Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4820006ybg; Tue, 29 Oct 2019 12:53:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+6qbBQAA77aPWpVtT4jJqlnolxGp2Nx/p3ODP02SN/EMHCnTd0q9AN3DbXhm7V0WWjfNN X-Received: by 2002:aa7:cd68:: with SMTP id ca8mr28675955edb.58.1572378830661; Tue, 29 Oct 2019 12:53:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572378830; cv=none; d=google.com; s=arc-20160816; b=05NrWWMva+3BYTDflJCPiHB/y4hW5WQ97gz05Vkvj3BVAAkQM1EPAYLLb3EC5nzEEk MX1n9UidlSc3dHzh9mn39BrbrRNACKhAT1qX5X0QveiQCDqsSnjHpKp72cgUP1rP4Fe4 f2Xv6WkqdJ+fg/TsdI0Oe5DW2T9b852j7LXE7rdqL2L86sIgou21znyCtVf5cQJkua09 PM+QoDRvRMtcGhqWRktrinsu/d+it410NEpPjoSFragbpSQbsvtpDHHR2cG7DZLy2HJe x1zl88B62HT0azW1B0nnnvsT5loLzv6plRmLP1Kxu2YdF9GQYZqRqFyoldwxiRU4PAaN 4eWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=Qhskh4wc8teR6xtXzcAn++gTJwUdAU7oHzbQvPPsHY8=; b=QN4pwDf2zRjTHRCMwHLnukn+ttsSqfkEIpDHr4FMueaY7XiymUJEDIn3z7JSX/Zjnj WOhfWzHb03JGD1q2bZ6q8NgJ/NtdkzD8VX2HB9L46YaJtSxBtAqMQPME8C1XZYNzOoYX 5Iyu/rKBZPXolL0w0TE2Ouu1tFrl6JPA59+ngoKMhq5req0iIZbm15F76wNy0h+oiLGa ZapBsob/U8MXDLqAmVF4yp5fBo37N6K4YOCCNivEobUy+E9aZyur6c5MK/le5pabWYRq ap2P/5aS01nPRBzYPP5CTcCfJp3SfWe5qX0wS8mYeigXOEp2QnQyGKNtMU50MvLz2TuU WCxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w18si3538490ejv.378.2019.10.29.12.53.27; Tue, 29 Oct 2019 12:53:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730057AbfJ2RsQ (ORCPT + 99 others); Tue, 29 Oct 2019 13:48:16 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:57528 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726566AbfJ2RsP (ORCPT ); Tue, 29 Oct 2019 13:48:15 -0400 Received: from localhost (unknown [IPv6:2601:601:9f00:1e2::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 6D6BD14CDECD3; Tue, 29 Oct 2019 10:48:14 -0700 (PDT) Date: Tue, 29 Oct 2019 10:48:14 -0700 (PDT) Message-Id: <20191029.104814.1303198183585893748.davem@davemloft.net> To: colin.king@canonical.com Cc: epomozov@marvell.com, igor.russkikh@aquantia.com, dmitry.bezrukov@aquantia.com, sergey.samoilenko@aquantia.com, netdev@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH][next] net: aquantia: fix unintention integer overflow on left shift From: David Miller In-Reply-To: <20191025115811.20433-1-colin.king@canonical.com> References: <20191025115811.20433-1-colin.king@canonical.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 29 Oct 2019 10:48:14 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin King Date: Fri, 25 Oct 2019 12:58:11 +0100 > From: Colin Ian King > > Shifting the integer value 1 is evaluated using 32-bit > arithmetic and then used in an expression that expects a 64-bit > value, so there is potentially an integer overflow. Fix this > by using the BIT_ULL macro to perform the shift and avoid the > overflow. > > Addresses-Coverity: ("Unintentional integer overflow") > Fixes: 04a1839950d9 ("net: aquantia: implement data PTP datapath") > Signed-off-by: Colin Ian King Applied.