On Tue, 19 Aug 2014, Arjun Sreedharan wrote:
> kcalloc has protection from integer overflows
> which could arise from the multiplication of
> number of elements and size.
>
> Signed-off-by: Arjun Sreedharan
As Clemens pointed out, integer overflows cannot occur here. This
patch is not
Arjun Sreedharan wrote:
> kcalloc has protection from integer overflows
> which could arise from the multiplication of
> number of elements and size.
You are implying that such an overflow could arise in this code.
This is false.
> @@ -380,8 +380,7 @@ static int usb_parse_interface(struct device
kcalloc has protection from integer overflows
which could arise from the multiplication of
number of elements and size.
Signed-off-by: Arjun Sreedharan
---
drivers/usb/core/config.c | 11 ---
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/drivers/usb/core/config.c
kcalloc has protection from integer overflows
which could arise from the multiplication of
number of elements and size.
Signed-off-by: Arjun Sreedharan arjun...@gmail.com
---
drivers/usb/core/config.c | 11 ---
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git
Arjun Sreedharan wrote:
kcalloc has protection from integer overflows
which could arise from the multiplication of
number of elements and size.
You are implying that such an overflow could arise in this code.
This is false.
@@ -380,8 +380,7 @@ static int usb_parse_interface(struct device
On Tue, 19 Aug 2014, Arjun Sreedharan wrote:
kcalloc has protection from integer overflows
which could arise from the multiplication of
number of elements and size.
Signed-off-by: Arjun Sreedharan arjun...@gmail.com
As Clemens pointed out, integer overflows cannot occur here. This
patch
6 matches
Mail list logo