From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 27B02309EFB for ; Fri, 20 Feb 2026 21:34:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771623283; cv=none; b=Zv+faHSjkPh36u1aJ2bkdi8Ztp0mqrofXE28xbEsG+TtxEau7Vcr5Fm/up3dP1mAEc+/L/XutnNdDYTOmImxq8d/9s66UGVWkkvgYZaAOr6AbOcE1HWK2VFF6uFgvV493//+gWDGzgctIvqC8sSEDZazfxBhpm+XOFptXrmfBbA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771623283; c=relaxed/simple; bh=vN9OWPdkjc/9jsLqG4F5iI0/PrnZpLr2XVNMd4u0ihQ=; h=Date:To:From:Subject:Message-Id; b=QXJSj2RzzP7eoNIGNdQ7e/oYqpd+dHuwQgVPgnEF7hJ6PMgoO+tOwpacwNqTH6O2pjRjKAzF93f4CgzxtRuqtuRPIR8xbMZb59IRmVtSGbG7t9JfbEPqTlFl5bjRv4xoDk2k93137tuqNYtfFoY7eaHZrTQE1wqdQbzy3X3FdXI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b=krvUVx+K; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b="krvUVx+K" Received: by smtp.kernel.org (Postfix) with ESMTPSA id DA243C116C6; Fri, 20 Feb 2026 21:34:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1771623282; bh=vN9OWPdkjc/9jsLqG4F5iI0/PrnZpLr2XVNMd4u0ihQ=; h=Date:To:From:Subject:From; b=krvUVx+Kpf/ejtRlmwXkKhPxvwwbCELsAKVhLssuf1Xm+/j7BxVaP94BQJXeDuXWC F1qtsDLSO7XyvLTv+Za8asgFbDBvlWX7gGDSchgqdnQQiJ2OBYOsm82DDFYRXmVP+p /I0fCfcX/jV5p1XVQDTEoEz20qCyZTaLIJV+upbw= Date: Fri, 20 Feb 2026 13:34:42 -0800 To: mm-commits@vger.kernel.org,kees@kernel.org,djwong@kernel.org,andriy.shevchenko@intel.com,dmantipov@yandex.ru,akpm@linux-foundation.org From: Andrew Morton Subject: + lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch added to mm-nonmm-unstable branch Message-Id: <20260220213442.DA243C116C6@smtp.kernel.org> Precedence: bulk X-Mailing-List: mm-commits@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: The patch titled Subject: lib: add more string to 64-bit integer conversion overflow tests has been added to the -mm mm-nonmm-unstable branch. Its filename is lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via various branches at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there most days ------------------------------------------------------ From: Dmitry Antipov Subject: lib: add more string to 64-bit integer conversion overflow tests Date: Thu, 12 Feb 2026 19:44:11 +0300 Add a few more string to 64-bit integer conversion tests to check whether 'kstrtoull()', 'kstrtoll()', 'kstrtou64()' and 'kstrtos64()' can handle overflows reported by '_parse_integer_limit()'. Link: https://lkml.kernel.org/r/20260212164413.889625-4-dmantipov@yandex.ru Signed-off-by: Dmitry Antipov Suggested-by: Andy Shevchenko Reviewed-by: Andy Shevchenko Cc: "Darrick J. Wong" Cc: Kees Cook Signed-off-by: Andrew Morton --- lib/test-kstrtox.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/lib/test-kstrtox.c~lib-add-more-string-to-64-bit-integer-conversion-overflow-tests +++ a/lib/test-kstrtox.c @@ -198,6 +198,7 @@ static void __init test_kstrtoull_fail(v {"10000000000000000000000000000000000000000000000000000000000000000", 2}, {"2000000000000000000000", 8}, {"18446744073709551616", 10}, + {"569202370375329612767", 10}, {"10000000000000000", 16}, /* negative */ {"-0", 0}, @@ -275,9 +276,11 @@ static void __init test_kstrtoll_fail(vo {"9223372036854775809", 10}, {"18446744073709551614", 10}, {"18446744073709551615", 10}, + {"569202370375329612767", 10}, {"-9223372036854775809", 10}, {"-18446744073709551614", 10}, {"-18446744073709551615", 10}, + {"-569202370375329612767", 10}, /* sign is first character if any */ {"-+1", 0}, {"-+1", 8}, @@ -334,6 +337,7 @@ static void __init test_kstrtou64_fail(v {"-1", 10}, {"18446744073709551616", 10}, {"18446744073709551617", 10}, + {"569202370375329612767", 10}, }; TEST_FAIL(kstrtou64, u64, "%llu", test_u64_fail); } @@ -386,6 +390,8 @@ static void __init test_kstrtos64_fail(v {"18446744073709551615", 10}, {"18446744073709551616", 10}, {"18446744073709551617", 10}, + {"569202370375329612767", 10}, + {"-569202370375329612767", 10}, }; TEST_FAIL(kstrtos64, s64, "%lld", test_s64_fail); } _ Patches currently in -mm which might be from dmantipov@yandex.ru are lib-fix-_parse_integer_limit-to-handle-overflow.patch lib-fix-memparse-to-handle-overflow.patch lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch lib-cmdline_kunit-add-test-case-for-memparse.patch lib-cmdline-adjust-a-few-comments-to-fix-kernel-doc-wreturn-warnings.patch