Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp403833pxj; Fri, 11 Jun 2021 02:00:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNkzejfKEfe4rGJF6zgeAZizvt3KEjSA9bihJEHxhBXvcO3+l6CE5ePX8rJHQFcNN+K5nT X-Received: by 2002:aa7:da4b:: with SMTP id w11mr2689605eds.272.1623402032428; Fri, 11 Jun 2021 02:00:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623402032; cv=none; d=google.com; s=arc-20160816; b=jb+j/24dcKdQtOO4b2Lk8cenP5hvGNMFUYApXC9so9Q/R0broZK4oIErD8FAzkdQIP vYtPeIr506uOwHVyKx4A4Y+znEmiPiaLafsBs/e5BG/WsTTleQrKG1FHqq5xHOm4qDXD P0uvNsHgA1qtHdlbmv1f6sED6b2vXbMhO8z18UDC6avRGxcCkLpoT738029wD9stkDe7 sG5d9URWhtEY7t0GJtUWQjwhq7xN1+3fx2zIpgD3F/9bvVnRMH2VS3tc5jSBhY6q/mCe l26mH8oSuSrHIemvASwSYqxfHl+5h360kKcCOpGPX1lonN13jQG4gdnAtYGWMJ2+cfau 7VcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=OA5aNrlvTjg8iqdeDfNpP/Yge6b7O8KP1T0KP9Dr1OA=; b=DDLVux9Ks5toPMt2VyaSbIOXsUaiTxvTjHKXGB7GEvXmpr3y260RP9HMbo2KdVpRid DYloalQkdHdURSE19idLrnH8MfgffjHbKCspRdqicYpGX3OYHPZubbpes/HID32/Xo5g qvLHA33lsxC/9b02Atea/gS1FOHtUCFmWmaBfL2L2c+/ZfXmK9KyIY6Pr9aSu3Wl+H0C fqmeF3oQuD8wpKPA12SUJnwHAIgYXTeGcBwFXYzg/TYSgLLHOqebOnkVgisZH/2qeKPF KBogfCISbcO35IT0J0rBPi/ekpHw+0eNmOaXXdpyX6K6yeNJ0KTZM4SremxKjGPoG7MF F55Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 28si4137095ejk.601.2021.06.11.02.00.09; Fri, 11 Jun 2021 02:00:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231322AbhFKI7z (ORCPT + 99 others); Fri, 11 Jun 2021 04:59:55 -0400 Received: from mga18.intel.com ([134.134.136.126]:26241 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231400AbhFKI7y (ORCPT ); Fri, 11 Jun 2021 04:59:54 -0400 IronPort-SDR: ynfCKEroylfuj3xLxWO/YFtcEg+KJNMJfqIzXhbSxii1uVNCwcwRAkWOKOb8l2lwvhHJY4HM4/ qyteXpHfIzlg== X-IronPort-AV: E=McAfee;i="6200,9189,10011"; a="192802163" X-IronPort-AV: E=Sophos;i="5.83,265,1616482800"; d="scan'208";a="192802163" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jun 2021 01:57:56 -0700 IronPort-SDR: npVUMD7Ug39OKV8mQBP2p8S6y05DhCrJgUGROtC6C9qLuGKTFN6wPgCeFaoHpm+9HeH+9XzICC TkH6Yq+ddVOA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.83,265,1616482800"; d="scan'208";a="620329231" Received: from linux.intel.com ([10.54.29.200]) by orsmga005.jf.intel.com with ESMTP; 11 Jun 2021 01:57:56 -0700 Received: from glass.png.intel.com (glass.png.intel.com [10.158.65.69]) by linux.intel.com (Postfix) with ESMTP id E705B5807AA; Fri, 11 Jun 2021 01:57:53 -0700 (PDT) From: Wong Vee Khee To: Giuseppe Cavallaro , Alexandre Torgue , Jose Abreu , "David S . Miller" , Jakub Kicinski , Maxime Coquelin Cc: netdev@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v1 1/1] net: stmmac: Fix potential integer overflow Date: Fri, 11 Jun 2021 17:02:38 +0800 Message-Id: <20210611090238.1157557-1-vee.khee.wong@linux.intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The commit d96febedfde2 ("net: stmmac: arrange Tx tail pointer update to stmmac_flush_tx_descriptors") introduced the following coverity warning:- 1. Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN) overflow_before_widen: Potentially overflowing expression 'tx_q->cur_tx * desc_size' with type 'unsigned int' (32 bits, unsigned) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type dma_addr_t (64 bits, unsigned). Fixed this by assigning tx_tail_addr to dma_addr_t type, as dma_addr_t datatype is decided by CONFIG_ARCH_DMA_ADDR_T_64_BIT. Fixes: d96febedfde2 ("net: stmmac: arrange Tx tail pointer update to stmmac_flush_tx_descriptors") Signed-off-by: Wong Vee Khee --- drivers/net/ethernet/stmicro/stmmac/stmmac.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac.h b/drivers/net/ethernet/stmicro/stmmac/stmmac.h index fd7212afc543..6655cb8e24cf 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac.h +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac.h @@ -75,7 +75,7 @@ struct stmmac_tx_queue { unsigned int cur_tx; unsigned int dirty_tx; dma_addr_t dma_tx_phy; - u32 tx_tail_addr; + dma_addr_t tx_tail_addr; u32 mss; }; -- 2.25.1