[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <168198389444.147011.7790274772825720678.b4-ty@kernel.org>
Date: Thu, 20 Apr 2023 18:04:52 +0100
From: Will Deacon <will@...nel.org>
To: Dan Carpenter <dan.carpenter@...aro.org>,
James Morse <james.morse@....com>
Cc: catalin.marinas@....com, kernel-team@...roid.com,
Will Deacon <will@...nel.org>,
Kristina Martsenko <kristina.martsenko@....com>,
Ard Biesheuvel <ardb@...nel.org>,
Liu Song <liusong@...ux.alibaba.com>,
Mark Rutland <mark.rutland@....com>,
linux-kernel@...r.kernel.org, kernel-janitors@...r.kernel.org,
D Scott Phillips <scott@...amperecomputing.com>,
Mark Brown <broonie@...nel.org>,
linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH] arm64: delete dead code in this_cpu_set_vectors()
On Wed, 19 Apr 2023 10:58:43 +0300, Dan Carpenter wrote:
> The "slot" variable is an enum, and in this context it is an unsigned
> int. So the type means it can never be negative and also we never pass
> invalid data to this function. If something did pass invalid data then
> this check would be insufficient protection.
>
>
Applied to arm64 (for-next/misc), thanks!
[1/1] arm64: delete dead code in this_cpu_set_vectors()
https://git.kernel.org/arm64/c/460e70e2dc9a
Cheers,
--
Will
https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev
Powered by blists - more mailing lists