Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp807925pxf; Thu, 18 Mar 2021 12:02:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzL2nGPEMfvt9Jdln5jgMJZw/v/ZZeH5jWceJlzI1L7fy6j6zrLVrymKz9JYSkg4ct1Nxtm X-Received: by 2002:a17:906:6a06:: with SMTP id o6mr64489ejr.306.1616094172230; Thu, 18 Mar 2021 12:02:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616094172; cv=none; d=google.com; s=arc-20160816; b=oUni3G5nK8VgzYOGmrBiuYjnb5MpkTlX+g5I/Hsk8nQlTYU+rwQv3lA4FH9l1THCAa vUqY7FMxEj2287vY9AqmMuN/FIdZ21UNc7lv3zFFgziyjTHhArYQ4918IIph7OFHjaQX suNa7PsxceHoIS5UaBJ1ynrjMZ42/Vb/sw+JppbQJEv5viSGBji0E/rxbOjmCRkv+9yp aFz1p5pWXcm8ExuEoreT3dxrCCf8WZLW1Y9OAuvzszd5Hw+ov9igGfl5tqctBahzLZ7s aXqvO65o3lIzj+r+DzS3sx5OW09fWl/eE72xu9inxrWrxQqyEMBDsdy3MrZbbzRnLLjA qFgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=ndTWQxWMaQ8uWEc77N/kRP4OQQx2E++l4s9Oim2oRcU=; b=IvEaNyQT4ba5uW1lSdjcqvveANKB3bDgxzPu6OjQsBWZYj+thCEQLAKTrKcp4lnu/j t9QxlQYv20FxCD0hSRm5rSTTLsCPjtOj6RAgpVb11cP81LfKEyZARo62bNy2VJXR4RNL qeawn/QPaHp5OaIz+0nnpSr8kT0gLPfTUA6IgWrzdH20pUkXJ0FQ3O7kra3ASk+FsZms 7OfVCsY69TVCO4VxYYFJxls8P8WQQFqmehN1s2xe9D9AWDd3yQvHo0oVmtK1B82c/+Lo f8CCfiVSumEmNxY+Q0jmqSv0PRGjArkK6Sd6HUvsdSf3g/KyfOsSO6EbqlQpe+6N0Bas q98Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hc17si2376254ejc.480.2021.03.18.12.02.29; Thu, 18 Mar 2021 12:02:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231496AbhCRS5s (ORCPT + 99 others); Thu, 18 Mar 2021 14:57:48 -0400 Received: from mail-oi1-f179.google.com ([209.85.167.179]:41518 "EHLO mail-oi1-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232674AbhCRS50 (ORCPT ); Thu, 18 Mar 2021 14:57:26 -0400 Received: by mail-oi1-f179.google.com with SMTP id z15so2048420oic.8; Thu, 18 Mar 2021 11:57:26 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ndTWQxWMaQ8uWEc77N/kRP4OQQx2E++l4s9Oim2oRcU=; b=RCAfxJD8I6uJ659FMEmGiLLlMgjBemPAymZUdNYUMlwFoFdkn4noS+M/H4+as5feDB fmhH1tmfZAIisk5K2TFaA3vbcuHQqVcWmGTW1NCPhGfAaxv4/MVIArUcBOZopso0Vb3s Zy2S/Di3qjgmp9aCLbRo9odjbCsA9ByIpVyVoyl0KO2FGwt9BnVc/jn+3R/iNnjkmtFl kgOiHpC5uYbGh7zKTKmC1lACGob9OK4fpuYNo5+Bsu1fMhtmuKkphCfwCciE4V+FRKL2 yZJJm/oxrKXldGjDYYrGYO1CXltkCHQYobG4DBYWv9+7rP6a9r7dgrpGOoRH6cGKYmRA m1vA== X-Gm-Message-State: AOAM531jT4m/HcszVbAhdHxc+nzpkw7elWHfJsMJWYhDc3EzTCXDCuFA uWgC4lGtC/0bDhYK5zj/4Lm0xe6hMb5vSzJOreMsfIhJ X-Received: by 2002:aca:5fc3:: with SMTP id t186mr3977844oib.69.1616093846293; Thu, 18 Mar 2021 11:57:26 -0700 (PDT) MIME-Version: 1.0 References: <20210207224648.8137-1-colin.king@canonical.com> In-Reply-To: <20210207224648.8137-1-colin.king@canonical.com> From: "Rafael J. Wysocki" Date: Thu, 18 Mar 2021 19:57:14 +0100 Message-ID: Subject: Re: [PATCH] PM / Domains: Fix integer overflows on u32 bit multiplies To: Colin King Cc: "Rafael J . Wysocki" , Kevin Hilman , Ulf Hansson , Pavel Machek , Len Brown , Greg Kroah-Hartman , Marc Titinger , Lina Iyer , Linux PM , kernel-janitors@vger.kernel.org, Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Feb 7, 2021 at 11:47 PM Colin King wrote: > > From: Colin Ian King > > There are three occurrances of u32 variables being multiplied by > 1000 using 32 bit multiplies and the result being assigned to a > 64 bit signed integer. These can potentially lead to a 32 bit > overflows, so fix this by casting 1000 to a UL first to force > a 64 bit multiply hence avoiding the overflow. > > Addresses-Coverity: ("Unintentional integer overflow") > Fixes: 30f604283e05 ("PM / Domains: Allow domain power states to be read from DT") > Signed-off-by: Colin Ian King > --- > drivers/base/power/domain.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/drivers/base/power/domain.c b/drivers/base/power/domain.c > index aaf6c83b5cf6..ddeff69126ff 100644 > --- a/drivers/base/power/domain.c > +++ b/drivers/base/power/domain.c > @@ -2831,10 +2831,10 @@ static int genpd_parse_state(struct genpd_power_state *genpd_state, > > err = of_property_read_u32(state_node, "min-residency-us", &residency); > if (!err) > - genpd_state->residency_ns = 1000 * residency; > + genpd_state->residency_ns = 1000UL * residency; Wouldn't it be better to use NSEC_PER_USEC here and below? > > - genpd_state->power_on_latency_ns = 1000 * exit_latency; > - genpd_state->power_off_latency_ns = 1000 * entry_latency; > + genpd_state->power_on_latency_ns = 1000UL * exit_latency; > + genpd_state->power_off_latency_ns = 1000UL * entry_latency; > genpd_state->fwnode = &state_node->fwnode; > > return 0; > -- > 2.29.2 >