From: Bob Copeland Date: Thu, 28 May 2015 22:44:37 +0000 (-0700) Subject: omfs: fix potential integer overflow in allocator X-Git-Url: https://git.stricted.de/?a=commitdiff_plain;h=5a6b2b36a8249ec9dfb2a714acadad86d9cc0aee;p=GitHub%2FLineageOS%2Fandroid_kernel_motorola_exynos9610.git omfs: fix potential integer overflow in allocator Both 'i' and 'bits_per_entry' are signed integers but the result is a u64 block number. Cast i to u64 to avoid truncation on 32-bit targets. Found by Coverity (CID 200679). Signed-off-by: Bob Copeland Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds --- diff --git a/fs/omfs/bitmap.c b/fs/omfs/bitmap.c index 082234581d05..83f4e76511c2 100644 --- a/fs/omfs/bitmap.c +++ b/fs/omfs/bitmap.c @@ -159,7 +159,7 @@ int omfs_allocate_range(struct super_block *sb, goto out; found: - *return_block = i * bits_per_entry + bit; + *return_block = (u64) i * bits_per_entry + bit; *return_size = run; ret = set_run(sb, i, bits_per_entry, bit, run, 1);