]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
mac80211: fix potential overflow when multiplying to u32 integers
authorColin Ian King <colin.king@canonical.com>
Fri, 5 Feb 2021 17:53:52 +0000 (17:53 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 4 Mar 2021 09:26:17 +0000 (10:26 +0100)
[ Upstream commit 6194f7e6473be78acdc5d03edd116944bdbb2c4e ]

The multiplication of the u32 variables tx_time and estimated_retx is
performed using a 32 bit multiplication and the result is stored in
a u64 result. This has a potential u32 overflow issue, so avoid this
by casting tx_time to a u64 to force a 64 bit multiply.

Addresses-Coverity: ("Unintentional integer overflow")
Fixes: 050ac52cbe1f ("mac80211: code for on-demand Hybrid Wireless Mesh Protocol")
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Link: https://lore.kernel.org/r/20210205175352.208841-1-colin.king@canonical.com
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
net/mac80211/mesh_hwmp.c

index aa5150929996d609ccf8075465e12c70dbd9fc18..b5b728a71ab53559e8d969878a78c92eac1123ad 100644 (file)
@@ -356,7 +356,7 @@ u32 airtime_link_metric_get(struct ieee80211_local *local,
         */
        tx_time = (device_constant + 10 * test_frame_len / rate);
        estimated_retx = ((1 << (2 * ARITH_SHIFT)) / (s_unit - err));
-       result = (tx_time * estimated_retx) >> (2 * ARITH_SHIFT);
+       result = ((u64)tx_time * estimated_retx) >> (2 * ARITH_SHIFT);
        return (u32)result;
 }