net: lio_core: fix potential sign-extension overflow on large shift
authorColin Ian King <colin.king@canonical.com>
Mon, 17 Jun 2019 16:12:49 +0000 (17:12 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 21 Jul 2019 07:04:28 +0000 (09:04 +0200)
[ Upstream commit 9476274093a0e79b905f4cd6cf6d149f65e02c17 ]

Left shifting the signed int value 1 by 31 bits has undefined behaviour
and the shift amount oq_no can be as much as 63.  Fix this by using
BIT_ULL(oq_no) instead.

Addresses-Coverity: ("Bad shift operation")
Fixes: f21fb3ed364b ("Add support of Cavium Liquidio ethernet adapters")
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Reviewed-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/net/ethernet/cavium/liquidio/lio_core.c

index 23f6b60030c50897968835c87b5d10bbbada665c..8c16298a252d78dfd52494082e45e02d04c91269 100644 (file)
@@ -854,7 +854,7 @@ static void liquidio_schedule_droq_pkt_handlers(struct octeon_device *oct)
 
                        if (droq->ops.poll_mode) {
                                droq->ops.napi_fn(droq);
-                               oct_priv->napi_mask |= (1 << oq_no);
+                               oct_priv->napi_mask |= BIT_ULL(oq_no);
                        } else {
                                tasklet_schedule(&oct_priv->droq_tasklet);
                        }