On Mon, 22 Jul 2024 at 11:35, Mostafa Saleh <smost...@google.com> wrote: > > Coverity has spotted a possible problem with the OAS handling > (CID 1558464), where the error return of oas2bits() -1 is not > checked, which can cause an overflow in oas value. > > oas2bits() is only called with valid inputs, harden the function > to assert that. > > Reported-By: Peter Maydell <peter.mayd...@linaro.org> > Link: > https://lore.kernel.org/qemu-devel/CAFEAcA-H=n-3mhc+el6yjfl1m+x+b+fk3mkgzbn74wnxiff...@mail.gmail.com/ > Signed-off-by: Mostafa Saleh <smost...@google.com>
Applied to target-arm.next, thanks. -- PMM