Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1592703ybv; Thu, 20 Feb 2020 23:55:24 -0800 (PST) X-Google-Smtp-Source: APXvYqw5/U99H3PPpEvm4/YxbEXqtcXWCRZefL0OcL4/dxVNjHIYCBCb7hI7JIm+FvTNnr7+MnD9 X-Received: by 2002:a9d:138:: with SMTP id 53mr27878846otu.334.1582271724755; Thu, 20 Feb 2020 23:55:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271724; cv=none; d=google.com; s=arc-20160816; b=GfyGVvnRUZJVWY+BM/5PefI22+WSwAc8vKkruYSS5tD1dh9/1NcAqt0270OpmZZ5fH fCK354yAmUeXuzIw1sBha8ruBm+o2krpUNKl/p1OA593sh0193DAaQUZ5W+2OH6IReI/ U+Gu/xiQGCjcbToswx78vMLl+6O9dPXjDvdkjmR03wetB2pgBz0yNK9OPEhwhSEnLjfA 6GT1OZ/fstAxgqa5dZeZg1tSKOAHd2TTQgu2TOStInTDunZa2KrZv+m6OFI75KHATV5y UKcwu2+ekvgNQQZNA1fuF8XZ6YpBnIKu7ZIDX8If+3boO19v7uT/pGFHW4W0csf85EpV NOaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JwDcNZY/OVihTvFecgT6lnTYRhedR8i5sEx01qLWGbg=; b=wAnkhrIthPvQm8DllqQNMumOsn5If1yIFVZb3xZpzYjhsPEu/YTNpQSwkGSo4pbHt5 2B/eAAwvsZepjkEPLCiyW1TO+FPb4wg8sUXkIQcZAyCwGWf8L6y1P/GtcI1PJmJl1+kL kdGPMm+mo2BiFmIcrx5MMXVtXdzAtfYfWDcSsUKUAj7pLat4eHXqW7V2IE4xGZA8JxqT a8pdb9TdybDAzoimDKfpfBxN1dJVS4XKgj/hWltj3TuwKsMQvgSpdK9F9aEQxW3AwA/6 qdQ3HBkP9cdzxYjb+10lv/rCEml/Qnk0kEmV9dvBlGCE/sHi2q4DG0mtgVv8WoKAvGSj vFhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ghRsiTGV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x12si993368oto.194.2020.02.20.23.55.12; Thu, 20 Feb 2020 23:55:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ghRsiTGV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730236AbgBUHyU (ORCPT + 99 others); Fri, 21 Feb 2020 02:54:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:52848 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729753AbgBUHyR (ORCPT ); Fri, 21 Feb 2020 02:54:17 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B8EBF2073A; Fri, 21 Feb 2020 07:54:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271657; bh=aoYt103LAXkSgzeNDmfe0681CWASNG0wJiOscC/U/Bg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ghRsiTGVEf954if8XB6wMllQNhPN3a/OF8wJRRvyxGdFbvK73jm4h1pE24jseMWBr uiJ8usFLOglrU0ofLirDON6AeBSIGWp1Ztp2yqklWAbuv1aQzjlZ6TOaiCkaYf2AUS ssXhIrBW8Rkck2V0q4xbKJNR/Lg1pMcZuJiS4t2A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Simon Schwartz , Sasha Levin Subject: [PATCH 5.5 250/399] driver core: platform: Prevent resouce overflow from causing infinite loops Date: Fri, 21 Feb 2020 08:39:35 +0100 Message-Id: <20200221072426.748341283@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Simon Schwartz [ Upstream commit 39cc539f90d035a293240c9443af50be55ee81b8 ] num_resources in the platform_device struct is declared as a u32. The for loops that iterate over num_resources use an int as the counter, which can cause infinite loops on architectures with smaller ints. Change the loop counters to u32. Signed-off-by: Simon Schwartz Link: https://lore.kernel.org/r/2201ce63a2a171ffd2ed14e867875316efcf71db.camel@theschwartz.xyz Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/base/platform.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/base/platform.c b/drivers/base/platform.c index cf6b6b722e5c9..864b53b3d5980 100644 --- a/drivers/base/platform.c +++ b/drivers/base/platform.c @@ -27,6 +27,7 @@ #include #include #include +#include #include "base.h" #include "power/power.h" @@ -48,7 +49,7 @@ EXPORT_SYMBOL_GPL(platform_bus); struct resource *platform_get_resource(struct platform_device *dev, unsigned int type, unsigned int num) { - int i; + u32 i; for (i = 0; i < dev->num_resources; i++) { struct resource *r = &dev->resource[i]; @@ -255,7 +256,7 @@ struct resource *platform_get_resource_byname(struct platform_device *dev, unsigned int type, const char *name) { - int i; + u32 i; for (i = 0; i < dev->num_resources; i++) { struct resource *r = &dev->resource[i]; @@ -501,7 +502,8 @@ EXPORT_SYMBOL_GPL(platform_device_add_properties); */ int platform_device_add(struct platform_device *pdev) { - int i, ret; + u32 i; + int ret; if (!pdev) return -EINVAL; @@ -590,7 +592,7 @@ EXPORT_SYMBOL_GPL(platform_device_add); */ void platform_device_del(struct platform_device *pdev) { - int i; + u32 i; if (!IS_ERR_OR_NULL(pdev)) { device_del(&pdev->dev); -- 2.20.1