Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp903821yba; Thu, 18 Apr 2019 11:31:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqw5enicwfiL7smiyEl1u8rm0oLAvoK9xpNLlo7ld/6DJFWY7PgY7b84EhRNWyxX7LHjTZRk X-Received: by 2002:a17:902:2b89:: with SMTP id l9mr7338611plb.329.1555612287667; Thu, 18 Apr 2019 11:31:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555612287; cv=none; d=google.com; s=arc-20160816; b=s/VAbUjCgefe6BcCNvDaQXUys4mN8MHP5N/EzoYs/fkJvoXPdcj0miu9saixpip+cp rE+C41+55BJreX/FPC2aF3ZcOL1Gh/Q0P9T6MIEZ2x/g/DEkRrDUr9DHC1MJi0I2fiHc 4LF2zGnZuUUTIu0fmE/KpnoNpQEwFubT/nnVjMZBnY1cUZdRl9SqCbPZ72n6jnepkvSc hliqxJ/I+FHz1oOp8qH79dCCSiLl6C5RBQ85B3b4lD0cuk0cAZfgAH4KnQvnGojCJ4R9 scwUUmiuEdzLiSblH/hQCPIFTVXR99kOzLTQINMk6rqIHmHZ6IQxPL3jSOUwQhQ7fBSV qwmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=x1EjwxQtxKUJmKthf8HsyUEhKrn+F5ZmrvAPvq3ahCc=; b=Wd1zmYfdrxU3ydaAbqlOvY3EfnqRmM218toMZpdKZ4Ws9aJskGMvserf24XQ1C8+aa 4nYFzwZC7ssNzHCh/e8rrjUl2xvEuTq1mSO9Ba13w5q9FE+oP1awZ9648krYiynqbpvT KA6tF3Ws+OPGGaAPzuyiy70V8KoHGkM0HHXt3zoEbp59d6K1DJ/qHLDpEFBCHQXQ+Zle DXSGyCydXqHRa2GuljbMF2RsmSo87GFILTN0kVWsb5mYg1L+I6c39jDmckELDHyvdmRJ UN3OiUQ9x+briQqjR5gz6DAAPqtu3BTzBL6KnM8b5ahKty7GZHjydCxi0uHDeZlxi1lC 0hQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="2leX578/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m26si1653315pgd.536.2019.04.18.11.31.12; Thu, 18 Apr 2019 11:31:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="2leX578/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390623AbfDRSBt (ORCPT + 99 others); Thu, 18 Apr 2019 14:01:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:57674 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390620AbfDRSBq (ORCPT ); Thu, 18 Apr 2019 14:01:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D9B1E218A6; Thu, 18 Apr 2019 18:01:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610506; bh=kCJt3JwqNdm3aevF7O44+VDGjeLz5bsxXkboIaqkkII=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2leX578/9TMJsJzfkNNNI78dhNcPgKDu1vsF2356jXz2N/ZL52LiVEUViUIzAYibJ F247PZDTnXXE6jFSFgQSoiFKDe3BDnh1ZsrtvwOaHDvHqko1ZpgG00kIh2ZuPXZz1R aifV18i3TJdh+DT2Vp+NKKVpIopjpejS78PebO0o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Rohit kumar , Mark Brown , Sasha Levin Subject: [PATCH 4.19 059/110] ASoC: Fix UBSAN warning at snd_soc_get/put_volsw_sx() Date: Thu, 18 Apr 2019 19:56:48 +0200 Message-Id: <20190418160444.116463393@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160437.484158340@linuxfoundation.org> References: <20190418160437.484158340@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit ae7d1247d8673ebfd686b17e759d4be391165368 ] In functions snd_soc_get_volsw_sx() or snd_soc_put_volsw_sx(), if the result of (min + max) is negative, then fls() returns signed integer with value as 32. This leads to signed integer overflow as complete operation is considered as signed integer. UBSAN: Undefined behaviour in sound/soc/soc-ops.c:382:50 signed integer overflow: -2147483648 - 1 cannot be represented in type 'int' Call trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xec/0x158 lib/dump_stack.c:51 [] ubsan_epilogue+0x18/0x50 lib/ubsan.c:164 [] handle_overflow+0xf8/0x130 lib/ubsan.c:195 [] __ubsan_handle_sub_overflow+0x34/0x44 lib/ubsan.c:211 [] snd_soc_get_volsw_sx+0x1a8/0x1f8 sound/soc/soc-ops.c:382 Typecast the operation to unsigned int to fix the issue. Signed-off-by: Rohit kumar Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- sound/soc/soc-ops.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/soc/soc-ops.c b/sound/soc/soc-ops.c index 592efb370c44..f4dc3d445aae 100644 --- a/sound/soc/soc-ops.c +++ b/sound/soc/soc-ops.c @@ -373,7 +373,7 @@ int snd_soc_get_volsw_sx(struct snd_kcontrol *kcontrol, unsigned int rshift = mc->rshift; int max = mc->max; int min = mc->min; - unsigned int mask = (1 << (fls(min + max) - 1)) - 1; + unsigned int mask = (1U << (fls(min + max) - 1)) - 1; unsigned int val; int ret; @@ -418,7 +418,7 @@ int snd_soc_put_volsw_sx(struct snd_kcontrol *kcontrol, unsigned int rshift = mc->rshift; int max = mc->max; int min = mc->min; - unsigned int mask = (1 << (fls(min + max) - 1)) - 1; + unsigned int mask = (1U << (fls(min + max) - 1)) - 1; int err = 0; unsigned int val, val_mask, val2 = 0; -- 2.19.1