Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2977451imu; Mon, 19 Nov 2018 08:53:38 -0800 (PST) X-Google-Smtp-Source: AJdET5f3sIPJPAAX4mbV70By0zMXmhLfhgPeAaWmOUnOZhuxQUpn31vQogPaEmyy6tI00VP0ydzX X-Received: by 2002:a63:f844:: with SMTP id v4mr20569319pgj.82.1542646418905; Mon, 19 Nov 2018 08:53:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542646418; cv=none; d=google.com; s=arc-20160816; b=gr1MylzuPyiAkj0BjcE+2BLWFxhRaCX89L43Vg8opsbsDLB9XA0Z+vIt6pcNW/hpz9 CsvLF0gq6ia+z5WWIh2EYXtatlQaKrCeakKnWti7PELEc2NGATqTR4PIWmzEH7hYYRjx pg95QQnmI0Bp7TxTRI/JAEmKOqb/YZGhd4oaq7riUPQzOzoK3mvL3OrbP/h60/aDMqF6 nqHt+tCT+0qPKiNmwT6W9cl91bmDMV9Ts2wJJMjT78gqqdUdI02F57plFjWXHmtlVGTS iAVg19Gp5aczgKlF9eDryxtM7PUlzjpZD2Um9RO+aFwwEtcLYoOM0KhKbffSinFarJug VPJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uKUgMP5XNZSdyV1DgylBF8rn80hNBnVg8evOyeN8b+A=; b=c/lRzMEYrp4DXtittAIsv75HVCqE9sXilEpGoA0mitYCPKsCRZrRwQGkIHWzWZxlCf p5DdsC/ZdcKk+JMCXcKCUCHntPs7CNm5W2SQK9BroYLuJkWiTeQn0tscr+6BD1S/7P4+ ASXZJe3Z3UZOcu1+pqGpl3dXYjOdzmuwnXo4V2jQsSif3f2VCVVLFcmd0dvHmHLpxvG3 BKJbfCXuKZ5eOPT8aryipHC4o0cb3aml/88Oc1xvUSgbECblxtoiNGF/Fsnh3ZT9A2g0 O3VGUks/CUCdvAKgWqJEwOruE2q9KaXVaMF8+48na5NSSgpkzrycylkPPhbdSYA/w/k2 Tcfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PMG8mFpR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 28si18776848pgw.364.2018.11.19.08.53.24; Mon, 19 Nov 2018 08:53:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PMG8mFpR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390179AbeKTDPM (ORCPT + 99 others); Mon, 19 Nov 2018 22:15:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:52736 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389764AbeKTDPM (ORCPT ); Mon, 19 Nov 2018 22:15:12 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A7C74208E4; Mon, 19 Nov 2018 16:50:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646259; bh=atWAY4hWJhRbG26/KwoXdLF0mOFr6D4JgBxUNrpe934=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PMG8mFpRdW3ej8yZDb3udFhZzuiLR61TxdvS/Fx3ug7yYpWzxAUaVJKg22DffoPkp DNEu6FpbaULUyvMS3p5zBLVubIBgk6pt1wD2C6IsoNTWRXdixKPP4nKv7abUUaZHCL ZSRm+tPz29MqNhso0upMdv4kXNQrt8B1/pvSMm1A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Maciej W. Rozycki" , Alexandre Belloni Subject: [PATCH 4.14 097/124] rtc: hctosys: Add missing range error reporting Date: Mon, 19 Nov 2018 17:29:11 +0100 Message-Id: <20181119162630.892102408@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162612.951907286@linuxfoundation.org> References: <20181119162612.951907286@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Maciej W. Rozycki commit 7ce9a992ffde8ce93d5ae5767362a5c7389ae895 upstream. Fix an issue with the 32-bit range error path in `rtc_hctosys' where no error code is set and consequently the successful preceding call result from `rtc_read_time' is propagated to `rtc_hctosys_ret'. This in turn makes any subsequent call to `hctosys_show' incorrectly report in sysfs that the system time has been set from this RTC while it has not. Set the error to ERANGE then if we can't express the result due to an overflow. Signed-off-by: Maciej W. Rozycki Fixes: b3a5ac42ab18 ("rtc: hctosys: Ensure system time doesn't overflow time_t") Cc: stable@vger.kernel.org # 4.17+ Signed-off-by: Alexandre Belloni Signed-off-by: Greg Kroah-Hartman --- drivers/rtc/hctosys.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/drivers/rtc/hctosys.c +++ b/drivers/rtc/hctosys.c @@ -50,8 +50,10 @@ static int __init rtc_hctosys(void) tv64.tv_sec = rtc_tm_to_time64(&tm); #if BITS_PER_LONG == 32 - if (tv64.tv_sec > INT_MAX) + if (tv64.tv_sec > INT_MAX) { + err = -ERANGE; goto err_read; + } #endif err = do_settimeofday64(&tv64);