From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AB28E3D1CD7 for ; Fri, 3 Apr 2026 17:10:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775236250; cv=none; b=Lrfu2YB5zzst0V7fdIkOyWyG1MRH4l4Y5kpMZaAvWeuEQi02N9hyXqQDE0FoXtXw7pDr1SEeqe6E6f5q19vJFVGAX3wnE7LGy/czO5vz7RUa/Mo/XRkKnsStlbhtbhkx/XOZrEJdwoCVzfUjJKjahWwmrihTPx0b9JunbHie/rA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775236250; c=relaxed/simple; bh=gJ3MnYEyZACmFLWWRT355hxmQUIoO/N875mIDydfCBo=; h=Date:To:From:Subject:Message-Id; b=r2VFdpwf/qfdHznGaW3czISa1cIPBMgjUUmT89pEgBUcp/edf98jn4Zqy5BUrTxSDXVeJME7DpAKhVOBgpONZHNnc6mg7m3eYqRlN0hh4+th+k1x1J+xRhEvNpT36u8jHDdl07BUg3mWcg37NMqsjrFIQTwyqQ96Y6U8R6h5/q8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b=J0LOigIR; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b="J0LOigIR" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6536FC4CEF7; Fri, 3 Apr 2026 17:10:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1775236250; bh=gJ3MnYEyZACmFLWWRT355hxmQUIoO/N875mIDydfCBo=; h=Date:To:From:Subject:From; b=J0LOigIRwOQQti2JtzQVQg69HeQkIi9QE+J0iLzPX2XEUgVTYP19xxmcdoefSV7Wm I75U11lWJmXRlyCOHIrdVOvlSaT3zW6lUOC905kmdi4pgryuHhhyDEegJMa4W7yirK w/s8A3oLhusHqJugcI/wWUD8XCp+2GYDNtZd0XYo= Date: Fri, 03 Apr 2026 10:10:49 -0700 To: mm-commits@vger.kernel.org,dmantipov@yandex.ru,akpm@linux-foundation.org From: Andrew Morton Subject: + lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch added to mm-nonmm-unstable branch Message-Id: <20260403171050.6536FC4CEF7@smtp.kernel.org> Precedence: bulk X-Mailing-List: mm-commits@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: The patch titled Subject: lib: add more string to 64-bit integer conversion overflow tests has been added to the -mm mm-nonmm-unstable branch. Its filename is lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via various branches at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there most days ------------------------------------------------------ From: Dmitry Antipov Subject: lib: add more string to 64-bit integer conversion overflow tests Date: Fri, 3 Apr 2026 13:33:35 +0300 Add a few more string to 64-bit integer conversion tests to check whether 'kstrtoull()', 'kstrtoll()', 'kstrtou64()' and 'kstrtos64()' can handle overflows reported by '_parse_integer_limit()'. Link: https://lkml.kernel.org/r/20260403103338.1122415-4-dmantipov@yandex.ru Signed-off-by: Dmitry Antipov Suggested-by: Andy Shevchenko Reviewed-by: Andy Shevchenko Cc: Albert Ou Cc: Alexandre Ghiti Cc: Ard Biesheuvel Cc: "Darrick J. Wong" Cc: Kees Cook Cc: Nathan Chancellor Cc: Palmer Dabbelt Cc: Paul Walmsley Signed-off-by: Andrew Morton --- lib/test-kstrtox.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/lib/test-kstrtox.c~lib-add-more-string-to-64-bit-integer-conversion-overflow-tests +++ a/lib/test-kstrtox.c @@ -198,6 +198,7 @@ static void __init test_kstrtoull_fail(v {"10000000000000000000000000000000000000000000000000000000000000000", 2}, {"2000000000000000000000", 8}, {"18446744073709551616", 10}, + {"569202370375329612767", 10}, {"10000000000000000", 16}, /* negative */ {"-0", 0}, @@ -275,9 +276,11 @@ static void __init test_kstrtoll_fail(vo {"9223372036854775809", 10}, {"18446744073709551614", 10}, {"18446744073709551615", 10}, + {"569202370375329612767", 10}, {"-9223372036854775809", 10}, {"-18446744073709551614", 10}, {"-18446744073709551615", 10}, + {"-569202370375329612767", 10}, /* sign is first character if any */ {"-+1", 0}, {"-+1", 8}, @@ -334,6 +337,7 @@ static void __init test_kstrtou64_fail(v {"-1", 10}, {"18446744073709551616", 10}, {"18446744073709551617", 10}, + {"569202370375329612767", 10}, }; TEST_FAIL(kstrtou64, u64, "%llu", test_u64_fail); } @@ -386,6 +390,8 @@ static void __init test_kstrtos64_fail(v {"18446744073709551615", 10}, {"18446744073709551616", 10}, {"18446744073709551617", 10}, + {"569202370375329612767", 10}, + {"-569202370375329612767", 10}, }; TEST_FAIL(kstrtos64, s64, "%lld", test_s64_fail); } _ Patches currently in -mm which might be from dmantipov@yandex.ru are lib-fix-_parse_integer_limit-to-handle-overflow.patch lib-fix-memparse-to-handle-overflow.patch lib-add-more-string-to-64-bit-integer-conversion-overflow-tests.patch lib-cmdline_kunit-add-test-case-for-memparse.patch lib-cmdline-adjust-a-few-comments-to-fix-kernel-doc-wreturn-warnings.patch riscv-export-symbols-needed-for-riscv32-efi-stub.patch