]> git.baikalelectronics.ru Git - kernel.git/commitdiff
drivers: thermal: tsens: fix potential integer overflow on multiply
authorColin Ian King <colin.king@canonical.com>
Fri, 1 Nov 2019 10:00:35 +0000 (10:00 +0000)
committerDaniel Lezcano <daniel.lezcano@linaro.org>
Thu, 7 Nov 2019 06:00:26 +0000 (07:00 +0100)
Currently a multiply operation is being performed on two int values
and the result is being assigned to a u64, presumably because the
end result is expected to be probably larger than an int. However,
because the multiply is an int multiply one can get overflow. Avoid
the overflow by casting degc to a u64 to force a u64 multiply.

Also use div_u64 for the divide as suggested by Daniel Lezcano.

Addresses-Coverity: ("Unintentional integer overflow")
Fixes: fbfe1a042cfd ("drivers: thermal: tsens: Add interrupt support")
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Daniel Lezcano <daniel.lezcano@linaro.org>
Reviewed-by: Amit Kucheria <amit.kucheria@linaro.org>
Link: https://lore.kernel.org/r/20191101100035.25502-1-colin.king@canonical.com
drivers/thermal/qcom/tsens-common.c

index 4359a4247ac313a3c0e62a7a79b1b2c7678adb8a..c8d57ee0a5bb2c1643d6fcfc86b2163117cafee3 100644 (file)
@@ -92,7 +92,7 @@ void compute_intercept_slope(struct tsens_priv *priv, u32 *p1,
 
 static inline u32 degc_to_code(int degc, const struct tsens_sensor *s)
 {
-       u64 code = (degc * s->slope + s->offset) / SLOPE_FACTOR;
+       u64 code = div_u64(((u64)degc * s->slope + s->offset), SLOPE_FACTOR);
 
        pr_debug("%s: raw_code: 0x%llx, degc:%d\n", __func__, code, degc);
        return clamp_val(code, THRESHOLD_MIN_ADC_CODE, THRESHOLD_MAX_ADC_CODE);