Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2980797imu; Mon, 19 Nov 2018 08:56:41 -0800 (PST) X-Google-Smtp-Source: AJdET5cBNOjubN2Fa+bfP7k1HxVGNa73QWj3Z6W+Fiuwr8tpJ6iRlzhMRcpXahD5msFBTmUIXvYr X-Received: by 2002:a63:1a4b:: with SMTP id a11mr20914471pgm.254.1542646601407; Mon, 19 Nov 2018 08:56:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542646601; cv=none; d=google.com; s=arc-20160816; b=HYM+2LFenrRoDbh6d0qFdgrqaQKCvuFOSf5MyqS/DXXSl38ssJ0urokvUl7xcaWt2y aqSmTuysLSwDvY/ziCSpTsnkpQpU3m6p/sFKVSWawvVWQjHj4oTnbjqM/qszxF5unE1C N5OYkib8mWfVyTLiFBI2Ph1IVLSW0jXH4ODFAObsDeTJd4OdwTSJhnRwWOU3UoHMZsy1 omP8UPBYXDbl/iPVxzJ20SY5yu3Cl9DvMZk0HvnLJ3GuNzWpHkXJrbg5VZpVUvYa3KCg DfHe9IqJa6lebuolgBbQOFnBbX98T+UTdLwv9Jjr7E5AUb7SY6w28Q1bQlwf4eKJt+IJ KHNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JfwF6Q+H+fc6o5XmIkqoaUFW4SOIXNEprk/cJI37p6w=; b=PwvSUCti9xPkhHRsrTcHvpuGhE5v6cSPCzRsIvQUQnTFpIH5lIKnk8Nib/tWFpCfO8 JHB6HuUbuvbEPA1FK+dhmfX9vL8jWiq0pi0gmd7t1QcqYCobxe9iZ5f7k+zDpryRHi3s HiWJ8wMcDJbywukPMbkPnJ52Mj7sdX/Pkxc6oxwWJPOvemhP7nyJ6bLKIOaltYKLLTGl cxE2aJ3RCHIlihCqaHuvWpM4cLfEDeyI+jDLXiacd9QmL5pYOLFhgcE3JA/264T9Hjkx ZIEgBwNe2axovU6eJdRxooVBgN2lAK0bvgq1SjTtCyhq40DG/AwPkNZs/6ymOjTqKotB jcwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oWhilPxw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t127si13639766pfd.21.2018.11.19.08.56.26; Mon, 19 Nov 2018 08:56:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oWhilPxw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391100AbeKTDUF (ORCPT + 99 others); Mon, 19 Nov 2018 22:20:05 -0500 Received: from mail.kernel.org ([198.145.29.99]:59312 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390603AbeKTDUE (ORCPT ); Mon, 19 Nov 2018 22:20:04 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF9C9206BA; Mon, 19 Nov 2018 16:55:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646549; bh=/u7X4RLY76Qh2xifzXvm4NiyJQiZWbhNet7aCsROWlI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oWhilPxwNF/YHNY4ZdTMDjckw7lbO5Zb6EsHx1CIs5437C1b2AgniNW+1HGGEwQp1 8a5VfK9YOsPdDxAfx135IFTx0eOoHYJJMaktC3v2X8pKbbdb0SogtUiqF70mAX/T1+ WYteKL1cJJJI6Oe6FcqxV9wxz/IQTSmjzvJAaNiw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Maciej W. Rozycki" , Alexandre Belloni Subject: [PATCH 4.9 71/83] rtc: hctosys: Add missing range error reporting Date: Mon, 19 Nov 2018 17:29:37 +0100 Message-Id: <20181119162625.949312970@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162612.046511542@linuxfoundation.org> References: <20181119162612.046511542@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Maciej W. Rozycki commit 7ce9a992ffde8ce93d5ae5767362a5c7389ae895 upstream. Fix an issue with the 32-bit range error path in `rtc_hctosys' where no error code is set and consequently the successful preceding call result from `rtc_read_time' is propagated to `rtc_hctosys_ret'. This in turn makes any subsequent call to `hctosys_show' incorrectly report in sysfs that the system time has been set from this RTC while it has not. Set the error to ERANGE then if we can't express the result due to an overflow. Signed-off-by: Maciej W. Rozycki Fixes: b3a5ac42ab18 ("rtc: hctosys: Ensure system time doesn't overflow time_t") Cc: stable@vger.kernel.org # 4.17+ Signed-off-by: Alexandre Belloni Signed-off-by: Greg Kroah-Hartman --- drivers/rtc/hctosys.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/drivers/rtc/hctosys.c +++ b/drivers/rtc/hctosys.c @@ -50,8 +50,10 @@ static int __init rtc_hctosys(void) tv64.tv_sec = rtc_tm_to_time64(&tm); #if BITS_PER_LONG == 32 - if (tv64.tv_sec > INT_MAX) + if (tv64.tv_sec > INT_MAX) { + err = -ERANGE; goto err_read; + } #endif err = do_settimeofday64(&tv64);