On Thu, Jun 18, 2020 at 11:04:00AM +0100, Colin King wrote: > From: Colin Ian King <colin.king@xxxxxxxxxxxxx> Hi Colin, > > Shifting the integer value 1 is evaluated using 32-bit arithmetic > and then used in an expression that expects a long value leads to > a potential integer overflow. I'm afraid this explanation makes no sense to me. Do you care to explain better what you think the issue is? If the shift is done as 32-bit arithmetic and then promoted to long how does the overflow happen? Best regards, Liviu > Fix this by using the BIT macro to > perform the shift to avoid the overflow. > > Addresses-Coverity: ("Unintentional integer overflow") > Fixes: ad49f8602fe8 ("drm/arm: Add support for Mali Display Processors") > Signed-off-by: Colin Ian King <colin.king@xxxxxxxxxxxxx> > --- > drivers/gpu/drm/arm/malidp_planes.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/gpu/drm/arm/malidp_planes.c b/drivers/gpu/drm/arm/malidp_planes.c > index 37715cc6064e..ab45ac445045 100644 > --- a/drivers/gpu/drm/arm/malidp_planes.c > +++ b/drivers/gpu/drm/arm/malidp_planes.c > @@ -928,7 +928,7 @@ int malidp_de_planes_init(struct drm_device *drm) > const struct malidp_hw_regmap *map = &malidp->dev->hw->map; > struct malidp_plane *plane = NULL; > enum drm_plane_type plane_type; > - unsigned long crtcs = 1 << drm->mode_config.num_crtc; > + unsigned long crtcs = BIT(drm->mode_config.num_crtc); > unsigned long flags = DRM_MODE_ROTATE_0 | DRM_MODE_ROTATE_90 | DRM_MODE_ROTATE_180 | > DRM_MODE_ROTATE_270 | DRM_MODE_REFLECT_X | DRM_MODE_REFLECT_Y; > unsigned int blend_caps = BIT(DRM_MODE_BLEND_PIXEL_NONE) | > -- > 2.27.0.rc0 > -- ==================== | I would like to | | fix the world, | | but they're not | | giving me the | \ source code! / --------------- ¯\_(ツ)_/¯ _______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/dri-devel