Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3116769imu; Mon, 19 Nov 2018 10:52:33 -0800 (PST) X-Google-Smtp-Source: AJdET5d79LV0dIUkKrfgwjwI5wdp6wyepHBq3eJPAIcN6H+jbX2kcVkxSBgqyW5n+7sTqh4SzZYL X-Received: by 2002:a17:902:2dc3:: with SMTP id p61mr21550298plb.166.1542653553654; Mon, 19 Nov 2018 10:52:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542653553; cv=none; d=google.com; s=arc-20160816; b=BpFlvsCoQaD23wuN9LEDV6Bmf/uv0KO3FnG0Pfj3uhTLdyfxQthXH0qwW/0lzBbwpf rDpz0JCxbQz9+OQG8BF0LIg1CwnYc27i1qayLdXP295g7zgo4W0TsGOSaHCwJ//sxAbj J1sQ9chMmz0jGlkHKrdGd1u1B3+mq+aes76jJ4ATRtszhhz2I2kdixKQueiPr5QcYpYU fayKwYx0uEhxf9UK4zXLh75DvApoRVm5ICqF0gPxT74bTdSpEzHpYGv95bBXbfvLKSx6 JzLNID52zQDUg8zdNE3wG8lcd4rxz7Yw5v34Wag5fw8V0nsOmw5kmmbmbalL7GF3y8HW 52kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EOK9991/dVql2k1yrSz7W0JLecaPDBWzDV5q6dZn3bM=; b=I6Tl7yXYjtdh8DLqqF9Xp4S9USGpHLVZA0TdmTNDsWmEchNk6lhfV+VBR4tPrGIoqB obF1ADBiWjgUVZw29ahjfJcoreK/UWlsRIEvJTgYceJjDtGSmg82jz4t7hYhAalhskxr ZPUl8yaaA7D478F4c8jwEqSTcgcUEEe/gN9R/7LSIZyN7BTaWWjAYyKYOXT6Kcxq/3U5 2XcMXpkQMEp2y0axILVjwVlzy1ce2/XUiQjjHMC01F4EK5jaz1kKUmLq/1z2WaxyP7sU vkS70cieWKvregBXG/UBF8++S/CKmeE1fA0BoBDgdG6UJiZeMGCS9ADYT560T2H9h5Ox KS0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1uzRp40H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p19si29017816pgj.375.2018.11.19.10.52.17; Mon, 19 Nov 2018 10:52:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1uzRp40H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406143AbeKTD1V (ORCPT + 99 others); Mon, 19 Nov 2018 22:27:21 -0500 Received: from mail.kernel.org ([198.145.29.99]:41264 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405613AbeKTD1U (ORCPT ); Mon, 19 Nov 2018 22:27:20 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1B685214E0; Mon, 19 Nov 2018 17:03:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646983; bh=C3KERM/JNoW9APm78Ov03A+rLZpCuSn/R+41PdHR7zc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1uzRp40HH+Xifz8q7714WpnW9r79GicLgWt4HAaOVKgUuvLP1vBjYFE2LBs5JWgu+ Ddn+b6D8d1ctUX8KyZovam51cfR/G/lEJqzGt+aoQUPCKygW/fy3jj8qtHAE/5hMkh YUbT5G1tKt3BmMZ+bt4uJ3sGSgtdTTxYfcfNokFg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Maciej W. Rozycki" , Alexandre Belloni Subject: [PATCH 4.4 153/160] rtc: hctosys: Add missing range error reporting Date: Mon, 19 Nov 2018 17:29:52 +0100 Message-Id: <20181119162644.217956035@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162630.031306128@linuxfoundation.org> References: <20181119162630.031306128@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Maciej W. Rozycki commit 7ce9a992ffde8ce93d5ae5767362a5c7389ae895 upstream. Fix an issue with the 32-bit range error path in `rtc_hctosys' where no error code is set and consequently the successful preceding call result from `rtc_read_time' is propagated to `rtc_hctosys_ret'. This in turn makes any subsequent call to `hctosys_show' incorrectly report in sysfs that the system time has been set from this RTC while it has not. Set the error to ERANGE then if we can't express the result due to an overflow. Signed-off-by: Maciej W. Rozycki Fixes: b3a5ac42ab18 ("rtc: hctosys: Ensure system time doesn't overflow time_t") Cc: stable@vger.kernel.org # 4.17+ Signed-off-by: Alexandre Belloni Signed-off-by: Greg Kroah-Hartman --- drivers/rtc/hctosys.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/drivers/rtc/hctosys.c +++ b/drivers/rtc/hctosys.c @@ -50,8 +50,10 @@ static int __init rtc_hctosys(void) tv64.tv_sec = rtc_tm_to_time64(&tm); #if BITS_PER_LONG == 32 - if (tv64.tv_sec > INT_MAX) + if (tv64.tv_sec > INT_MAX) { + err = -ERANGE; goto err_read; + } #endif err = do_settimeofday64(&tv64);