Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5867484ybp; Tue, 8 Oct 2019 09:25:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkZhqXgneUoZ6XmGEalWhDVR4ktpzKoW0Uf+e7QjlXVWYAQcXj4bzcSd6Jyf02UU3Lz53C X-Received: by 2002:a17:906:409b:: with SMTP id u27mr7072166ejj.295.1570551951898; Tue, 08 Oct 2019 09:25:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570551951; cv=none; d=google.com; s=arc-20160816; b=KRuLUYfXmK1VPS8LBsm3UOcNZ/D/n/dq+ajLKzxUyCnAh2K7L2d83V/OYxJjrF41LD qPbd9czYSv/UAH1P4WY3+vXkyMjPfXQkblO2JOoO7qI/lBDhXsbgFQi+AB43KaKLWmId jwDn8Ew4ssv0WlGCYg1Sv7GTFEFpUkQSEk6IvwAOJObkE35iubR67R8VtJvyfW9hLL0g I2CwEZ+VVQw/pV+/obZvLyemu2Bv2jr7Z3HXmkP3JizMyjHgJ31rraHcN+LHeTVKArQM 72qGmyMf0NqCiMnRsnNhS91SgVzxZ7TFYy20rJ+jVZIUysLhFQ7DcY6Vr8hLf1S0NBOF +dVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:from:references:to:subject; bh=gmlWcghsv6/L65Eg7GNJx369uE3hWAGQLNYG5QImlok=; b=quh2PrRz6ZfqoJhuYgQBwphPZhO2MdjSaHnjEgFcUEIc8uXzml1kuHG57waygeQzON b7IIeNATJXzrsnxsBUL0DLrMOPcEQQvIN0kmXrk4bFu8rHk5REHEQxm21TLyboQDo8aj XXnmkomV1VHAWhJHwGeBvEJVsxbVFjlXkLJ7NYeUswtmtlJf35YukEC0we6xONap8UvR OrfV5BnayIP/ljBMN/OQCG/JeodQE08W2gW4Eyc+kDHSAnWKA1y3atfs/bb8isG7fj+j w+mt3Qwyh9wJDgzCk1SisAugYHub0Uyv1eE6BVoyB1jazXduCXlX3vIS2+ctub5nDpc/ 4R2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g5si7669816ejp.430.2019.10.08.09.25.26; Tue, 08 Oct 2019 09:25:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729025AbfJHQYr (ORCPT + 99 others); Tue, 8 Oct 2019 12:24:47 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:35122 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725795AbfJHQYr (ORCPT ); Tue, 8 Oct 2019 12:24:47 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212]) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iHsI1-0000ac-MD; Tue, 08 Oct 2019 16:24:45 +0000 Subject: Re: [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero To: Dan Carpenter , Ard Biesheuvel , Ingo Molnar , linux-efi@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org References: <20191008100153.8499-1-colin.king@canonical.com> <20191008114559.GD25098@kadam> <20191008161553.qls5lbyaxlasw25v@cantor> From: Colin Ian King Autocrypt: addr=colin.king@canonical.com; prefer-encrypt=mutual; keydata= mQINBE6TJCgBEACo6nMNvy06zNKj5tiwDsXXS+LhT+LwtEsy9EnraKYXAf2xwazcICSjX06e