forked from Mirrors/opensbi
		
	lib: sbi: Fix possible buffer overrun in counter validation
The active_events array is accessed with counter ID passed from the supervisor software before the counter ID bound check. This may cause a buffer overrun if a supervisor passes an invalid counter ID. Fix this by moving the access part after the bound check. Reported-by: Andrew Jones <ajones@ventanamicro.com> Reviewed-by: Andrew Jones <ajones@ventanamicro.com> Signed-off-by: Atish Patra <atishp@rivosinc.com> Reviewed-by: Anup Patel <anup@brainfault.org>
This commit is contained in:
		@@ -156,13 +156,13 @@ static int pmu_ctr_validate(uint32_t cidx, uint32_t *event_idx_code)
 | 
			
		||||
	uint32_t event_idx_type;
 | 
			
		||||
	u32 hartid = current_hartid();
 | 
			
		||||
 | 
			
		||||
	event_idx_val = active_events[hartid][cidx];
 | 
			
		||||
 | 
			
		||||
	if (cidx >= total_ctrs || (event_idx_val == SBI_PMU_EVENT_IDX_INVALID))
 | 
			
		||||
	if (cidx >= total_ctrs)
 | 
			
		||||
		return SBI_EINVAL;
 | 
			
		||||
 | 
			
		||||
	event_idx_val = active_events[hartid][cidx];
 | 
			
		||||
	event_idx_type = get_cidx_type(event_idx_val);
 | 
			
		||||
	if (event_idx_type >= SBI_PMU_EVENT_TYPE_MAX)
 | 
			
		||||
	if (event_idx_val == SBI_PMU_EVENT_IDX_INVALID ||
 | 
			
		||||
	    event_idx_type >= SBI_PMU_EVENT_TYPE_MAX)
 | 
			
		||||
		return SBI_EINVAL;
 | 
			
		||||
 | 
			
		||||
	*event_idx_code = get_cidx_code(event_idx_val);
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user