403_data *afe = iio_priv(indio_dev);
unsigned int reg = afe4403_channel_values[chan->address];
- unsigned int field = afe4403_channel_leds[chan->address];
+ unsigned int field;
int ret;
switch (chan->type) {
@@ -262,6 +262,7 @@ static int afe4403_read_raw(struct iio_dev *indio_dev,
case IIO_CURRENT:
switch (mask) {
case IIO_CHAN_INFO_RAW:
+ field = afe4403_channel_leds[chan->address];
ret = regmap_field_read(afe->fields[field], val);
if (ret)
return ret;
--
2.34.1
^ permalink raw reply related [flat|nested] 2+ messages in thread* Re: [PATCH] iio: health: afe4403: Fix oob read in afe4403_read_raw
2022-11-04 11:28 [PATCH] iio: health: afe4403: Fix oob read in afe4403_read_raw Wei Yongjun
@ 2022-11-04 15:53 ` Andrew Davis
0 siblings, 0 replies; 2+ messages in thread
From: Andrew Davis @ 2022-11-04 15:53 UTC (permalink / raw)
To: Wei Yongjun, Jonathan Cameron, Lars-Peter Clausen,
Uwe Kleine-König, Alexandre Belloni, Paul Cercueil,
Jérôme Pouiller
Cc: Wei Yongjun, linux-iio
On 11/4/22 6:28 AM, Wei Yongjun wrote:
> From: Wei Yongjun <weiyongjun1@huawei.com>
>
> KASAN report out-of-bounds read as follows:
>
> BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0 [afe4403]
> Read of size 4 at addr ffffffffc02ac638 by task cat/279
>
> CPU: 2 PID: 279 Comm: cat Tainted: G N
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
> Call Trace:
> <TASK>
> afe4403_read_raw+0x42e/0x4c0 [afe4403 141d77410f5466ef049ee2376f5136b77a168de0]
> iio_read_channel_info+0x249/0x2e0 [industrialio d0627df60a92bbb9630e68c3e2f98d20dac889ef]
> dev_attr_show+0x4b/0xa0 drivers/base/core.c:2195
> sysfs_kf_seq_show+0x1ec/0x390 fs/sysfs/file.c:59
> seq_read_iter+0x48d/0x10b0 fs/seq_file.c:230
> kernfs_fop_read_iter+0x4e6/0x710 fs/kernfs/file.c:275
> call_read_iter include/linux/fs.h:2153 [inline]
> new_sync_read fs/read_write.c:389 [inline]
> vfs_read+0x5f2/0x890 fs/read_write.c:470
> ksys_read+0x106/0x220 fs/read_write.c:613
> do_syscall_x64 arch/x86/entry/common.c:50 [inline]
> do_syscall_64+0x38/0xa0 arch/x86/entry/common.c:80
> entry_SYSCALL_64_after_hwframe+0x72/0xdc
> RIP: 0033:0x7fd8611cf992
> </TASK>
>
> The buggy address belongs to the variable:
> afe4403_channel_leds+0x18/0xffffffffffffe9e0 [afe4403]
>
> This issue can be reproduced by singe command:
>
> $ cat /sys/bus/spi/devices/spi0.0/iio\:device0/in_intensity6_raw
>
> The array size of afe4403_channel_leds is less than channels, so access
> with chan->address cause OOB read in afe4403_read_raw. Fix it by moving
> access before use it.
>
> Fixes: b36e8257641a ("iio: health/afe440x: Use regmap fields")
> Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com>
> ---
> drivers/iio/health/afe4403.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/iio/health/afe4403.c b/drivers/iio/health/afe4403.c
> index 3bb4028c5d74..14213a48e349 100644
> --- a/drivers/iio/health/afe4403.c
> +++ b/drivers/iio/health/afe4403.c
> @@ -246,7 +246,7 @@ static int afe4403_read_raw(struct iio_dev *indio_dev,
> {
> struct afe4403_data *afe = iio_priv(indio_dev);
> unsigned int reg = afe4403_channel_values[chan->address];
Good find and the fix does look valid, but can we also move this
access for 'reg' to right before we use it also? Just for consistency.
Same for the 'afe4403_channel_leds' access below in afe4403_write_raw(),
and same for value_reg in your patch for afe4404. Then both patches can have:
Acked-by: Andrew Davis <afd@ti.com>
> - unsigned int field = afe4403_channel_leds[chan->address];
> + unsigned int field;
> int ret;
>
> switch (chan->type) {
> @@ -262,6 +262,7 @@ static int afe4403_read_raw(struct iio_dev *indio_dev,
> case IIO_CURRENT:
> switch (mask) {
> case IIO_CHAN_INFO_RAW:
> + field = afe4403_channel_leds[chan->address];
> ret = regmap_field_read(afe->fields[field], val);
> if (ret)
> return ret;
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2022-11-04 15:54 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-11-04 11:28 [PATCH] iio: health: afe4403: Fix oob read in afe4403_read_raw Wei Yongjun
2022-11-04 15:53 ` Andrew Davis
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox