forked from Mirrors/opensbi
lib: sbi: Fix possible buffer overrun in counter validation
The active_events array is accessed with counter ID passed from the supervisor software before the counter ID bound check. This may cause a buffer overrun if a supervisor passes an invalid counter ID. Fix this by moving the access part after the bound check. Reported-by: Andrew Jones <ajones@ventanamicro.com> Reviewed-by: Andrew Jones <ajones@ventanamicro.com> Signed-off-by: Atish Patra <atishp@rivosinc.com> Reviewed-by: Anup Patel <anup@brainfault.org>
This commit is contained in:
@@ -156,13 +156,13 @@ static int pmu_ctr_validate(uint32_t cidx, uint32_t *event_idx_code)
|
||||
uint32_t event_idx_type;
|
||||
u32 hartid = current_hartid();
|
||||
|
||||
event_idx_val = active_events[hartid][cidx];
|
||||
|
||||
if (cidx >= total_ctrs || (event_idx_val == SBI_PMU_EVENT_IDX_INVALID))
|
||||
if (cidx >= total_ctrs)
|
||||
return SBI_EINVAL;
|
||||
|
||||
event_idx_val = active_events[hartid][cidx];
|
||||
event_idx_type = get_cidx_type(event_idx_val);
|
||||
if (event_idx_type >= SBI_PMU_EVENT_TYPE_MAX)
|
||||
if (event_idx_val == SBI_PMU_EVENT_IDX_INVALID ||
|
||||
event_idx_type >= SBI_PMU_EVENT_TYPE_MAX)
|
||||
return SBI_EINVAL;
|
||||
|
||||
*event_idx_code = get_cidx_code(event_idx_val);
|
||||
|
Reference in New Issue
Block a user