[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ZrE3+/rL2KxFRzFS@duo.ucw.cz>
Date: Mon, 5 Aug 2024 22:37:15 +0200
From: Pavel Machek <pavel@...x.de>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, 0x7f454c46@...il.com
Cc: stable@...r.kernel.org, patches@...ts.linux.dev,
linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
akpm@...ux-foundation.org, linux@...ck-us.net, shuah@...nel.org,
patches@...nelci.org, lkft-triage@...ts.linaro.org, pavel@...x.de,
jonathanh@...dia.com, f.fainelli@...il.com,
sudipm.mukherjee@...il.com, srw@...dewatkins.net, rwarsow@....de,
conor@...nel.org, allen.lkml@...il.com, broonie@...nel.org
Subject: Re: [PATCH 6.1 000/440] 6.1.103-rc3 review
Hi!
> This is the start of the stable review cycle for the 6.1.103 release.
> There are 440 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
> Dmitry Safonov <0x7f454c46@...il.com>
> jump_label: Prevent key->enabled int overflow
In practice, this will work, but theoretically signed overflow is
undefined and this depends on undefined behaviour.
+ int v;
...
+ if (v <= 0 || (v + 1) < 0)
+ return false;
Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Erika Unter
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)
Powered by blists - more mailing lists