diff options
author | Colin Ian King <colin.king@canonical.com> | 2019-06-25 00:46:08 +0300 |
---|---|---|
committer | Jason Gunthorpe <jgg@mellanox.com> | 2019-06-25 16:18:19 +0300 |
commit | 7ef7587541d49c6de1c9650c3c819a7fdd7ade66 (patch) | |
tree | c55d61a57c3b04e2c26686e1202056667971a7e9 /lib/fault-inject.c | |
parent | 7796d2a3bb4037f9c51b8d91d059f1d690ed301f (diff) | |
download | linux-7ef7587541d49c6de1c9650c3c819a7fdd7ade66.tar.xz |
RDMA/hns: fix potential integer overflow on left shift
There is a potential integer overflow when int i is left shifted as this
is evaluated using 32 bit arithmetic but is being used in a context that
expects an expression of type dma_addr_t. Fix this by casting integer i
to dma_addr_t before shifting to avoid the overflow.
Addresses-Coverity: ("Unintentional integer overflow")
Fixes: 2ac0bc5e725e ("RDMA/hns: Add a group interfaces for optimizing buffers getting flow")
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
Diffstat (limited to 'lib/fault-inject.c')
0 files changed, 0 insertions, 0 deletions