Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp451999ybl; Tue, 28 Jan 2020 06:12:32 -0800 (PST) X-Google-Smtp-Source: APXvYqyUjW0t1sodfiKdH6je8FuXh+HHma0xm2jn3HL4ZaKrzVRAuq21Q6JQALv28ZDx2AdsS/D0 X-Received: by 2002:aca:190a:: with SMTP id l10mr3008480oii.56.1580220752073; Tue, 28 Jan 2020 06:12:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220752; cv=none; d=google.com; s=arc-20160816; b=JlLJTBkSw3G6kwxsZC++Ku6jqs2Cvu5XSBT8+ovIg5eqUKK+BvWxnMTTS01X3Jh4kr Hb87/Lx4Fw9DdP5nbRJMoBYP+aGTts3lHeAf9o034WHf35TK5e7xf8fiqqp1PD+lwpl2 UPnw92VmjHnAHoUIJvVfexyiv8I7k+FLGoEZCF9S4x7bRExUiyh4j+tfw5Tj5AvsB3y0 bGGNmRZNoyiFGTXmjoYTy9FDEL4NwFZufMQwlwdfHGgFgYClqxWqVMJif6bMsaKgJPN4 WnHP9Zin2pXfwI6CaHhez0S2r+/sGq8HrKtzgee+aHx9nyWs5XaCBsw5jW74LMjdtGM+ O74Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Z2wCfoVEYxFSLBW7EidMp/vaMKzbnyWs9FNQFFXYx0I=; b=AmLmoWtkYcYjf7I2tSmO4Nte4MxGJnGco5OuJh/75G7pjtbunwRlT4K/h2TFqBWcb2 3bH6I15Ebd4+RLyNqoMU1/isVf98fqNMDjugzXXUANDjmm2neKU1AA2jL/b+KrJ4BoIT MQQ95XiNR/yhhZdRP4tixLro2XmiTPhICQ8aKGfJ+q/0PQxyG6ERKdA2KAb0wL9NCQJi uwXTjE0r5sdh6j3VthMKEim9w/32BCIpr4dY7RkeKYG55VtqmEoDtpZkj3NZXP3pqnx7 IH/key+FuG/IQcRmKzr438VEzFBp+k5a8UkpqbZ3xF1g9q9SjyKFP6pNmpficvvO80Kj eiRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q9NPs1XW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y6si5361416oih.217.2020.01.28.06.12.18; Tue, 28 Jan 2020 06:12:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q9NPs1XW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729139AbgA1OKN (ORCPT + 99 others); Tue, 28 Jan 2020 09:10:13 -0500 Received: from mail.kernel.org ([198.145.29.99]:58872 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729126AbgA1OKM (ORCPT ); Tue, 28 Jan 2020 09:10:12 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5C04324693; Tue, 28 Jan 2020 14:10:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220611; bh=jh53Q/Ozkk8U/82aeS6OkO2XtSpp62JCOjza6w+v6FY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q9NPs1XWNcWAwXTMILLGGxZQMamJKYmEqsxvCiRBGPnQLDY1VtbpLjcTJP8ejgg8N cpAB1SWUogKkee+aC858gsMXLStbYSlrhwfbQ5hbGBPHc7SI++b9lGAcFzSN/tcf0l A9kbMbsrVzADb0vscOZx8oFlcmj341c9V9LVtQeQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Alexandre Belloni , Sasha Levin Subject: [PATCH 4.4 039/183] rtc: ds1672: fix unintended sign extension Date: Tue, 28 Jan 2020 15:04:18 +0100 Message-Id: <20200128135833.915100317@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135829.486060649@linuxfoundation.org> References: <20200128135829.486060649@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King [ Upstream commit f0c04c276739ed8acbb41b4868e942a55b128dca ] Shifting a u8 by 24 will cause the value to be promoted to an integer. If the top bit of the u8 is set then the following conversion to an unsigned long will sign extend the value causing the upper 32 bits to be set in the result. Fix this by casting the u8 value to an unsigned long before the shift. Detected by CoverityScan, CID#138801 ("Unintended sign extension") Fixes: edf1aaa31fc5 ("[PATCH] RTC subsystem: DS1672 driver") Signed-off-by: Colin Ian King Signed-off-by: Alexandre Belloni Signed-off-by: Sasha Levin --- drivers/rtc/rtc-ds1672.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/rtc/rtc-ds1672.c b/drivers/rtc/rtc-ds1672.c index 92b1cbf2c4a76..2bea733b15893 100644 --- a/drivers/rtc/rtc-ds1672.c +++ b/drivers/rtc/rtc-ds1672.c @@ -60,7 +60,8 @@ static int ds1672_get_datetime(struct i2c_client *client, struct rtc_time *tm) "%s: raw read data - counters=%02x,%02x,%02x,%02x\n", __func__, buf[0], buf[1], buf[2], buf[3]); - time = (buf[3] << 24) | (buf[2] << 16) | (buf[1] << 8) | buf[0]; + time = ((unsigned long)buf[3] << 24) | (buf[2] << 16) | + (buf[1] << 8) | buf[0]; rtc_time_to_tm(time, tm); -- 2.20.1