Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1327365imm; Tue, 2 Oct 2018 06:35:20 -0700 (PDT) X-Google-Smtp-Source: ACcGV612bzwrexC9iXuPl4G4AgYMBebITAHpZb+43CkVbCdC5dR561FB02wWX6AIjkbrpBFwMhGK X-Received: by 2002:a63:d14a:: with SMTP id c10-v6mr14441332pgj.384.1538487320927; Tue, 02 Oct 2018 06:35:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538487320; cv=none; d=google.com; s=arc-20160816; b=Ayv904obEUy8HYgF5DWqo0eCNq/EutPSx+B7/L8u8xW5IHpzcUv/ykdgvLPP3pwBHp EIjLaC70cltYcJwo9sZUJ/iiyLQbR7rTXipaKd9O3U3j2Qu0WHSR2D4xLGpxIHeQ/C7Q WA2SW2EW1HR6UDR+B16Z4TeRhjCi3z0NYJDsZtmRGC0pmbZKYwrlx1aqx18dVpvNYaE4 TxTFxbg5ItbF3W4GgGklKvBHQq55NxnjuM/CiG3RsMQwO+IvknxsPhqSxLKTf0jBUZbP 9FVtKTpKY9jbXbeRDIeFVA7H+QuECsnt2MgXOmUw36DOpcHWJOaayq7Chva31RfngsgC ozyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=QT0xN2YIEtEW32X5Kl1ABOEGkhcB/gC2xHLi6Gn1qqA=; b=0TmwQkI9CFsO5uNrgfEDtGDvPCTlKv21x1iVyzesM4xNXTJFTfCc9PBxzxwES9s6NC 8E4LRFkCXHM6vzbMCmvO8MnaAxe9ZyaJB7yvaEYm9Xutac8BMdhOyzRleERoQ0mkBbdQ Wzcm0Li+3VdhjUvCu0RMtwyCi5icIUFLnAHln8mwohyj7zdmA7Wx3DVoBku9hC1Qs9Co GT22E1G/R3Ie51w/N9XPtLuoGtKG81PLAqF6yXdv0d9NIelMckLQuIRtqlP520pxt85+ Id7ZIZSipuSBEiX8wa+7iWdz7rJXdl9fLsVroZfnOpvWaly123m7zFFV0eZDWk/XNGTC z09g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f187-v6si16502797pfg.122.2018.10.02.06.35.05; Tue, 02 Oct 2018 06:35:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731717AbeJBUQf (ORCPT + 99 others); Tue, 2 Oct 2018 16:16:35 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:34800 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730099AbeJBUQe (ORCPT ); Tue, 2 Oct 2018 16:16:34 -0400 Received: from localhost (24-104-73-23-ip-static.hfc.comcastbusiness.net [24.104.73.23]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id E08C05AA; Tue, 2 Oct 2018 13:33:10 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tobias Regnery , Stefan Agner , Kalle Valo , Sasha Levin Subject: [PATCH 4.14 063/137] brcmsmac: fix wrap around in conversion from constant to s16 Date: Tue, 2 Oct 2018 06:24:24 -0700 Message-Id: <20181002132502.983770740@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20181002132458.446916963@linuxfoundation.org> References: <20181002132458.446916963@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Stefan Agner [ Upstream commit c9a61469fc97672a08b2f798830a55ea6e03dc4a ] The last value in the log_table wraps around to a negative value since s16 has a value range of -32768 to 32767. This is not what the table intends to represent. Use the closest positive value 32767. This fixes a warning seen with clang: drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_qmath.c:216:2: warning: implicit conversion from 'int' to 's16' (aka 'short') changes value from 32768 to -32768 [-Wconstant-conversion] 32768 ^~~~~ 1 warning generated. Fixes: 4c0bfeaae9f9 ("brcmsmac: fix array out-of-bounds access in qm_log10") Cc: Tobias Regnery Signed-off-by: Stefan Agner Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_qmath.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_qmath.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_qmath.c @@ -213,7 +213,7 @@ static const s16 log_table[] = { 30498, 31267, 32024, - 32768 + 32767 }; #define LOG_TABLE_SIZE 32 /* log_table size */