Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3760038pxv; Mon, 19 Jul 2021 08:08:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTaxXxrNdK0J1lafTj1erjx43DdK0LKl2N0WWGI2Aegvt1/C5jVhOqOupZUsztCNbJbsg6 X-Received: by 2002:a1c:f30a:: with SMTP id q10mr26945063wmq.138.1626707286013; Mon, 19 Jul 2021 08:08:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626707285; cv=none; d=google.com; s=arc-20160816; b=MND78EUXEhy0fSPnPeO1v1xNVZMTcYt5bUMS8kJee0nESKng+ZH9UXE2SU55v8sxOD IXiIZ+6fTF6I/bhaLd+PvZS5HjsKq2TS0M4vmaiUGfHHaxG3m2wbsxo/qSWmL09wDvKC peiuqdLa+Df6Z2ZAKeM2Lv//adf2H+J9ru3cUobmnkzH4XOnO06MPXLTf++btoy9Gbuq POx12vOQHTM1NS1KPwJGDXB+ohtH4FnVxRcb14oPw5fb6bQcimX+dUzZJnYAtCibe+EA nTOwLwij1fcl/Vvxs6VYWfOy7VUY5ZQIehUIC9QVzImQ03Fj1tiYWpkjZRmC7ouaO7rk yW9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SQ6sUXi+/krHICy6+KgB7y3xGBmI/rloDAn4MWLZLMc=; b=JvbguV7LUXPm78EcZzeXHTkGUHXXIbruVisHRuvJWEeolz0jipn+J8okV0R8HAgzOk D/nV7iQzYb3H2EtXKyUp89UEq2TYxQe7wwrqoqT8eZ+EbrYQeiSyDfc/69SOpQk+k+80 QcGDvdhbYs8+pCBa0dnIfxUt+G5J6QevttLnnArlhLLzwmvnLBR9eCcg073Ux5uiNuCZ fJZ38ASIdsyCkyyWJNMFTPHsMPh5glz3NPstsF/KjmblS+draZUt6OtdwrqkVbQ36uXA ZgYXWz1gddlhkjSct/4ExjsvQvmV0rIQPiBf+5UENzxI68fCeWd2W+pqZa2WLazsLjFg 2R1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=swnRCudA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r15si20394548edw.252.2021.07.19.08.07.42; Mon, 19 Jul 2021 08:08:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=swnRCudA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242958AbhGSOXU (ORCPT + 99 others); Mon, 19 Jul 2021 10:23:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:57286 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242833AbhGSOVJ (ORCPT ); Mon, 19 Jul 2021 10:21:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 658496113C; Mon, 19 Jul 2021 15:01:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626706900; bh=OrOvRXnJHcLvOozj6dKL+qNTjYI/AkkXuge1iissLIE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=swnRCudAUrzlJuwnD6Ss9m8I1VQQOdRSlo8FSp8FxjXExi8rRFi5RhNvP6WObJgVd e74CbGg/1P5ircZViGja9f40hbCYce22s1sdW5qSxWtMP936R4GSHTlhQn9U6Ycdtq T1VVDfKeSqk9y40PGEoITpokTsIXOYHBs8ipyVqM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sherry Sun , Sasha Levin Subject: [PATCH 4.4 143/188] tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero Date: Mon, 19 Jul 2021 16:52:07 +0200 Message-Id: <20210719144941.170298786@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144913.076563739@linuxfoundation.org> References: <20210719144913.076563739@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sherry Sun [ Upstream commit fcb10ee27fb91b25b68d7745db9817ecea9f1038 ] We should be very careful about the register values that will be used for division or modulo operations, althrough the possibility that the UARTBAUD register value is zero is very low, but we had better to deal with the "bad data" of hardware in advance to avoid division or modulo by zero leading to undefined kernel behavior. Signed-off-by: Sherry Sun Link: https://lore.kernel.org/r/20210427021226.27468-1-sherry.sun@nxp.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/serial/fsl_lpuart.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/tty/serial/fsl_lpuart.c b/drivers/tty/serial/fsl_lpuart.c index 1544a7cc76ff..1319f3dd5b70 100644 --- a/drivers/tty/serial/fsl_lpuart.c +++ b/drivers/tty/serial/fsl_lpuart.c @@ -1681,6 +1681,9 @@ lpuart32_console_get_options(struct lpuart_port *sport, int *baud, bd = lpuart32_read(sport->port.membase + UARTBAUD); bd &= UARTBAUD_SBR_MASK; + if (!bd) + return; + sbr = bd; uartclk = clk_get_rate(sport->clk); /* -- 2.30.2