Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp597102img; Fri, 22 Mar 2019 04:51:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwFyF5lfbVicOaYVKnXJbCoJkAGjxd4/5QJtS1iO5ZJ4FJGtXLeFLUpQlDPXRk5ME829wfw X-Received: by 2002:a62:b517:: with SMTP id y23mr8576444pfe.144.1553255489325; Fri, 22 Mar 2019 04:51:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553255489; cv=none; d=google.com; s=arc-20160816; b=gcBfNDwBnhDF7M6+ERqZRS9mhu11yBI8FOrtnROW/LeSytBe9Ip+jym0Pud2GyWrC6 s/npueO9Ajbvt6rXB+s3gLV18naewXX3ZE//2gmBRmwfGkL4n20wud0gHP7teI3TS0sL +M49piGKg7ufetY1o37R1yuTC7sdw4Z4WKJS7e4V2ueV1CKALY6ptIermJ4HdyHQAKYg pHYlMLcPB4xhpDguCUZB19z2fTzjZ7yhXen53vJ7gDxf8GEPjWc2qEZCDxWosiW9NjbO VOkLglG0xnaXPdOQ//m8g0XsuwIXIzzp7oQiElvZSVJQlF2bkXfcB96LGrq29Wf2zpfm MMig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PYBxroR8CfMY8C0TBdQ2xhu9B8vIiQE1TxM5U5DZTTs=; b=ikOWTxRulfb4eX+wBQEHukMHnnAYX5ZBLfNDvoYuqa12Aqi3lqul1BdJ9BscdR40dP sMAu1ipJl8yRTIuyU+m4sXR9Sjc6ODTR+0d0OjgwvpE8U2IvPCoFVV5EaWzhOmBtD0SK RCpwR8W5sK3jQ7qi3HeUEKZmRqW1NEfRrKLpe2UvnQPoEP7VlciGP5++9Kk0BfsX1VsW XLdtRK9wprptK13ib7ZG+R0Dx4e1y96BI3EYWBtA8O2xnMWm9tzqiBjjPb59bIHuol81 +zEWebbhTMyqWBZfYeezUh/Vgg6n1jRXvXGKds6PwU3rtlHqeAxvw8TICqZQxr9nJ87t sHHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J6rl87hS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r15si6179531pgv.389.2019.03.22.04.51.14; Fri, 22 Mar 2019 04:51:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J6rl87hS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732462AbfCVLtZ (ORCPT + 99 others); Fri, 22 Mar 2019 07:49:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:53028 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732443AbfCVLtX (ORCPT ); Fri, 22 Mar 2019 07:49:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 22B212192C; Fri, 22 Mar 2019 11:49:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553255362; bh=gBY69CarT0XJTcktrsa5wz2guiQJf+Eh/+IYpXO5fCQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J6rl87hS89JV0KLn/uK5GJ/b5gSqNF47hXmGTJuztQzyM/AgrktkHa0GqAAxojSdh pbT5Gqu/oj0rFJOEvRimiCcWueUsSPs8K+pL6oKfxs/vPF3zyR+8SaWbam/7H92WBS mlwbh7+3LuJiyCcqK8CWCQjgJdM+gSudAPcZFMvY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Shishkin Subject: [PATCH 4.14 067/183] stm class: Prevent division by zero Date: Fri, 22 Mar 2019 12:14:55 +0100 Message-Id: <20190322111246.565668273@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111241.819468003@linuxfoundation.org> References: <20190322111241.819468003@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexander Shishkin commit bf7cbaae0831252b416f375ca9b1027ecd4642dd upstream. Using STP_POLICY_ID_SET ioctl command with dummy_stm device, or any STM device that supplies zero mmio channel size, will trigger a division by zero bug in the kernel. Prevent this by disallowing channel widths other than 1 for such devices. Signed-off-by: Alexander Shishkin Fixes: 7bd1d4093c2f ("stm class: Introduce an abstraction for System Trace Module devices") CC: stable@vger.kernel.org # v4.4+ Signed-off-by: Greg Kroah-Hartman --- drivers/hwtracing/stm/core.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/hwtracing/stm/core.c +++ b/drivers/hwtracing/stm/core.c @@ -561,7 +561,7 @@ static int stm_char_policy_set_ioctl(str { struct stm_device *stm = stmf->stm; struct stp_policy_id *id; - int ret = -EINVAL; + int ret = -EINVAL, wlimit = 1; u32 size; if (stmf->output.nr_chans) @@ -589,8 +589,10 @@ static int stm_char_policy_set_ioctl(str if (id->__reserved_0 || id->__reserved_1) goto err_free; - if (id->width < 1 || - id->width > PAGE_SIZE / stm->data->sw_mmiosz) + if (stm->data->sw_mmiosz) + wlimit = PAGE_SIZE / stm->data->sw_mmiosz; + + if (id->width < 1 || id->width > wlimit) goto err_free; ret = stm_file_assign(stmf, id->id, id->width);