stm class: Prevent user-controllable allocations
authorAlexander Shishkin <alexander.shishkin@linux.intel.com>
Tue, 22 Dec 2015 15:25:21 +0000 (17:25 +0200)
committerMathieu Poirier <mathieu.poirier@linaro.org>
Wed, 1 Jun 2016 21:28:42 +0000 (15:28 -0600)
commit1caf1d3016fcf51a9cb67ac0b750ac90cbc32bbe
tree3c7088c042d45d110dfc1102e1b20f870be25ad6
parent0f049c5ab8a7bc839647702fd29c63177f9e7c6b
stm class: Prevent user-controllable allocations

Currently, the character device write method allocates a temporary buffer
for user's data, but the user's data size is not sanitized and can cause
arbitrarily large allocations via kzalloc() or an integer overflow that
will then result in overwriting kernel memory.

This patch trims the input buffer size to avoid these issues.

Reported-by: Sasha Levin <sasha.levin@oracle.com>
Signed-off-by: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
(cherry picked from commit f08b18266c7116e2ec6885dd53a928f580060a71)
drivers/hwtracing/stm/core.c