Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4100286pxb; Mon, 8 Feb 2021 07:58:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJz3ZCge64cQtOSyoGB+lnnvxqR7SSLupMTRKsmgnAI4J/zL+CFJQaE8N1O4A8pFV12LsgdP X-Received: by 2002:a17:907:210d:: with SMTP id qn13mr17268857ejb.377.1612799937446; Mon, 08 Feb 2021 07:58:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612799937; cv=none; d=google.com; s=arc-20160816; b=wieoRKX47BEU/243jIpVgTnuqn+K2OPaCPzJQqlbpEZTcgRfRWVkN8Y6cAk4EdlBEn OUDy5u30sMoYin2PXQXT4hGvG33P35hj14Vn3hU7BfF5cOhDAPFCLPcW+FoD7C41HvgW z6cVZ1Uf/vpdv7SJOx4KRdV7yYg0zcZIWCmIPxPG/C7GEfKhnQuy7FMOa9KDCPg8K7Rv KsCkFWpLfiYepbJ0PP//Ux/H4zWPwC3LgLgT2Mpk9XMpZMaBMsDcx3qhc9FSJ9OYYKuW SBvgtGbb4PKXcHKp0INnPpsLcj7zK6WaQiSFEi7H5idJy4UpSwxtOvVpCvDpCEmfauN0 ZHGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=45INdP2plfzPy7vbKBs5+wiLnTm6KyNcwl9X7P2Rf4I=; b=AJVdyOPqsJ34ZFjSl/IwIkEIyKBPzWCj916yroalLqN4YU9omKxp0OfCe9Q5w7i4V6 YzuHMjyTJ5xLafvMI5J8gr4YTf7VHv9+MkaOUEivcn5EwQ/dtO6zpiUrrdJw9k0Pjr6R J3vWm9bodYwtnL60al+SrkDYAm5MtnKo479Ah1bMhbQGlm5Hfi4eXe6ZlIVtZD+lDWEy f9SMCoYbVCt+d6forrnAlHcbli0G4B4bPWf/JUACTDx7Nepe/NLW53ZWaiqiwiQFp/bG HKWXHsG5vC0+0XWS8AI16/JzFEi1BBeOXcC8xdiw/zRDTK4AFIfwSSUkZCEWuqAbylZa CmFw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i8si4694290edg.104.2021.02.08.07.58.23; Mon, 08 Feb 2021 07:58:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234247AbhBHP5r (ORCPT + 99 others); Mon, 8 Feb 2021 10:57:47 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:58387 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230442AbhBHPIY (ORCPT ); Mon, 8 Feb 2021 10:08:24 -0500 Received: from 1.general.cking.uk.vpn ([10.172.193.212]) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1l988U-0002fU-6W; Mon, 08 Feb 2021 15:07:34 +0000 Subject: Re: [PATCH] HID: logitech-dj: fix unintentional integer overflow on left shift To: Dan Carpenter Cc: Jiri Kosina , Benjamin Tissoires , Nestor Lopez Casado , linux-input@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org References: <20210207232120.8885-1-colin.king@canonical.com> <20210208150610.GI2696@kadam> From: Colin Ian King Message-ID: <7f79107a-93ad-251d-33bd-9a2cf2748aa9@canonical.com> Date: Mon, 8 Feb 2021 15:07:33 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <20210208150610.GI2696@kadam> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/02/2021 15:06, Dan Carpenter wrote: > On Sun, Feb 07, 2021 at 11:21:20PM +0000, Colin King wrote: >> From: Colin Ian King >> >> Shifting the integer value 1 is evaluated using 32-bit rithmetic >> and then used in an expression that expects a 64-bit value, so >> there is potentially an integer overflow. Fix this by using th >> BIT_ULL macro to perform the shift and avoid the overflow. >> >> Addresses-Coverity: ("Uninitentional integer overflow") >> Fixes: 534a7b8e10ec ("HID: Add full support for Logitech Unifying receivers") >> Signed-off-by: Colin Ian King >> --- >> drivers/hid/hid-logitech-dj.c | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/drivers/hid/hid-logitech-dj.c b/drivers/hid/hid-logitech-dj.c >> index 45e7e0bdd382..747f41be0603 100644 >> --- a/drivers/hid/hid-logitech-dj.c >> +++ b/drivers/hid/hid-logitech-dj.c >> @@ -1035,7 +1035,7 @@ static void logi_dj_recv_forward_null_report(struct dj_receiver_dev *djrcv_dev, >> memset(reportbuffer, 0, sizeof(reportbuffer)); >> >> for (i = 0; i < NUMBER_OF_HID_REPORTS; i++) { > ^^^^^^^^^^^^^^^^^^^^^ > This is 32, so it can't be undefined. Urgh, looks like coverity is being overly pedantic here. :-( > >> - if (djdev->reports_supported & (1 << i)) { >> + if (djdev->reports_supported & BIT_ULL(i)) { >> reportbuffer[0] = i; >> if (hid_input_report(djdev->hdev, >> HID_INPUT_REPORT, > > regards, > dan carpenter >