fanlyhB0figzQO0n/tP7BcfMVNG7n1+DC71mSyRK1ZERcG1523ajvdZOxbBCTvTitYOy3bjs +LXKqeVMhK3mRvdTjjmVpWnWqJ1LL+Hn12ysDVVfkbtuIm2NoaSEC8Ae8LSSyCMecd22d9Pn LR4UeFgrWEkQsqROq6ZDJT9pBLGe1ZS0pVGhkRyBP9GP65oPev39SmfAx9R92SYJygCy0pPv BMWKvEZS/7bpetPNx6l2xu9UvwoeEbpzUvH26PHO3DDAv0ynJugPCoxlGPVf3zcfGQxy3oty dNTWkP6Wh3Q85m+AlifgKZudjZLrO6c+fAw/jFu1UMjNuyhgShtFU7NvEzL3RqzFf9O1qM2m uj83IeFQ1FZ65QAiCdTa3npz1vHc7N4uEQBUxyXgXfCI+A5yDnjHwzU0Y3RYS52TA3nfa08y LGPLTf5wyAREkFYou20vh5vRvPASoXx6auVf1MuxokDShVhxLpryBnlKCobs4voxN54BUO7m zuERXN8kadsxGFzItAyfKYzEiJrpUB1yhm78AecDyiPlMjl99xXk0zs9lcKriaByVUv/NsyJ FQj/kmdxox3XHi9K29kopFszm1tFiDwCFr/xumbZcMY17Yi2bQARAQABtCVDb2xpbiBLaW5n IDxjb2xpbi5raW5nQGNhbm9uaWNhbC5jb20+iQI2BBMBCAAhBQJOkyQoAhsDBQsJCAcDBRUK CQgLBRYCAwEAAh4BAheAAAoJEGjCh9/GqAImsBcP9i6C/qLewfi7iVcOwqF9avfGzOPf7CVr n8CayQnlWQPchmGKk6W2qgnWI2YLIkADh53TS0VeSQ7Tetj8f1gV75eP0Sr/oT/9ovn38QZ2 vN8hpZp0GxOUrzkvvPjpH+zdmKSaUsHGp8idfPpZX7XeBO0yojAs669+3BrnBcU5wW45SjSV nfmVj1ZZj3/yBunb+hgNH1QRcm8ZPICpjvSsGFClTdB4xu2AR28eMiL/TTg9k8Gt72mOvhf0 fS0/BUwcP8qp1TdgOFyiYpI8CGyzbfwwuGANPSupGaqtIRVf+/KaOdYUM3dx/wFozZb93Kws gXR4z6tyvYCkEg3x0Xl9BoUUyn9Jp5e6FOph2t7TgUvv9dgQOsZ+V9jFJplMhN1HPhuSnkvP 5/PrX8hNOIYuT/o1AC7K5KXQmr6hkkxasjx16PnCPLpbCF5pFwcXc907eQ4+b/42k+7E3fDA Erm9blEPINtt2yG2UeqEkL+qoebjFJxY9d4r8PFbEUWMT+t3+dmhr/62NfZxrB0nTHxDVIia u8xM+23iDRsymnI1w0R78yaa0Eea3+f79QsoRW27Kvu191cU7QdW1eZm05wO8QUvdFagVVdW Zg2DE63Fiin1AkGpaeZG9Dw8HL3pJAJiDe0KOpuq9lndHoGHs3MSa3iyQqpQKzxM6sBXWGfk EkK5Ag0ETpMkKAEQAMX6HP5zSoXRHnwPCIzwz8+inMW7mJ60GmXSNTOCVoqExkopbuUCvinN 4Tg+AnhnBB3R1KTHreFGoz3rcV7fmJeut6CWnBnGBtsaW5Emmh6gZbO5SlcTpl7QDacgIUuT v1pgewVHCcrKiX0zQDJkcK8FeLUcB2PXuJd6sJg39kgsPlI7R0OJCXnvT/VGnd3XPSXXoO4K cr5fcjsZPxn0HdYCvooJGI/Qau+imPHCSPhnX3WY/9q5/WqlY9cQA8tUC+7mgzt2VMjFft1h rp/CVybW6htm+a1d4MS4cndORsWBEetnC6HnQYwuC4bVCOEg9eXMTv88FCzOHnMbE+PxxHzW 3Gzor/QYZGcis+EIiU6hNTwv4F6fFkXfW6611JwfDUQCAHoCxF3B13xr0BH5d2EcbNB6XyQb IGngwDvnTyKHQv34wE+4KtKxxyPBX36Z+xOzOttmiwiFWkFp4c2tQymHAV70dsZTBB5Lq06v 6nJs601Qd6InlpTc2mjd5mRZUZ48/Y7i+vyuNVDXFkwhYDXzFRotO9VJqtXv8iqMtvS4xPPo 2DtJx6qOyDE7gnfmk84IbyDLzlOZ3k0p7jorXEaw0bbPN9dDpw2Sh9TJAUZVssK119DJZXv5 2BSc6c+GtMqkV8nmWdakunN7Qt/JbTcKlbH3HjIyXBy8gXDaEto5ABEBAAGJAh8EGAEIAAkF Ak6TJCgCGwwACgkQaMKH38aoAiZ4lg/+N2mkx5vsBmcsZVd3ys3sIsG18w6RcJZo5SGMxEBj t1UgyIXWI9lzpKCKIxKx0bskmEyMy4tPEDSRfZno/T7p1mU7hsM4owi/ic0aGBKP025Iok9G