Re: [PATCH] xen/privcmd: prevent integer overflow on 32 bit systems

2022-07-19 Thread kernel test robot
Hi Dan, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on xen-tip/linux-next] [also build test WARNING on linus/master v5.19-rc7 next-20220719] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--

Re: [PATCH] xen/privcmd: prevent integer overflow on 32 bit systems

2022-07-16 Thread Dan Carpenter
On Fri, Jul 15, 2022 at 08:56:30AM +, Oleksandr Tyshchenko wrote: > > On 15.07.22 11:20, Dan Carpenter wrote: > > > Hello Dan > > > The "m.num * sizeof(*m.arr)" multiplication can have an integer overflow > > on 32 bit systems. Probably no one really uses this software on 32 bit > > system

Re: [PATCH] xen/privcmd: prevent integer overflow on 32 bit systems

2022-07-15 Thread Oleksandr Tyshchenko
On 15.07.22 11:20, Dan Carpenter wrote: Hello Dan > The "m.num * sizeof(*m.arr)" multiplication can have an integer overflow > on 32 bit systems. Probably no one really uses this software on 32 bit > systems, but it's still worth fixing the bug if only to make the static > checker happy. > > F