Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp2235225ybh; Mon, 9 Mar 2020 01:41:21 -0700 (PDT) X-Google-Smtp-Source: ADFU+vume7JTqvgsZLHFzFK+f0cbvvZukJddRyyGhJrGfYjIfl2e1yAY/sOvEPvpGZax6yNU5Cs7 X-Received: by 2002:aca:c506:: with SMTP id v6mr2964630oif.26.1583743281599; Mon, 09 Mar 2020 01:41:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583743281; cv=none; d=google.com; s=arc-20160816; b=02LSEyPSI66BeK27bf5Nlu8oRM4BB3Q0XBW+/k28+6kbWL3qXcw48MFMLkBvxRh/dj Q9XtwCGj1kY6mrEQYwQFfVheafHKEJBFABbtHkzzp1s3yNLpvi3ns1TBQ5V7JwzrmnEU mXQWkFtbNa4CtpGCWoesNfkeKC7RcDpd/4HJ9PjM2n+4SMOUwPSTgy4yzKQoNOkAHbD7 G1lhaDNqchNVdGMnRoxBXFjbF2eXM8eCvYj9uPckC9p12xs0mioP2nKw4b2qSIFW9uBi ythuEHrQmjxssuIyS2AhZ0GSsB2oNrFKp2J4X0xUjL8pw6FcIOg7RPZYR+cDlvvsjPa2 hvfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=FodbOqKeyeMyCZ4IQTFd+GWKlGWuxwo5OizxmI3M9Pc=; b=Izzs47oHsxDIFKporgNOUA7yDxbQsUoAoWEK2GiEazxY40GB0cVQ/L8LVh5carBjxN 2a91O8Ar3EPtK/XhWo0216/d8Ruclj8jRaV57+KCmWAxulc0Ww/4t0pV5UP1ksUEpHSu ed23+yfJ8lJ089eKQjCDzKr1/gvh9oFKx8Bvp3J6SqEgzr8fkTGdnAF6QxEUhwMQRAh/ AKz7ardYrdfjWLf1U9GHiIYUV+xkfg9Ci1G1i4Poe7c1pq5oK3OwNbpOdhNkyNEYd9Do 6UKkYJ4n2uelQWkfCVNdOVR87lgrbr3Dkx8b5zVKVIz1cYRUkr1+KY+V5AMBSYkBM+pR mtnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@bfs.de header.s=dkim201901 header.b=tm6FrPTI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j2si5891853otk.164.2020.03.09.01.41.09; Mon, 09 Mar 2020 01:41:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@bfs.de header.s=dkim201901 header.b=tm6FrPTI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726508AbgCIIkn (ORCPT + 99 others); Mon, 9 Mar 2020 04:40:43 -0400 Received: from mx01-muc.bfs.de ([193.174.230.67]:36452 "EHLO mx01-muc.bfs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726450AbgCIIkn (ORCPT ); Mon, 9 Mar 2020 04:40:43 -0400 Received: from SRVEX01-SZ.bfs.intern (exchange-sz.bfs.de [10.129.90.31]) by mx01-muc.bfs.de (Postfix) with ESMTPS id 459D7203DF; Mon, 9 Mar 2020 09:40:40 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bfs.de; s=dkim201901; t=1583743240; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FodbOqKeyeMyCZ4IQTFd+GWKlGWuxwo5OizxmI3M9Pc=; b=tm6FrPTIru2zahVatlu6aWk9FdbiSp3wHuaNMrF/4sVbF1v4B15GAn3A51KMycIGGDNHDx oHeqT8sLJizvZxG6zbFXLVMYGC1HTrf0s0Z3MpHWEHo3EtGs2KtYilE9M0Z5XZDPTP7UPo 7NnLf9i+0bzhvKuLWvqiNKXDU3dY/7JEMJ7V+JaTYYocdRO4L4MCqQFVUkpYsHdgtq/aDC Sl4Irvkdz0421p9dKgminVuqsYlNvOe/S6h3+M56hWlao+UWtVO/SVLrbps09G7KGmT6XW n75TFZK2cPT8nXw7XVM/Jtp/uPywvzeVYQ0EX/O8p3Lg1co3cdEipcFkF8Yxow== Received: from SRVEX01-SZ.bfs.intern (10.129.90.31) by SRVEX01-SZ.bfs.intern (10.129.90.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1913.5; Mon, 9 Mar 2020 09:40:28 +0100 Received: from SRVEX01-SZ.bfs.intern ([fe80::7d2d:f9cb:2761:d24a]) by SRVEX01-SZ.bfs.intern ([fe80::7d2d:f9cb:2761:d24a%6]) with mapi id 15.01.1913.005; Mon, 9 Mar 2020 09:40:28 +0100 From: Walter Harms To: Dan Carpenter , "Tigran A. Aivazian" CC: "linux-kernel@vger.kernel.org" , "kernel-janitors@vger.kernel.org" Subject: AW: [PATCH] bfs: prevent underflow in bfs_find_entry() Thread-Topic: [PATCH] bfs: prevent underflow in bfs_find_entry() Thread-Index: AQHV9EblEVE9iA1yzEeR1GKKiiXYdag/8Iot Date: Mon, 9 Mar 2020 08:40:28 +0000 Message-ID: References: <20200307060808.6nfyqnp2woq7d3cv@kili.mountain> In-Reply-To: <20200307060808.6nfyqnp2woq7d3cv@kili.mountain> Accept-Language: de-DE, en-US Content-Language: de-DE X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.137.16.40] Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Spam-Status: No, score=-3.00 Authentication-Results: mx01-muc.bfs.de X-Spamd-Result: default: False [-3.00 / 7.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; FREEMAIL_ENVRCPT(0.00)[gmail.com]; DKIM_SIGNED(0.00)[]; NEURAL_HAM(-0.00)[-0.991,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; MID_RHS_MATCH_FROM(0.00)[]; BAYES_HAM(-3.00)[99.99%] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ________________________________________ Von: kernel-janitors-owner@vger.kernel.org im Auftrag von Dan Carpenter Gesendet: Samstag, 7. M=E4rz 2020 07:08 An: Tigran A. Aivazian Cc: linux-kernel@vger.kernel.org; kernel-janitors@vger.kernel.org Betreff: [PATCH] bfs: prevent underflow in bfs_find_entry() We check if "namelen" is larger than BFS_NAMELEN but we don't check if it's less than zero so it causes a static checker. fs/bfs/dir.c:346 bfs_find_entry() warn: no lower bound on 'namelen' It's nicer to make it unsigned anyway. Signed-off-by: Dan Carpenter --- fs/bfs/dir.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/bfs/dir.c b/fs/bfs/dir.c index d8dfe3a0cb39..46a2663e5eb2 100644 --- a/fs/bfs/dir.c +++ b/fs/bfs/dir.c @@ -326,7 +326,7 @@ static struct buffer_head *bfs_find_entry(struct inode = *dir, struct buffer_head *bh =3D NULL; struct bfs_dirent *de; const unsigned char *name =3D child->name; - int namelen =3D child->len; + unsigned int namelen =3D child->len; *res_dir =3D NULL; if (namelen > BFS_NAMELEN) hi Dan, the namelen usage is fishy. It goes into bfs_namecmp() where it is checked for namelen < BFS_NAMELEN, leaving only the case =3D=3D. bfs_namecmp() expects an int, so i would expect a warning. Perhaps in this case it is better to change the if() into if ( namelen <=3D 0 || namelen >=3D BFS_NAMELEN) return NULL; note: bfs_add_entry has the same "issue" jm2c, re, wh -- 2.11.0