lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 23 Jun 2019 22:13:12 +0700 From: Phong Tran <tranmanphong@...il.com> To: mark.rutland@....com, kstewart@...uxfoundation.org, songliubraving@...com, andrew@...n.ch, peterz@...radead.org, nsekhar@...com, ast@...nel.org, jolsa@...hat.com, netdev@...r.kernel.org, gerg@...inux.org, lorenzo.pieralisi@....com, will@...nel.org, linux-samsung-soc@...r.kernel.org, daniel@...earbox.net, tranmanphong@...il.com, festevam@...il.com, gregory.clement@...tlin.com, allison@...utok.net, linux@...linux.org.uk, krzk@...nel.org, haojian.zhuang@...il.com, bgolaszewski@...libre.com, tony@...mide.com, mingo@...hat.com, linux-imx@....com, yhs@...com, sebastian.hesselbarth@...il.com, illusionist.neo@...il.com, jason@...edaemon.net, liviu.dudau@....com, s.hauer@...gutronix.de, acme@...nel.org, lkundrak@...sk, robert.jarzmik@...e.fr, dmg@...ingmachine.org, swinslow@...il.com, namhyung@...nel.org, tglx@...utronix.de, linux-omap@...r.kernel.org, alexander.sverdlin@...il.com, linux-arm-kernel@...ts.infradead.org, info@...ux.net, gregkh@...uxfoundation.org, linux-kernel@...r.kernel.org, alexander.shishkin@...ux.intel.com, hsweeten@...ionengravers.com, kgene@...nel.org, kernel@...gutronix.de, sudeep.holla@....com, bpf@...r.kernel.org, shawnguo@...nel.org, kafai@...com, daniel@...que.org Subject: [PATCH 14/15] ARM: bpf: cleanup cppcheck shifting error [arch/arm/net/bpf_jit_32.c:618]: (error) Shifting signed 32-bit value by 31 bits is undefined behaviour Signed-off-by: Phong Tran <tranmanphong@...il.com> --- arch/arm/net/bpf_jit_32.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm/net/bpf_jit_32.c b/arch/arm/net/bpf_jit_32.c index adff54c312bf..9c3f8fb871e5 100644 --- a/arch/arm/net/bpf_jit_32.c +++ b/arch/arm/net/bpf_jit_32.c @@ -612,7 +612,7 @@ static inline void emit_a32_mov_se_i64(const bool is64, const s8 dst[], const u32 val, struct jit_ctx *ctx) { u64 val64 = val; - if (is64 && (val & (1<<31))) + if (is64 && (val & (1U<<31))) val64 |= 0xffffffff00000000ULL; emit_a32_mov_i64(dst, val64, ctx); } -- 2.11.0
Powered by blists - more mailing lists