On Mon, 22 Jul 2024 at 11:35, Mostafa Saleh <smost...@google.com> wrote:
>
> Coverity has spotted a possible problem with the OAS handling
> (CID 1558464), where the error return of oas2bits() -1 is not
> checked, which can cause an overflow in oas value.
>
> oas2bits() is only called with valid inputs, harden the function
> to assert that.
>
> Reported-By: Peter Maydell <peter.mayd...@linaro.org>
> Link: 
> https://lore.kernel.org/qemu-devel/CAFEAcA-H=n-3mhc+el6yjfl1m+x+b+fk3mkgzbn74wnxiff...@mail.gmail.com/
> Signed-off-by: Mostafa Saleh <smost...@google.com>



Applied to target-arm.next, thanks.

-- PMM

Reply via email to