lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 18 Feb 2016 15:33:29 -0500 (EST) From: David Miller <davem@...emloft.net> To: wuninsu@...il.com Cc: ralf@...ux-mips.org, linux-hams@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, taesoo@...ech.edu, yeongjin.jang@...ech.edu, insu@...ech.edu, changwoo@...ech.edu Subject: Re: [PATCH] rose: correct integer overflow check From: Insu Yun <wuninsu@...il.com> Date: Wed, 17 Feb 2016 15:25:13 -0500 > Since rose_ndevs is signed integer type, > it can be overflowed when it is negative. > > Signed-off-by: Insu Yun <wuninsu@...il.com> That's not how the expression is evaluated. Because of the types on the right hand side of the comparison the expressions are all promoted to unsigned. Did you look at the compiler's assembler output? I did when reviewing your patch.
Powered by blists - more mailing lists