hal: fix integer overflow error in usb
Adding a fix to address integer overflow in
usb.
Change-Id: I426baf59978e0b5e3eedc65857ed14b9111197a8
diff --git a/hal/audio_extn/usb.c b/hal/audio_extn/usb.c
index c1ee008..a2d559d 100644
--- a/hal/audio_extn/usb.c
+++ b/hal/audio_extn/usb.c
@@ -1138,10 +1138,11 @@
uint32_t tries = _MIN(sample_rate_size, (uint32_t)__builtin_popcount(bm));
int i = 0;
- while (tries--) {
+ while (tries) {
int idx = __builtin_ffs(bm) - 1;
sample_rates[i++] = supported_sample_rates[idx];
bm &= ~(1<<idx);
+ tries--;
}
return i;