drivers: char: mem: Check for address space wraparound with mmap()
authorJulius Werner <jwerner@chromium.org>
Fri, 12 May 2017 21:42:58 +0000 (14:42 -0700)
committerBen Hutchings <ben@decadent.org.uk>
Fri, 15 Sep 2017 17:30:45 +0000 (18:30 +0100)
commita64f41f9bf410e24fe687116ba251b5c5d243830
tree41f62ab2b2895a55a18b7d1c4667cb6a71c2567a
parent94d4358abb9e6b2c8d8e31c44f449d79502176ad
drivers: char: mem: Check for address space wraparound with mmap()

commit b299cde245b0b76c977f4291162cf668e087b408 upstream.

/dev/mem currently allows mmap() mappings that wrap around the end of
the physical address space, which should probably be illegal. It
circumvents the existing STRICT_DEVMEM permission check because the loop
immediately terminates (as the start address is already higher than the
end address). On the x86_64 architecture it will then cause a panic
(from the BUG(start >= end) in arch/x86/mm/pat.c:reserve_memtype()).

This patch adds an explicit check to make sure offset + size will not
wrap around in the physical address type.

Signed-off-by: Julius Werner <jwerner@chromium.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
drivers/char/mem.c