On Tue, Nov 27, 2018 at 02:04:53PM +0100, Greg Kurz wrote: > As explained in HACKING, the g_malloc(sizeof(T) * n) construct is unsafe > because it can't detect multiplication overflowing size_t and doesn't > allow type checking. > > It appears to be used in a bunch of places though: > > $ git grep -E 'malloc.*sizeof' | grep ' \* ' | wc -l > 101 > > This series fixes the ppc target and ppc machine code. The changes are > mostly trivial. Only the mac99 and e500 machines required some more work > that should be reviewed carefully, as it was only compile-tested.
Series applied, thanks. -- David Gibson | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_ | _way_ _around_! http://www.ozlabs.org/~dgibson
signature.asc
Description: PGP signature