xen, cpu_hotplug: Prevent an out of bounds access
authorDan Carpenter <dan.carpenter@oracle.com>
Thu, 7 Mar 2019 05:41:22 +0000 (08:41 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 29 Jan 2020 09:24:18 +0000 (10:24 +0100)
commit93501e7330aacb38e15d26aaddc1df3485acff91
treec850467a40a6ba356e8b6193e3ae89f06c88cbd2
parent743f4da870bf40b11101be0177ed8ea9e86fceeb
xen, cpu_hotplug: Prevent an out of bounds access

[ Upstream commit 201676095dda7e5b31a5e1d116d10fc22985075e ]

The "cpu" variable comes from the sscanf() so Smatch marks it as
untrusted data.  We can't pass a higher value than "nr_cpu_ids" to
cpu_possible() or it results in an out of bounds access.

Fixes: d68d82afd4c8 ("xen: implement CPU hotplugging")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/xen/cpu_hotplug.c