lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <aB9KkD5-zzdnWQRb@vaxr-BM6660-BM6360> Date: Sat, 10 May 2025 20:46:08 +0800 From: I Hsin Cheng <richard120310@...il.com> To: Neil Armstrong <neil.armstrong@...aro.org> Cc: maarten.lankhorst@...ux.intel.com, mripard@...nel.org, tzimmermann@...e.de, airlied@...il.com, simona@...ll.ch, khilman@...libre.com, jbrunet@...libre.com, martin.blumenstingl@...glemail.com, christophe.jaillet@...adoo.fr, skhan@...uxfoundation.org, dri-devel@...ts.freedesktop.org, linux-amlogic@...ts.infradead.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v2] drm/meson: Use 1000ULL when operating with mode->clock On Fri, May 09, 2025 at 08:56:01PM +0200, Neil Armstrong wrote: > Hi, > > On Tue, 06 May 2025 02:43:38 +0800, I Hsin Cheng wrote: > > Coverity scan reported the usage of "mode->clock * 1000" may lead to > > integer overflow. Use "1000ULL" instead of "1000" > > when utilizing it to avoid potential integer overflow issue. > > > > > > Thanks, Applied to https://gitlab.freedesktop.org/drm/misc/kernel.git (drm-misc-fixes) > > [1/1] drm/meson: Use 1000ULL when operating with mode->clock > https://gitlab.freedesktop.org/drm/misc/kernel/-/commit/eb0851e14432f3b87c77b704c835ac376deda03a > > -- > Neil > Hi Neil, Hi Martin, Thanks for your kindness for adding the tag for me, I'll make sure to add Fixes tag in future when I send patches. Big thanks! Best regards, I Hsin Cheng.
Powered by blists - more mailing lists