Files
u-boot/fs
Joao Marcos Costa 59fd62d71c fs/squashfs: fix potential integer overflows
The length of buffers used to read inode tables, directory tables, and
reading a file are calculated as: number of blocks * block size, and
such plain multiplication is prone to overflowing (thus unsafe).

Replace it by __builtin_mul_overflow, i.e. safe math.

Signed-off-by: Joao Marcos Costa <joaomarcos.costa@bootlin.com>
2025-02-24 08:49:04 -06:00
..
2024-11-13 08:18:50 -06:00
2024-10-11 11:44:48 -06:00
2024-07-15 12:12:17 -06:00
2024-10-11 11:44:48 -06:00
2024-07-15 12:12:17 -06:00
2024-12-30 13:21:55 -06:00
2025-01-20 08:32:48 -06:00
2025-01-20 08:32:48 -06:00