Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Fri, 13 Sep 2024 08:03:26 -0700 you wrote: > Zac Ecob reported a problem where a bpf program may cause kernel crash due > to the following error: > Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI > > The failure is due to the below signed divide: > LLONG_MIN/-1 where LLONG_MIN equals to -9,223,372,036,854,775,808. > LLONG_MIN/-1 is supposed to give a positive number 9,223,372,036,854,775,808, > but it is impossible since for 64-bit system, the maximum positive > number is 9,223,372,036,854,775,807. On x86_64, LLONG_MIN/-1 will > cause a kernel exception. On arm64, the result for LLONG_MIN/-1 is > LLONG_MIN. > > [...] Here is the summary with links: - [bpf-next,v3,1/2] bpf: Fix a sdiv overflow issue https://git.kernel.org/bpf/bpf-next/c/7dd34d7b7dcf - [bpf-next,v3,2/2] selftests/bpf: Add tests for sdiv/smod overflow cases https://git.kernel.org/bpf/bpf-next/c/a18062d54a0b You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html