Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4188047pxj; Tue, 8 Jun 2021 08:26:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7NLi6lLa0T8WUHPsJDSMi6CrtaxLovwB/mQPmyujpu/FYi5w0hVV5r3y6R2xX0GKn138Y X-Received: by 2002:aa7:dd55:: with SMTP id o21mr26446079edw.295.1623165972818; Tue, 08 Jun 2021 08:26:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623165972; cv=none; d=google.com; s=arc-20160816; b=fkdzrb6agUaxrJzcPNon5/kEdlkRcVKnLPVt4mwiMokTWqnc0yVpkRydeiN8qIMcNk b6dLZkbUaK4egfthbBinpq6SeojkZfxsiyJTb0nxQTa2pYskdDdU9mSwNr2Ir5J0Mjt/ BRh2JuCll+CGjPJBcqimD50PrnnkSD73diZppL7zm/ZNJBPSoE8rJc1pSfZ82uk6nEA9 HNr14EcEslAcbN3LGOytNi7VaMysXRVc3/DZQzou6JkAwGlszJFYmCe/gcGkJf1y+1mi IhirH1fQHILHmaBmkgdiwHYHoAzqGIPRlv+7cXVGjOg93TQAg68T0U7+e2wORQrbpup7 0ZyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=tlzbD36mbpoKaBRnbRkXR8s40ZrtwRyL2V78AxzJ2PA=; b=wotQMAGIfuxtneM9G/KTGNQXxdZnA5r2ssdyYNlGwXgi37hRffshZTBpRnv92TZdWK Ax3uXUQsBbYN8S5NgQKYb80mftstOQQN3njSZaZNisYca4dXZx/t3XKpAjY4OitrJjwk INCtPi4CrLZuWTaFm1nKi65KZnEarJi3ayQUm7TU7RgBzEhAZxTyrQoRAeOaN6HY1l9m Q+bvxoSsX5LlpGU/g/2SsmnmLFmdNBHwlTS5+ImL3aAIdJAIdo0NNLwFADfnwDzMGv+j ZnCagCOifO9znRujfcEdfpo1mgNdCobhwhEmLjAjZ19qQV/EXyF2H3Z7G5Zz6OSScT01 NQYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si23960edy.29.2021.06.08.08.25.49; Tue, 08 Jun 2021 08:26:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231811AbhFHPZG (ORCPT + 99 others); Tue, 8 Jun 2021 11:25:06 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:38424 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230463AbhFHPYw (ORCPT ); Tue, 8 Jun 2021 11:24:52 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from ) id 1lqdZ9-0005al-9X; Tue, 08 Jun 2021 15:22:55 +0000 From: Colin King To: "David S . Miller" , Jakub Kicinski , Oleksij Rempel , linux-usb@vger.kernel.org, netdev@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/2][next] net: usb: asix: ax88772: net: Fix less than zero comparison of a u16 Date: Tue, 8 Jun 2021 16:22:49 +0100 Message-Id: <20210608152249.160333-2-colin.king@canonical.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210608152249.160333-1-colin.king@canonical.com> References: <20210608152249.160333-1-colin.king@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King The comparison of the u16 priv->phy_addr < 0 is always false because phy_addr is unsigned. Fix this by assigning the return from the call to function asix_read_phy_addr to int ret and using this for the less than zero error check comparison. Addresses-Coverity: ("Unsigned compared against 0") Fixes: 7e88b11a862a ("net: usb: asix: refactor asix_read_phy_addr() and handle errors on return") Signed-off-by: Colin Ian King --- drivers/net/usb/ax88172a.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/usb/ax88172a.c b/drivers/net/usb/ax88172a.c index 2e2081346740..e24773bb9398 100644 --- a/drivers/net/usb/ax88172a.c +++ b/drivers/net/usb/ax88172a.c @@ -205,7 +205,8 @@ static int ax88172a_bind(struct usbnet *dev, struct usb_interface *intf) goto free; } - priv->phy_addr = asix_read_phy_addr(dev, priv->use_embdphy); + ret = asix_read_phy_addr(dev, priv->use_embdphy); + priv->phy_addr = ret; if (priv->phy_addr < 0) { ret = priv->phy_addr; goto free; -- 2.31.1