Received: by 10.223.176.5 with SMTP id f5csp3957572wra; Mon, 29 Jan 2018 23:22:39 -0800 (PST) X-Google-Smtp-Source: AH8x225ns8CMxH/OoWViO7d6a9u5cJRAALGK36VaCSkxVyYX8M9cU+jfRIzfVdGSbVS6v3eVXXqS X-Received: by 10.98.248.1 with SMTP id d1mr29405225pfh.222.1517296959414; Mon, 29 Jan 2018 23:22:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517296959; cv=none; d=google.com; s=arc-20160816; b=VlKtiQQfEOnbidIEfFFaQYWSVk5VofeFxYrxB+aQp7EvnYAKjTsYfzeGp+FDLeDeaz O4MzWaf/ptYxr9BWdf25srZlouMry97WjNA5AwZ7aBaO5VT5b1DRSuoVgamjnCK+dsO7 H7kb4RwXPpN7dY+ucYrexK6Gh5ofkx5J2dMu0PXMC92vNXFk9g2ygngOynvfW3ZpTalf 0OHJkR0UjyrjeGYcdivYUa/yS5/ckQYy2mHWuHEa/nRs0Gp42nmjfuqRdI72uyQ7L6Oc LmO9kXeXkiHrW+M2tCG9E5DVJbhvn9eNzpog64l+Zr/Wkg9CW7EUq9Y2lcqszYaFIsJx uO9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=XVcSBr+XXLoO5rBrkR2XuASeKymZQ5xZRIbz6MJznKg=; b=J3N5/vMkrGtgb9M8xuRFCKm8Hkc/UV0ABQdt30BoKkmqmret8At6qRK5c7TC0xfvdd R7DI9gJ/kNUHIN0uAn9QcfjM4f2BYi1FCLEJB/00QLgV1xmNUfu22CT7fX1KW5YzD6fQ 02vb4+KL2jVx6M2ZbJPC8DFcEvJG//6f5iEr9ykCdFN9ZQXoE6+cUssZn89pKCtUxul7 UnMbibEE0CdK4pbWlhTCMbZXiXK5dGlKhiAbgS4FoUv/Ii8fWasC1LgRmsvD1JBmvLMU 2t7RtjHU3ZA5zT9gxyFWA8OY07B2qpWP2/G7FKHgMvz8qYaNuu4z1kOAPIImWlTiKnXo unRw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m11-v6si6390919pln.763.2018.01.29.23.22.23; Mon, 29 Jan 2018 23:22:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751626AbeA3HWB (ORCPT + 99 others); Tue, 30 Jan 2018 02:22:01 -0500 Received: from lb2-smtp-cloud9.xs4all.net ([194.109.24.26]:56834 "EHLO lb2-smtp-cloud9.xs4all.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751510AbeA3HWA (ORCPT ); Tue, 30 Jan 2018 02:22:00 -0500 Received: from [192.168.2.10] ([212.251.195.8]) by smtp-cloud9.xs4all.net with ESMTPA id gQEseQpJDoWCOgQEweVP3d; Tue, 30 Jan 2018 08:21:58 +0100 Subject: Re: [PATCH 8/8] platform: vivid-cec: fix potential integer overflow in vivid_cec_pin_adap_events To: "Gustavo A. R. Silva" , Mauro Carvalho Chehab Cc: linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" References: <00eea53890802b679c138fc7f68a0f162261d95c.1517268668.git.gustavo@embeddedor.com> From: Hans Verkuil Message-ID: <2e1afa55-d214-f932-4ba7-2e21f6a2cd3d@xs4all.nl> Date: Tue, 30 Jan 2018 08:21:54 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <00eea53890802b679c138fc7f68a0f162261d95c.1517268668.git.gustavo@embeddedor.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfHU+H4pqDI+s8aHQqbKoPgLGb4VmHZ/aesZgqxTgKITUMWzO6//bBJjms6v36cU1zGzdv5nQknR9RZH7ksI3eCKou6D58Es5Hf+O1+B0xhIungCwGq42 ly6jJD21wKn4BKQV1qXoSwcZGBlyHjmaQMMVr1onBSG8JybJNqtvknac1Bx2jzAv+4bnEtmzhD3sjnstOGzFxptVINMf0xB0jfWcnwfPmYGEkpKpwhWRyJbz WOzWsOWfLIxrqiGj+N2W6aKrfoPrR2uwnF6cApiiYGZ8TtzTfy/k67AZa+fftva8pi+nnIHJsNAeks8/AvHCgQ== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Gustavo, On 01/30/2018 01:33 AM, Gustavo A. R. Silva wrote: > Cast len to const u64 in order to avoid a potential integer > overflow. This variable is being used in a context that expects > an expression of type const u64. > > Addresses-Coverity-ID: 1454996 ("Unintentional integer overflow") > Signed-off-by: Gustavo A. R. Silva > --- > drivers/media/platform/vivid/vivid-cec.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/media/platform/vivid/vivid-cec.c b/drivers/media/platform/vivid/vivid-cec.c > index b55d278..30240ab 100644 > --- a/drivers/media/platform/vivid/vivid-cec.c > +++ b/drivers/media/platform/vivid/vivid-cec.c > @@ -83,7 +83,7 @@ static void vivid_cec_pin_adap_events(struct cec_adapter *adap, ktime_t ts, > if (adap == NULL) > return; > ts = ktime_sub_us(ts, (CEC_TIM_START_BIT_TOTAL + > - len * 10 * CEC_TIM_DATA_BIT_TOTAL)); > + (const u64)len * 10 * CEC_TIM_DATA_BIT_TOTAL)); This makes no sense. Certainly the const part is pointless. And given that len is always <= 16 there definitely is no overflow. I don't really want this cast in the code. Sorry, Hans > cec_queue_pin_cec_event(adap, false, ts); > ts = ktime_add_us(ts, CEC_TIM_START_BIT_LOW); > cec_queue_pin_cec_event(adap, true, ts); >