Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3910373ybz; Mon, 4 May 2020 11:59:32 -0700 (PDT) X-Google-Smtp-Source: APiQypKIlsd09XPhVID28LiGXMadu3CIj3N3+Qy3aqmeBdVP8UMay6gGR8IqVGb7gfyJF8k9xSbD X-Received: by 2002:a17:906:8611:: with SMTP id o17mr15962202ejx.221.1588618771946; Mon, 04 May 2020 11:59:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588618771; cv=none; d=google.com; s=arc-20160816; b=XSqwyI1oZbx8m1I62oXIRJljxwUlol1VeP5TqTuehsncOMrpThuvqsQW1u7J2IQTp/ 2JXecbKnoDNRTtRscLHQaOPjH/y8GxE8VQR5g8hshq22xg1WSV4rtr9IrbPzTt1aORSX OEsYGCQdxt/By6+r4q9TiiaIeEyF1hhI/ktwwQdDHQbr6OIIvzN0mpEgLaEgxAgp0Ndp V8rwdV0RnTccD29U7f5qZbwNEBXjBKnLQd1WLLFKc80G5l0nej59igt32WsZbjS8b7fM xE4fqAEKb4e7KQA9DLf7U5JOwdleL093xqId0vXqzjvuT9StVrKbXbIMkKTy10YsSBee mrNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=Rd5yevducwGuM8kjdVzQjfrDbw2S4XRDOd9iBe/u3Ys=; b=K6lMo6D7JgrOQGZ6CjyWfnemHqR6qZLSiMPxSdSlbWp+emWCDRdCWw8er9NyykZjAW 2ZUX9cLQH/XjD0liaz6PpcXsMKogCZ9LT1AcSuTVQmBpjcBr79gQo83zHPOWeOq0YJ+h r1e803CW5Ryig2YHwtkul+JaPXiBSd8yInkDQaMh4b+kLmQ+S/CHhQ/HOxnBB5Zd80Gs wxK+xJWmsboraCOLbM6FJFL1Ice/BcXBKnJLFF+nMWrIC+GuN9DmP9UnXuGzcu5ziEcO F58b3rFYAdZbh1NkLcyWB65pmpNv5DYR2tRWl2qlZwowrXqMO1F5z0jaxPKIsK3sdDVN nnxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c10si7484661eds.107.2020.05.04.11.59.08; Mon, 04 May 2020 11:59:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726660AbgEDS5k (ORCPT + 99 others); Mon, 4 May 2020 14:57:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37770 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1725956AbgEDS5j (ORCPT ); Mon, 4 May 2020 14:57:39 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9542C061A0E; Mon, 4 May 2020 11:57:39 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 2B69711F5F61A; Mon, 4 May 2020 11:57:39 -0700 (PDT) Date: Mon, 04 May 2020 11:57:38 -0700 (PDT) Message-Id: <20200504.115738.1197878174801820355.davem@davemloft.net> To: colin.king@canonical.com Cc: peppe.cavallaro@st.com, alexandre.torgue@st.com, joabreu@synopsys.com, mcoquelin.stm32@gmail.com, netdev@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] net: stmmac: gmac5+: fix potential integer overflow on 32 bit multiply From: David Miller In-Reply-To: <20200501141016.290699-1-colin.king@canonical.com> References: <20200501141016.290699-1-colin.king@canonical.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 04 May 2020 11:57:39 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin King Date: Fri, 1 May 2020 15:10:16 +0100 > From: Colin Ian King > > The multiplication of cfg->ctr[1] by 1000000000 is performed using a > 32 bit multiplication (since cfg->ctr[1] is a u32) and this can lead > to a potential overflow. Fix this by making the constant a ULL to > ensure a 64 bit multiply occurs. > > Fixes: 504723af0d85 ("net: stmmac: Add basic EST support for GMAC5+") > Addresses-Coverity: ("Unintentional integer overflow") > Signed-off-by: Colin Ian King Applied.