Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3901184pxf; Mon, 29 Mar 2021 15:00:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy1BGqdRByKZz7SyV95UQDhilMZYVgZXSQllDg+laEbnDB1lnZpkLJwaPBZVO/b5jXnUcu0 X-Received: by 2002:a17:906:d554:: with SMTP id cr20mr30828150ejc.61.1617055243607; Mon, 29 Mar 2021 15:00:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617055243; cv=none; d=google.com; s=arc-20160816; b=mXak0JKBBOM0086uENyLvV1Q9zCla1/kuAWKMCpmZoyBDcx/oL+ez1qW7kJzpwDYaX UZYRKzwdj1SKdiCHFD5ywoKWiS1DqN4qsJgTdBvkedvIsCNy0LS19cotFxNXlgzp89V+ xGQte1MipFadXNPy6SDsf0OBvQ+qkIJ5Iw9cItt0vvuJutxHLuq4xei+zsG67MZtrFDB hZxYm4vI1f7Jhc1U3v3rYjufMUc4Uv9c5e9EB5/+NrL4LZULIIfCULSU4FwQqFDAXaI5 7tBAPc8furuNnWvcOABBds4R5ttZcheI8KDLotSrbSO4JP2E+Etv2/FNQq/BIHgC0c/2 i+Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=35uFTEY4fZgLPPw+4VSNQ8LdH452lWCZ/Wv9+GcRaQw=; b=045Tyv7Wwg6ddqFLHvApkVIiCWIPo2kD82xLPbN9WmHj5kP13AoRNqAr09NUyDbOZe hhOOS+5dkOqpR5FxEHRAdrkkTROXa0pGUR32bNmuvlc9oew+Oud88PDTfawHKpJbGT12 V0cT/gfiD9+OVRl3S2ORbvAPvAy9LeKm2htaO+5Gfi+AXeKOz6mg+e5LeMQH8VTagXi5 Sm0zYMLOtRRTHlSuXMsDNJpekEAd0Pt3UXga9tGA9+liYCQ3OQvwafoP4EI4cePps0we emN5KZZzjTTyQQ71EKS1lB8DM8HoWk8rz+Kn7WrVSpJRg2xg+aNA6R/AilDCmtiXdpoy BZ9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h98V8oc5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si12354671edc.19.2021.03.29.15.00.20; Mon, 29 Mar 2021 15:00:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h98V8oc5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230444AbhC2V6b (ORCPT + 99 others); Mon, 29 Mar 2021 17:58:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:40450 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230089AbhC2V6Q (ORCPT ); Mon, 29 Mar 2021 17:58:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8A41961481; Mon, 29 Mar 2021 21:58:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1617055096; bh=ARxgytYYbc0pvxc9szjy73NYkLMwf11cpxbHeU690ek=; h=Date:From:To:Cc:Subject:From; b=h98V8oc5H1o6eE1RXoALvixBgKafkpcm1VRxrmrZ6JUKku0TJrda1xJ3kceLyC5GH qUJL+1jA1R8MU0Bc7lrZ5JSP9qGhDOzhgBT5pEo+ghLHMviMBYNWeRIaw8rR2tfkvt //2qQHgek3RMySa78iHvsFqdHpSI8ziiu30jte3k6bLXDhQsCZyay7SMsn0ej3bpLt l9caVojhwOn/b+e2vfdxlgS5sf8xb6qMWaacFIbNSBszLt54AOWuKwWdWCRQRV8MwU lkD5lxlHxqYh8ExIx1RDr4gLUIxEtYi7I2jF/ChILUnh2qG7/QL57dLeqY7TwBo8dY VHrWGDAfhA9aQ== Date: Mon, 29 Mar 2021 15:58:17 -0500 From: "Gustavo A. R. Silva" To: Jonathan Cameron , Lars-Peter Clausen Cc: linux-iio@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" Subject: [PATCH][next] iio: hrtimer-trigger: Fix potential integer overflow in iio_hrtimer_store_sampling_frequency Message-ID: <20210329205817.GA188755@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add suffix ULL to constant 1000 in order to avoid a potential integer overflow and give the compiler complete information about the proper arithmetic to use. Notice that this constant is being used in a context that expects an expression of type unsigned long long, but it's currently evaluated using 32-bit arithmetic. Addresses-Coverity-ID: 1503062 ("Unintentional integer overflow") Fixes: dafcf4ed8392 ("iio: hrtimer: Allow sub Hz granularity") Signed-off-by: Gustavo A. R. Silva --- drivers/iio/trigger/iio-trig-hrtimer.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/iio/trigger/iio-trig-hrtimer.c b/drivers/iio/trigger/iio-trig-hrtimer.c index 51e362f091c2..716c795d08fb 100644 --- a/drivers/iio/trigger/iio-trig-hrtimer.c +++ b/drivers/iio/trigger/iio-trig-hrtimer.c @@ -63,7 +63,7 @@ ssize_t iio_hrtimer_store_sampling_frequency(struct device *dev, if (integer < 0 || fract < 0) return -ERANGE; - val = fract + 1000 * integer; /* mHz */ + val = fract + 1000ULL * integer; /* mHz */ if (!val || val > UINT_MAX) return -EINVAL; -- 2.27.0