msm: eva: Copy back the validated size to avoid security issue
As we are reading the packet from a shared queue, there is a possibility to corrupt the packet->size data of shared queue by malicious FW after validating it in the kernel driver. Change-Id: I3aae85dea560e2805e7bff2c48d4be763da597de Signed-off-by: Gopireddy Arunteja Reddy <quic_garuntej@quicinc.com>
This commit is contained in:
committed by
Sumangala P
parent
f2ff8b3e04
commit
52996a0685
@@ -871,6 +871,12 @@ static int __read_queue(struct cvp_iface_q_info *qinfo, u8 *packet,
|
||||
(u8 *)qinfo->q_array.align_virtual_addr,
|
||||
new_read_idx << 2);
|
||||
}
|
||||
/*
|
||||
* Copy back the validated size to avoid security issue. As we are reading
|
||||
* the packet from a shared queue, there is a possibility to get the
|
||||
* packet->size data corrupted of shared queue by mallicious FW.
|
||||
*/
|
||||
*((u32 *) packet) = packet_size_in_words << 2;
|
||||
} else {
|
||||
dprintk(CVP_WARN,
|
||||
"BAD packet received, read_idx: %#x, pkt_size: %d\n",
|
||||
|
||||
Reference in New Issue
Block a user