Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp926910ybh; Tue, 10 Mar 2020 10:58:21 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvE+hn508iJYnemVNA1SYavAW6AV9zwb5hatq7J4HLsGMgTtYyHlYWuXw8/jKjRnM6XwaWk X-Received: by 2002:aca:1319:: with SMTP id e25mr1974951oii.4.1583863101586; Tue, 10 Mar 2020 10:58:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583863101; cv=none; d=google.com; s=arc-20160816; b=ckdvGp8dtJrv4bks3lfdbnyWG3mWVBNTzbPp+PRntp3rR7+X7GVZ1V9pd8GvPwZfFh hVgkqUqXHX6HN1d2oIDpmRKTUoycrGCf2GAzq9xvItdY6lO47QOY14XjSTCnLTu4RWyM Q7uBya9JkJf8cBIqVr5HWURCHojGJ35y2kjTQDU8xE9KQiR/wGSvn+REbRDqePJCuTLd ZWFCBM6CwmzG7INClSiHwCs0EMx5sj+QOXYbC87smLPs/8dd0EvXv0OdVzRtngO0uPEv E/6W/4SOTR4M5T3rN+QU0WwjOhjLQi5vYQTytQA1S/qKU9mnxkzv0G4LpkVlHPatcccb CSqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=l+KTk0oh5PS89rpVNJOhxUeEwOxL9f315/ZTVj0gI5U=; b=JS6yYATHZq+DnaITj0JOx5yvY/tTuWc1BPrIJccWrtxUwW4oA/54++bXpIfmsxzDIH Xvthju02m7ec2xKyoj+eKvkqWpc9N5AquyF9ht4g1U2u46W/ZLKDhfrlqMwzIVTGHIsZ u6ZWpdQ0+HUv6Ddu/HdUP0GIWZsq5gIw4DYMSXpmhgnoCE5+MtLkrpKGr6MSLm52QRvI wR3xeiuTvq49n+gAjw1h7ZVEyS929CvbvJvyavJYNB9UlYNLUMLHFgieB3L3W5VxTg63 DCvUqJt+22+gN1T7tM6DxCEd/5IGI+ygamiGs30lBEIOmmmh3i0AGhD3cU2tWOIx297o NWxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@bfs.de header.s=dkim201901 header.b=HGKCnRqv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7si501618oij.97.2020.03.10.10.58.08; Tue, 10 Mar 2020 10:58:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@bfs.de header.s=dkim201901 header.b=HGKCnRqv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726467AbgCJR5y (ORCPT + 99 others); Tue, 10 Mar 2020 13:57:54 -0400 Received: from mx01-muc.bfs.de ([193.174.230.67]:38018 "EHLO mx01-muc.bfs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726271AbgCJR5y (ORCPT ); Tue, 10 Mar 2020 13:57:54 -0400 Received: from SRVEX01-SZ.bfs.intern (exchange-sz.bfs.de [10.129.90.31]) by mx01-muc.bfs.de (Postfix) with ESMTPS id C4BD3203A9; Tue, 10 Mar 2020 18:57:52 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bfs.de; s=dkim201901; t=1583863072; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=l+KTk0oh5PS89rpVNJOhxUeEwOxL9f315/ZTVj0gI5U=; b=HGKCnRqvi3RsffKtAtxs2JnxVYQ7lmcyLnj75nvtxvmUCTAUOvYbL4NlMPMDsCd7HRB2gc dcW4tfxI2G0ygVzq90EPbo/8JnRmxFyOlf1MH4iuJZQa4cfVaxu8himrwB0eiNob3xb3m/ 9MZvt9I6QFiZUbHHkRwW1Xld20b8jJtmX2xGC+UCfXDFAU3/Z2md9JwDLU+T/iUkzRbASD Vq/405dtOFCb6/nYJb9o00OqZzJGkKYufXkUhjFvrEBWhNo7xRwKyYMEmQoABkDr/uzN0A fk0S7XJB0XnmsRWNPtxcRIR8W+Yyc6E1eTQcKhnud78CWu7l1kANMKFX+23wDA== Received: from SRVEX01-SZ.bfs.intern (10.129.90.31) by SRVEX01-SZ.bfs.intern (10.129.90.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1913.5; Tue, 10 Mar 2020 18:57:18 +0100 Received: from SRVEX01-SZ.bfs.intern ([fe80::7d2d:f9cb:2761:d24a]) by SRVEX01-SZ.bfs.intern ([fe80::7d2d:f9cb:2761:d24a%6]) with mapi id 15.01.1913.005; Tue, 10 Mar 2020 18:57:18 +0100 From: Walter Harms To: Dan Carpenter CC: "Tigran A. Aivazian" , "linux-kernel@vger.kernel.org" , "kernel-janitors@vger.kernel.org" Subject: AW: [PATCH] bfs: prevent underflow in bfs_find_entry() Thread-Topic: [PATCH] bfs: prevent underflow in bfs_find_entry() Thread-Index: AQHV9EblEVE9iA1yzEeR1GKKiiXYdag/8IotgAGMlQCAAKOu/A== Date: Tue, 10 Mar 2020 17:57:18 +0000 Message-ID: References: <20200307060808.6nfyqnp2woq7d3cv@kili.mountain> ,<20200310090644.GA11583@kadam> In-Reply-To: <20200310090644.GA11583@kadam> Accept-Language: de-DE, en-US Content-Language: de-DE X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.137.16.40] Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Spam-Status: No, score=0.03 Authentication-Results: mx01-muc.bfs.de X-Spamd-Result: default: False [0.03 / 7.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; BAYES_SPAM(0.03)[51.61%]; FREEMAIL_ENVRCPT(0.00)[gmail.com]; DKIM_SIGNED(0.00)[]; NEURAL_HAM(-0.00)[-0.991,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_CC(0.00)[gmail.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ________________________________________ Von: Dan Carpenter Gesendet: Dienstag, 10. M=E4rz 2020 10:06 An: Walter Harms Cc: Tigran A. Aivazian; linux-kernel@vger.kernel.org; kernel-janitors@vger.= kernel.org Betreff: Re: [PATCH] bfs: prevent underflow in bfs_find_entry() On Mon, Mar 09, 2020 at 08:40:28AM +0000, Walter Harms wrote: > hi Dan, > the namelen usage is fishy. It goes into bfs_namecmp() > where it is checked for namelen < BFS_NAMELEN, leaving > only the case =3D=3D. The rule in bfs_namecmp() is that the name has to be NUL terminated if there is enough space. that raises the question why is there a len paramter in the first place. Surely the writer can make sure that there is always a NUL terminated string, then it would be possible the use a simple strcmp() and the range check is useless and can be removed. seems a question for the maintainer. re, wh