LKJcooP/A2c9dUV0FmygecRcbIAUaeJ27gotQkiJKbi0cl2gyTRlolKbC3R23K24LUhYfx4h pWj8CHoXEJrOdHO8Y0XH7059xzv5oxnXl2SD1dqA66INnX+vpW4TD2i+eQNPgfkECzKzGj+r KRfhdDZFBJj8/e131Y0t5cu+3Vok1FzBwgQqBnkA7dhBsQm3V0R8JTtMAqJGmyOcL+JCJAca 3Yi81yLyhmYzcRASLvJmoPTsDp2kZOdGr05Dt8aGPRJL33Jm+igfd8EgcDYtG6+F8MCBOult TTAu+QAijRPZv1KhEJXwUSke9HZvzo1tNTlY3h6plBsBufELu0mnqQvHZmfa5Ay99dF+dL1H WNp62+mTeHsX6v9EACH4S+Cw9Q1qJElFEu9/1vFNBmGY2vDv14gU2xEiS2eIvKiYl/b5Y85Q QLOHWV8up73KK5Qq/6bm4BqVd1rKGI9un8kezUQNGBKre2KKs6wquH8oynDP/baoYxEGMXBg GF/qjOC6OY+U7kNUW3N/A7J3M2VdOTLu3hVTzJMZdlMmmsg74azvZDV75dUigqXcwjE= Message-ID: <37d9c70e-12e0-f0a1-b3ff-b2aefb39c223@canonical.com> Date: Tue, 8 Oct 2019 17:24:45 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1 MIME-Version: 1.0 In-Reply-To: <20191008161553.qls5lbyaxlasw25v@cantor> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/10/2019 17:15, Jerry Snitselaar wrote: > On Tue Oct 08 19, Dan Carpenter wrote: >> On Tue, Oct 08, 2019 at 11:01:53AM +0100, Colin King wrote: >>> From: Colin Ian King >>> >>> Currently the check for tbl_size being less than zero is always false >>> because tbl_size is unsigned. Fix this by making it a signed int. >>> >>> Addresses-Coverity: ("Unsigned compared against 0") >>> Fixes: e658c82be556 ("efi/tpm: Only set 'efi_tpm_final_log_size' >>> after successful event log parsing") >>> Signed-off-by: Colin Ian King >>> --- >>> ?drivers/firmware/efi/tpm.c | 2 +- >>> ?1 file changed, 1 insertion(+), 1 deletion(-) >>> >>> diff --git a/drivers/firmware/efi/tpm.c b/drivers/firmware/efi/tpm.c >>> index 703469c1ab8e..ebd7977653a8 100644 >>> --- a/drivers/firmware/efi/tpm.c >>> +++ b/drivers/firmware/efi/tpm.c >>> @@ -40,7 +40,7 @@ int __init efi_tpm_eventlog_init(void) >>> ?{ >>> ???? struct linux_efi_tpm_eventlog *log_tbl; >>> ???? struct efi_tcg2_final_events_table *final_tbl; >>> -??? unsigned int tbl_size; >>> +??? int tbl_size; >>> ???? int ret = 0; >> >> >> Do we need to do a "ret = tbl_size;"?? Currently we return success. >> It's a pitty that tpm2_calc_event_log_size() returns a -1 instead of >> -EINVAL. >> >> regards, >> dan carpenter >> > > perhaps "ret = -EINVAL;"? Currently nothing checks the return value of > efi_tpm_eventlog_init though. I doubt I'll fix that for my current fix as a V2.