xen, cpu_hotplug: Prevent an out of bounds access
authorDan Carpenter <dan.carpenter@oracle.com>
Thu, 7 Mar 2019 05:41:22 +0000 (08:41 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 27 Jan 2020 13:50:31 +0000 (14:50 +0100)
commita663874605954bb50b940e6c315774c9da01b4e7
tree6f3d22df317668d43cbbd96efc73fccbdad7fbfc
parent5f4144822d2adf5449ad6b835eaad25eb00589fa
xen, cpu_hotplug: Prevent an out of bounds access

[ Upstream commit 201676095dda7e5b31a5e1d116d10fc22985075e ]

The "cpu" variable comes from the sscanf() so Smatch marks it as
untrusted data.  We can't pass a higher value than "nr_cpu_ids" to
cpu_possible() or it results in an out of bounds access.

Fixes: d68d82afd4c8 ("xen: implement CPU hotplugging")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/xen/cpu_hotplug.c