Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1346570ybp; Thu, 17 Oct 2019 11:23:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqzu2TS2gKcD9OP9LCbiN/M2CNuM4WBKDVCeDIrha7myUSUptPhN2WU6UPUJFfmZ2kJ0Uyl/ X-Received: by 2002:aa7:d304:: with SMTP id p4mr5296162edq.224.1571336605905; Thu, 17 Oct 2019 11:23:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571336605; cv=none; d=google.com; s=arc-20160816; b=VfU2kRvvR1Oqag30HpHrmtSnDBa4rGETzy/Jw0vNsFAomMvet59MzlTBtCX2n6z9dR RIZ8x9rnCb9dXFqpg36NYfweRSvftxQxjZaiwXHwDQNFSVjiZ2tX2cIp89jW3PrIGVO1 6eOkdsVPWYkaX15c0EbCYjYN4ZdlATZpqXmE+uO8N8+aRnqIgVLE1aQDBKV/WZruOXw1 c2yJlBog/i7V65fkaNJx7PWhcWRWanjinUSZHTbor45qWSx4+Eldl1MTrC0fmMsvFVA7 wTVT9xuq/WjUPcwvi5e84EgKyX1gL/L5tUfqWcNMkJsPMqSoZ48DKT/pj2r1z3Uat39G zcQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JeRO6oMw8haMonhK/pNbhlvIY0hRuNerVH9klfq9vSE=; b=pIRWpgtDee9aeFyBUoovSsrFjn6mQ3xyQBDcThRnsswJtlsYWuu9WD6rSiz5PRjMTu 4HM0VuS2A3HFK7uVv1v6RHTRdtWoCRRkN6idMr3egMNudsm/d6+pZoZVphHU16celd0o WbODZbdIey5nzr5asykb7G/39CxPYTjlXmQ5dtDB7Kh45bAJFuALrHMYcI+iuQiIt4tg jvgRofneftfsJVZ7M7o01M4h9JnA0v/FKcNQ6M6k7n93NP2K7WrE6hSQBECVcWXhLXO/ lEkUdMSlbX2T4t3p2gn+AGHJVt2G9DjUs6oBVM70hXI1uTpHouoIZkTIS+cfyn3HDm8d 7vtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V2vGkloX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o32si2222192edb.63.2019.10.17.11.23.03; Thu, 17 Oct 2019 11:23:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V2vGkloX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388165AbfJPWC1 (ORCPT + 99 others); Wed, 16 Oct 2019 18:02:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:54888 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2438611AbfJPV7o (ORCPT ); Wed, 16 Oct 2019 17:59:44 -0400 Received: from localhost (unknown [192.55.54.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0F986222C5; Wed, 16 Oct 2019 21:59:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571263184; bh=BykSuC2M0KsUSDjDN+Qux96Y+qA/cbufw6DyvJBIPU0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=V2vGkloXXPt4744b1CUxKC3MOtGztMKwG6KDgk0t636Rkx/s2r+i2ayOAyiTsBt0k A8wwy1GxKPvjkbg3CmfZePQwZQB7awg1jrP8D05x4ba99uJ95tB1+CECEaSgsfiYWd D4ZbfND0H6BSDGc+Sbq1nd9LzeKYEYvyqWlA/aOk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Ard Biesheuvel , Jerry Snitselaar , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , kernel-janitors@vger.kernel.org, linux-efi@vger.kernel.org, Ingo Molnar Subject: [PATCH 5.3 111/112] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero Date: Wed, 16 Oct 2019 14:51:43 -0700 Message-Id: <20191016214907.521785772@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191016214844.038848564@linuxfoundation.org> References: <20191016214844.038848564@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King commit be59d57f98065af0b8472f66a0a969207b168680 upstream. Currently the check for tbl_size being less than zero is always false because tbl_size is unsigned. Fix this by making it a signed int. Addresses-Coverity: ("Unsigned compared against 0") Signed-off-by: Colin Ian King Cc: Ard Biesheuvel Cc: Jerry Snitselaar Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: kernel-janitors@vger.kernel.org Cc: linux-efi@vger.kernel.org Fixes: e658c82be556 ("efi/tpm: Only set 'efi_tpm_final_log_size' after successful event log parsing") Link: https://lkml.kernel.org/r/20191008100153.8499-1-colin.king@canonical.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/tpm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/firmware/efi/tpm.c +++ b/drivers/firmware/efi/tpm.c @@ -40,7 +40,7 @@ int __init efi_tpm_eventlog_init(void) { struct linux_efi_tpm_eventlog *log_tbl; struct efi_tcg2_final_events_table *final_tbl; - unsigned int tbl_size; + int tbl_size; int ret = 0; if (efi.tpm_log == EFI_INVALID_TABLE_ADDR) {