lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 18 Aug 2022 20:51:16 +0530
From:   Siddh Raman Pant <>
To:     "Matthew Wilcox" <>
Cc:     "david" <>, "djwong" <>,
        "fgheet255t" <>, "hch" <>,
        "linux-ext4" <>,
        "linux-fsdevel" <>,
        "linux-kernel" <>,
        "linux-xfs" <>,
        "riteshh" <>,
        "syzkaller-bugs" <>
Subject: Re: [syzbot] WARNING in iomap_iter

On Thu, 18 Aug 2022 20:20:02 +0530  Matthew Wilcox  wrote:
> I don't think changing these from u64 to s64 is the right way to go.

Why do you think so? Is there somnething I overlooked?

I think it won't intorduce regression, since if something is working,
it will continue to work. If something does break, then they were
relying on overflows, which is anyways an incorrect way to go about.

Also, it seems even the 32-bit compatibility structure uses signed


Powered by blists - more mailing lists