Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1596171ybv; Fri, 21 Feb 2020 00:00:03 -0800 (PST) X-Google-Smtp-Source: APXvYqygsAA6NIKkmw0NJw7nm5mIq2NGKhNEGFy3sVrLa2ulATofkRoJETA5vjEgBshXfOIb7sBm X-Received: by 2002:a9d:470a:: with SMTP id a10mr27789882otf.370.1582272002991; Fri, 21 Feb 2020 00:00:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582272002; cv=none; d=google.com; s=arc-20160816; b=s9PyaVBI07F8b8XOJcO8Qjk6/bFIl5ZBZUMB1240pS+GaIeY88ZtirT/993kCaQ9BH syUeIuNkwkB3abEwSXKiAJgQHsevDp+yVKVNOO6NVpKCnwVXMuy8gcApaE0k6iXWN4qT pqJLyV87NbjGh0FgjS9+ZNer4vuBUM2UJ29db9k2fhpB5tQN/eEKnw5JExMbB9jP2GD5 9LiqIoakCYBayfOhOEJhKp0FCu0l5ceaDxUuGRRm13Qzdbi0zowXh+GzRZtCkhYnoF3E tHpwl/5NyW5Ljpf1QwIpznDbIRgIulWvtEdSYlJlZZWm98UisSuk0n5mVg5XjdZMrEW2 15Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=r5myxGFzd98MhZY/yRR1P0zjcqNzCsE5N/hMPmJDEjY=; b=NZoMyj5ueX0wgqDw155VvtvPIgpM7LSZa07tWpRE12sNfKSOW8kT8SbIL3hvN2LewM tn7eoOdjmfENnyhCx2Hvoh8IYsRZQx93gm7j1DlNh4GVST2cnJ1z803gTt1azcHx/HBi PgyKpqjWV95HcQ+rOmF5p8el98JugJzPLuWBGdurZnmP5+1uyGnANftmmqeHIXfb1aBV fn4Qy+TMfVmpZ6yPsNG6f9gWxDExFPf7874XxHlTa3TWHwNg1P8+KLrr+M6KjBiF/309 qrNSeO94ylNnhIPEuVrqpmPv1b1objd94eYvd2qGm6zaLHvq1G83IYbLXuFzQY3cDqrM mZiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FHvhXW6e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t10si1203833otd.219.2020.02.20.23.59.51; Fri, 21 Feb 2020 00:00:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FHvhXW6e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730489AbgBUH6r (ORCPT + 99 others); Fri, 21 Feb 2020 02:58:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:58590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730362AbgBUH6n (ORCPT ); Fri, 21 Feb 2020 02:58:43 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E87272073A; Fri, 21 Feb 2020 07:58:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271923; bh=Gb6zO3vrz52MEdvW1LhATnJkf+J9deNEM1D6WGHxNqI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FHvhXW6eMGb/tVuveYTNcoK9z8jRQ+U5AMWfTdiK0XwaHin4WEE6tomHnFweVu9Lf h64IXtj50AKvfNXINK0DesgSHx7Be9kP5MU92MZYg2W/D0duvADF6fjTnMe9TEunFE ZcRYS5YYtpLHioa6QBVSpip1FlwB//whDhNRwwKY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Stanislaw Gruszka , Kalle Valo , Sasha Levin Subject: [PATCH 5.5 348/399] iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop Date: Fri, 21 Feb 2020 08:41:13 +0100 Message-Id: <20200221072434.988342628@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King [ Upstream commit c2f9a4e4a5abfc84c01b738496b3fd2d471e0b18 ] The loop counter addr is a u16 where as the upper limit of the loop is an int. In the unlikely event that the il->cfg->eeprom_size is greater than 64K then we end up with an infinite loop since addr will wrap around an never reach upper loop limit. Fix this by making addr an int. Addresses-Coverity: ("Infinite loop") Fixes: be663ab67077 ("iwlwifi: split the drivers for agn and legacy devices 3945/4965") Signed-off-by: Colin Ian King Acked-by: Stanislaw Gruszka Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/intel/iwlegacy/common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/intel/iwlegacy/common.c b/drivers/net/wireless/intel/iwlegacy/common.c index d966b29b45ee7..348c17ce72f5c 100644 --- a/drivers/net/wireless/intel/iwlegacy/common.c +++ b/drivers/net/wireless/intel/iwlegacy/common.c @@ -699,7 +699,7 @@ il_eeprom_init(struct il_priv *il) u32 gp = _il_rd(il, CSR_EEPROM_GP); int sz; int ret; - u16 addr; + int addr; /* allocate eeprom */ sz = il->cfg->eeprom_size; -- 2.20.1