Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1136795ybf; Thu, 27 Feb 2020 05:43:52 -0800 (PST) X-Google-Smtp-Source: APXvYqx9Xlej0q+wUNq8r9/F3FeF53IRuxEOnKEKJdptlP1FTfONnmvaYBCIlFhMk+FZdOznzic5 X-Received: by 2002:a05:6830:1198:: with SMTP id u24mr3274791otq.215.1582811032108; Thu, 27 Feb 2020 05:43:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582811032; cv=none; d=google.com; s=arc-20160816; b=Sa6ESKUmhIdEsf2LRVGoode0WwrskkTg8nc7Qje/USK+ybCZt9GlpdSJwlmkWxbuJV iAbvI++W7zsKgGIII7HEXbjzt/fuclz2w1XEY9XUe9+svIixCCPiUn/bHuXbkJsQo7r/ dlj87vUrJRlartnGVBZGN/cjRiJ7AtDQhPs60zv1H/0IkqlOPY+NXF+G+i6oxfpbqBPn 5rkCHBczPjYtqDuPwy08JN/MAtzII4ZgLBR3p215yd2jvXFay4rOWkmJloMvg8URy3Vy T7/0W1qS7uTQX7Pym6dQ8vUpWV7VLfJSL5Jc6T22K6/I1Vqeap28C8J1wjxG5EN8PB7C 06xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VDPJOZpVDIF5IFTIjjvbUk+50andLUtEpgHRr2PbtJk=; b=DD5aHNObbUF56dBKLJQGwRBE65P30XQwNR2QX8zeEAP3/iVhb/yTVhOXcUP9hf7wCA kgq2lwE75ovI5642sNArk4Nut96jZhmRIezvo3h8vrmbBM+129PGChwb1RR0k/THq22D E37qbgN+IHlZQE8OzDjUkjwr5tQu66/ieXsmA5rcWJ62gDe6Hy3gvH0VuXok4KWCpV3g ZMe75OJP79WHuckD5B1Zb0XSmD2zqup1Z6130ZUW4RFsJOOLYggWcPt1hgjp4lY0G3tI kUY4nrftlYH65HpXlT1/YnR06FVWRQHVYT6uMEPWv214EqGaiXL3R5kGlAnRkHkrD/K1 2PjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=md4rov3n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c67si1302665oib.276.2020.02.27.05.43.40; Thu, 27 Feb 2020 05:43:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=md4rov3n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729891AbgB0NnD (ORCPT + 99 others); Thu, 27 Feb 2020 08:43:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:38164 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729580AbgB0NnC (ORCPT ); Thu, 27 Feb 2020 08:43:02 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 757F320578; Thu, 27 Feb 2020 13:43:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582810981; bh=kPczogWiXOSiS49EYVauMu0X+s/wJe9Q8hPGsbMerHE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=md4rov3naB0J861uvrcftcgWJWZaBwpVZYQlP82/A9GJ2ej8GgBSKKBZxZDwtHREh NfsUOh7TDgAI9vPIaSZ8hXPtoZ8QseNfGrDyEFQTuq1mrTXFhA6frI3Pubv1wCKGJA S+/6Ff5bnxfpprPYOAulHW+3/sIpt7xTrfBHb/tY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Stanislaw Gruszka , Kalle Valo , Sasha Levin Subject: [PATCH 4.4 072/113] iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop Date: Thu, 27 Feb 2020 14:36:28 +0100 Message-Id: <20200227132223.297849844@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132211.791484803@linuxfoundation.org> References: <20200227132211.791484803@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King [ Upstream commit c2f9a4e4a5abfc84c01b738496b3fd2d471e0b18 ] The loop counter addr is a u16 where as the upper limit of the loop is an int. In the unlikely event that the il->cfg->eeprom_size is greater than 64K then we end up with an infinite loop since addr will wrap around an never reach upper loop limit. Fix this by making addr an int. Addresses-Coverity: ("Infinite loop") Fixes: be663ab67077 ("iwlwifi: split the drivers for agn and legacy devices 3945/4965") Signed-off-by: Colin Ian King Acked-by: Stanislaw Gruszka Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/iwlegacy/common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/iwlegacy/common.c b/drivers/net/wireless/iwlegacy/common.c index 887114582583b..544ab3750ea6e 100644 --- a/drivers/net/wireless/iwlegacy/common.c +++ b/drivers/net/wireless/iwlegacy/common.c @@ -717,7 +717,7 @@ il_eeprom_init(struct il_priv *il) u32 gp = _il_rd(il, CSR_EEPROM_GP); int sz; int ret; - u16 addr; + int addr; /* allocate eeprom */ sz = il->cfg->eeprom_size; -- 2.20.1