diff options
author | David S. Miller <davem@davemloft.net> | 2019-07-01 19:15:46 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-07-01 19:15:46 -0700 |
commit | 8a534f8fb0dc44694a437b575060499efd1c91de (patch) | |
tree | 88f7b417e9a8c7061b04e7ba0a77c3884b4f018b /net/ax25 | |
parent | eb1f5c02ddf5ef51fcd746f6ff55b93935fc981c (diff) | |
parent | 95b9395ba103ec0cc40bebb71a08231b5e226a76 (diff) |
Merge branch 'idr-fix-overflow-cases-on-32-bit-CPU'
Cong Wang says:
====================
idr: fix overflow cases on 32-bit CPU
idr_get_next_ul() is problematic by design, it can't handle
the following overflow case well on 32-bit CPU:
u32 id = UINT_MAX;
idr_alloc_u32(&id);
while (idr_get_next_ul(&id) != NULL)
id++;
when 'id' overflows and becomes 0 after UINT_MAX, the loop
goes infinite.
Fix this by eliminating external users of idr_get_next_ul()
and migrating them to idr_for_each_entry_continue_ul(). And
add an additional parameter for these iteration macros to detect
overflow properly.
Please merge this through networking tree, as all the users
are in networking subsystem.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ax25')
0 files changed, 0 insertions, 0 deletions