Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp606441img; Fri, 22 Mar 2019 05:03:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxzAaLr+E6PqFffovw2lQ47wDNBQzNozgK5PvEWPnzGBZH27oiB61VdHEvJPCtKt1kBnOC4 X-Received: by 2002:a63:2747:: with SMTP id n68mr7105245pgn.317.1553256203808; Fri, 22 Mar 2019 05:03:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553256203; cv=none; d=google.com; s=arc-20160816; b=lBaecO6ldbiSyBgQTIXJjsDHencSoEVjPMJ0Si1Puc4sJHfN+MPT7jCsuxLVgVralE cxhD9UOrxRYhr82yFI0lA9rRki9KwDpmNPmkOTCREPVDap6xtQlz5oeO0J93teXgBgnK 5bUeY7zC7RiEVevDRs0pEynObVXksIX+pGK8PJDen6n0tQ0JbQW+o87Arom6I2tHMZ+1 KB6yC6+Y6NCJwnuWPAoE7u7DWNpYQDiM25NAGvy6BpC2w9VY7Vy2HW/jmPueuKXkVtXi PzY7LuHvUIoM4RUNkvbmgIScK0cAW/sLxpDjsyEd/McK9smScZZFxo7YUQKQrFGQacbb LNuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LBXzElhKlE8XWU1eYHMwVqFXBkUQ+GwitQl1rXhetcQ=; b=h7SDG/fQCe6bWsaV/BKJQhCY/Eb3GVSfgmwFRGQQgIuNOOe3MCWk36PHerJriynNne 8G+QDHNkoHE4uaR8AboLMkWDYWzlCfK48sGp+ELctn0gTsUv1o9vsQrtHWqbLk6No38o B0CWavdU/tkJO3bCo8yhNF1np4RsZCHyDaU0tfDwJh2eX2ITp0FbzVUIqO1Ho7ji+whl UsQeT0acvIp+7eTS1JZgkUDCmM41NASaUf976dKSnIVO2FeKNAFYZ7JPR9fCKfFgPpbA 7sntwtcVSlOrGmhDQfaI4WTmVWBYQpIAEXjenP1zdea4d+gzuf3uQzQN3fbwU3mbZCWM jeiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=f8P7aab2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u26si2323054pfh.15.2019.03.22.05.03.05; Fri, 22 Mar 2019 05:03:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=f8P7aab2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388093AbfCVMBx (ORCPT + 99 others); Fri, 22 Mar 2019 08:01:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:39722 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388274AbfCVMBw (ORCPT ); Fri, 22 Mar 2019 08:01:52 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 507672192D; Fri, 22 Mar 2019 12:01:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256111; bh=KxXE8HN87I3w5+ZGfSUbJ/9zZt9lp8IloUjB3w/Ncas=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=f8P7aab2F2nDGof9ypfw5vixWP0BQ3gDzYfYFfiWskOOyXxljaxvZynKMf5rOFHro h710HJT4ADDu22D6TnoQzmhgc5aBn5oK4ECJvF4Vzwe1AvE+OYF7oEzEOagSc+nYIL +ObnrjXFWeBH1iVqX9fMlOirb79KMgamFFQoZ2M0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Shishkin Subject: [PATCH 4.19 112/280] stm class: Prevent division by zero Date: Fri, 22 Mar 2019 12:14:25 +0100 Message-Id: <20190322111313.682852489@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexander Shishkin commit bf7cbaae0831252b416f375ca9b1027ecd4642dd upstream. Using STP_POLICY_ID_SET ioctl command with dummy_stm device, or any STM device that supplies zero mmio channel size, will trigger a division by zero bug in the kernel. Prevent this by disallowing channel widths other than 1 for such devices. Signed-off-by: Alexander Shishkin Fixes: 7bd1d4093c2f ("stm class: Introduce an abstraction for System Trace Module devices") CC: stable@vger.kernel.org # v4.4+ Signed-off-by: Greg Kroah-Hartman --- drivers/hwtracing/stm/core.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/hwtracing/stm/core.c +++ b/drivers/hwtracing/stm/core.c @@ -553,7 +553,7 @@ static int stm_char_policy_set_ioctl(str { struct stm_device *stm = stmf->stm; struct stp_policy_id *id; - int ret = -EINVAL; + int ret = -EINVAL, wlimit = 1; u32 size; if (stmf->output.nr_chans) @@ -581,8 +581,10 @@ static int stm_char_policy_set_ioctl(str if (id->__reserved_0 || id->__reserved_1) goto err_free; - if (id->width < 1 || - id->width > PAGE_SIZE / stm->data->sw_mmiosz) + if (stm->data->sw_mmiosz) + wlimit = PAGE_SIZE / stm->data->sw_mmiosz; + + if (id->width < 1 || id->width > wlimit) goto err_free; ret = stm_file_assign(stmf, id->id, id->width);