From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 76B371AB52F; Mon, 14 Oct 2024 14:27:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728916033; cv=none; b=m3r+ISnkje/B2TLeOReKkeJ7fg8etat3WLPMqbQruWTlukxOctH2nHADFHBUqAaq3rMEvl0aQB7nHOI52uffuQO7XKIgGfbd+BUKmvMR1CrMxZn+/zA3FtTH9oMl2DL6Ul+hoymjXHSeCVKyuI7iu7xjVXi9Um+G1ZzHbzQBIzU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728916033; c=relaxed/simple; bh=DkM1oDrZAK4OS7UdKDN8eCeMSiV5xebVUtpXO1wRqLI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=kwGBj3u7OI+QfFe4vOZsME7bOGHm3LYXUd5zt4W0l8/MBjJA222Y+nPHkZlu45xU1mQ+qV+W5Ybz+4tEGAaACqKkz6Hb1K9mxk5wdkWCuBqnyHWhRu6KSw3vcPt5pzYeEWZl3zG+pSSrbpP4cqg7Jf2GqXplmtxuxHlwJ28W77E= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=dEWNTWna; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="dEWNTWna" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A9610C4CEC3; Mon, 14 Oct 2024 14:27:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1728916033; bh=DkM1oDrZAK4OS7UdKDN8eCeMSiV5xebVUtpXO1wRqLI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dEWNTWnaKA6j2TUDlux0aPi1mtE3wAY9Jtn0c7AzAIOXMqE3HW0WNJhy0jr+ko4VI AoCgfNTIVRHqrJaVHhD5kwmF2Sxt9FmrGBTdPlLBE+YuGvsmpTopjWzVLZCxstuRtA bKy9kW4bRtPQUdDiNh+tY6k8Z6T2+Nw/EguhmeA0= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Riyan Dhiman , Dan Carpenter , Sasha Levin Subject: [PATCH 6.11 067/214] staging: vme_user: added bound check to geoid Date: Mon, 14 Oct 2024 16:18:50 +0200 Message-ID: <20241014141047.605333457@linuxfoundation.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241014141044.974962104@linuxfoundation.org> References: <20241014141044.974962104@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.11-stable review patch. If anyone has any objections, please let me know. ------------------ From: Riyan Dhiman [ Upstream commit a8a8b54350229f59c8ba6496fb5689a1632a59be ] The geoid is a module parameter that allows users to hardcode the slot number. A bound check for geoid was added in the probe function because only values between 0 and less than VME_MAX_SLOT are valid. Signed-off-by: Riyan Dhiman Reviewed-by: Dan Carpenter Link: https://lore.kernel.org/r/20240827125604.42771-2-riyandhiman14@gmail.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/staging/vme_user/vme_fake.c | 6 ++++++ drivers/staging/vme_user/vme_tsi148.c | 6 ++++++ 2 files changed, 12 insertions(+) diff --git a/drivers/staging/vme_user/vme_fake.c b/drivers/staging/vme_user/vme_fake.c index 7f84d1c86f291..c4fb2b65154c7 100644 --- a/drivers/staging/vme_user/vme_fake.c +++ b/drivers/staging/vme_user/vme_fake.c @@ -1059,6 +1059,12 @@ static int __init fake_init(void) struct vme_slave_resource *slave_image; struct vme_lm_resource *lm; + if (geoid < 0 || geoid >= VME_MAX_SLOTS) { + pr_err("VME geographical address must be between 0 and %d (exclusive), but got %d\n", + VME_MAX_SLOTS, geoid); + return -EINVAL; + } + /* We need a fake parent device */ vme_root = root_device_register("vme"); if (IS_ERR(vme_root)) diff --git a/drivers/staging/vme_user/vme_tsi148.c b/drivers/staging/vme_user/vme_tsi148.c index 2ec9c29044041..e40ca4870d704 100644 --- a/drivers/staging/vme_user/vme_tsi148.c +++ b/drivers/staging/vme_user/vme_tsi148.c @@ -2253,6 +2253,12 @@ static int tsi148_probe(struct pci_dev *pdev, const struct pci_device_id *id) struct vme_dma_resource *dma_ctrlr; struct vme_lm_resource *lm; + if (geoid < 0 || geoid >= VME_MAX_SLOTS) { + dev_err(&pdev->dev, "VME geographical address must be between 0 and %d (exclusive), but got %d\n", + VME_MAX_SLOTS, geoid); + return -EINVAL; + } + /* If we want to support more than one of each bridge, we need to * dynamically generate this so we get one per device */ -- 2.43.0