From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D59AFC433F5 for ; Mon, 25 Oct 2021 06:11:55 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 9B4386023D for ; Mon, 25 Oct 2021 06:11:55 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 9B4386023D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=KQ7RDxklyZK56s2jyRFOxLFQ1Rv7J1kQlNuK+wFcqXQ=; b=UksLw/rPQCb0Zi nzzYZKUpwUsSPn5sfTq9retusNDPrMFFlQMkGpskgBHxDMIw4CVVUSZ7VPPY8iRDBxoTkXLASD1t4 lbSf7F/sdulg7in55xIhAmSwA5drxJp+6RJZZdWOp0kzYgGlJkd5H/qPfkV3EF0BF2tdLHmVv9c15 xTqLgT7CIIfBexii59irnN9ytINwGBz6xjn8msPvrdwJAy7pRCiC0nIJS2JJEpceYE/JJ/djnwMZ0 vARy2rLM4aoIWgmmj8zu35PDJbS7Fzl1x9gquskimyXiP6TtrwIUeV7LbRyhTZh1BLw7ATvMMjhnQ IRLKW50Ot6qjF5CE0G7Q==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1metBx-00FN0F-Bj; Mon, 25 Oct 2021 06:10:41 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1metBu-00FMzb-3X for linux-arm-kernel@lists.infradead.org; Mon, 25 Oct 2021 06:10:39 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id C06936023D; Mon, 25 Oct 2021 06:10:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1635142237; bh=htjBfDAv/fbf9E0uZNabYl3KsNaiUTRrvgCjUk0Ec04=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=E3HGJ0X8Z47zZOrQl2+GK+0V+9R/+ONSk8UadSPQPRsIsmBG9tOD5J3OpeEQLQjJ9 V7TdkbUSu3FunLXNCpguIwBT32gNlXNzzD/ITEH+rZM7ny79nLeZVQ6QdH1U1xzyg5 mOGgAAnwcZcZsW+Fc8uNgjGG0e5CALTsHz+DToeI4If+z7O+ZbeHyDiTASlldfH3Bq u675CeNJSwy8sUtgrTVh0s+a2Q9w0zL0eJBlbesH0YInqz/8VUAeW2amStkvP2rKQV f4ji8KJo3V8+jle0AmnxCQ8CcGZ1fnq78Zk6tonne7PLOcHw/yig3Q97nP26Zk8VOU R2UlzFJbr0Wdw== Date: Mon, 25 Oct 2021 11:40:33 +0530 From: Vinod Koul To: Harini Katakam Cc: romain.perier@gmail.com, allen.lkml@gmail.com, yukuai3@huawei.com, dmaengine@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, harinikatakamlinux@gmail.com, michal.simek@xilinx.com, radhey.shyam.pandey@xilinx.com, shravya.kumbham@xilinx.com Subject: Re: [PATCH 1/4] dmaengine: zynqmp_dma: Typecast the variable to handle overflow Message-ID: References: <20210914082817.22311-1-harini.katakam@xilinx.com> <20210914082817.22311-2-harini.katakam@xilinx.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20210914082817.22311-2-harini.katakam@xilinx.com> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211024_231038_187390_82E12220 X-CRM114-Status: GOOD ( 16.37 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 14-09-21, 13:58, Harini Katakam wrote: > From: Shravya Kumbham > > In zynqmp_dma_alloc/free_chan_resources functions there is a > potential overflow in the below expressions. > > dma_alloc_coherent(chan->dev, (2 * chan->desc_size * > ZYNQMP_DMA_NUM_DESCS), > &chan->desc_pool_p, GFP_KERNEL); > > dma_free_coherent(chan->dev,(2 * ZYNQMP_DMA_DESC_SIZE(chan) * > ZYNQMP_DMA_NUM_DESCS), > chan->desc_pool_v, chan->desc_pool_p); > > The arguments desc_size and ZYNQMP_DMA_NUM_DESCS are 32 bit. Though > this overflow condition is not observed but it is a potential problem > in the case of 32-bit multiplication. Hence fix it by using typecast. > > Addresses-Coverity: Event overflow_before_widen. > Signed-off-by: Shravya Kumbham Patch was sent by Harini Katakam and SOB not available for person sending this patch, sorry cant accept it with s-o-b... > Reviewed-by: Radhey Shyam Pandey > --- > drivers/dma/xilinx/zynqmp_dma.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/dma/xilinx/zynqmp_dma.c b/drivers/dma/xilinx/zynqmp_dma.c > index 5fecf5aa6e85..2d0eba25739d 100644 > --- a/drivers/dma/xilinx/zynqmp_dma.c > +++ b/drivers/dma/xilinx/zynqmp_dma.c > @@ -490,7 +490,8 @@ static int zynqmp_dma_alloc_chan_resources(struct dma_chan *dchan) > } > > chan->desc_pool_v = dma_alloc_coherent(chan->dev, > - (2 * chan->desc_size * ZYNQMP_DMA_NUM_DESCS), > + ((size_t)(2 * chan->desc_size) * > + ZYNQMP_DMA_NUM_DESCS), > &chan->desc_pool_p, GFP_KERNEL); > if (!chan->desc_pool_v) > return -ENOMEM; > @@ -677,7 +678,8 @@ static void zynqmp_dma_free_chan_resources(struct dma_chan *dchan) > zynqmp_dma_free_descriptors(chan); > spin_unlock_irqrestore(&chan->lock, irqflags); > dma_free_coherent(chan->dev, > - (2 * ZYNQMP_DMA_DESC_SIZE(chan) * ZYNQMP_DMA_NUM_DESCS), > + ((size_t)(2 * ZYNQMP_DMA_DESC_SIZE(chan)) * > + ZYNQMP_DMA_NUM_DESCS), > chan->desc_pool_v, chan->desc_pool_p); > kfree(chan->sw_desc_pool); > pm_runtime_mark_last_busy(chan->dev); > -- > 2.17.1 -- ~Vinod _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel