Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp982284pxb; Fri, 15 Apr 2022 17:21:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyj0HarzwXK0SRLfyYKL1OjS5TDAZz4PF1M0zu1Mvzri3sRNJQW6/zwKObtWyAH95Vj94JK X-Received: by 2002:a63:6a04:0:b0:398:6e02:60d4 with SMTP id f4-20020a636a04000000b003986e0260d4mr1089680pgc.509.1650068463105; Fri, 15 Apr 2022 17:21:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650068463; cv=none; d=google.com; s=arc-20160816; b=xsVCoyRdO7Y9MRvQFcDRalAdQFEERPqB2QH4+QSbLqXXBVmrpoWXh/FZbsG1sRbAXT tPHe9+yKwtBEtP4xhdkEht/ymBF65ZcCK8cljwbdGISXlWVJP/UT+0RAbOKltn+rSqOJ 4RnAP5FbailLFHA1kgreOQahEhGT2ZsurqHB7gHrP4fHCV0IW3nboBnLI4djQv55znBh WQTcTrEfTMUkoEjwJMtyVF9M7irPqVp4KgQDRtxapdUGdNEbHC4aD1R3J4g+8qXmy2hA gbPukI/LL4Px61eBb88SXQVKHOsB1elhYAeyxXw4oC41xhSCmTvdafpjb4uwZbMZIkNH RHrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=TVPA51T3z8Tq/7MYAqbq1yDKq381R8LA5YdbokvM7Z4=; b=GnTOeKEZe27o7FVyj5P55sM1rocsKJ6CTV4m251kB3XDVEuUo9ujJKj+ODy1nVszc/ RHzG2R9lj0HdhstFHrrrJUx7qLJBhFfem4mhrITrG7jdJzpPYy56ynWVDwHDbtWjLVvY GJd5mt7u1LY23ZX2FDO4adDEBzXlZRyfq3ruxgJRA1yMGUl4z2MgZXvQMAZiui4+gQ5w iGzS2echenO3+Uc/fh9XuVCm4SNCSidQ+rWsgSZaDMMjNhMfrk+2x7X4e2xP0gKKu/hW gcGdJS8dOcZ8oQMKM1jGgbOKKEJnlLxoCcNoT3rx0JIZ0XgtMBJnWW38L8ZVJ6blrVPA Voqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id 2-20020a620602000000b0050837541590si2686772pfg.373.2022.04.15.17.21.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 17:21:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0C990D3AE6; Fri, 15 Apr 2022 17:19:45 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350977AbiDOHYK (ORCPT + 99 others); Fri, 15 Apr 2022 03:24:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346594AbiDOHYI (ORCPT ); Fri, 15 Apr 2022 03:24:08 -0400 Received: from mail.meizu.com (unknown [14.29.68.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 01BF7972DC for ; Fri, 15 Apr 2022 00:21:39 -0700 (PDT) Received: from IT-EXMB-1-125.meizu.com (172.16.1.125) by mz-mail04.meizu.com (172.16.1.16) with Microsoft SMTP Server (TLS) id 14.3.487.0; Fri, 15 Apr 2022 15:21:39 +0800 Received: from meizu.meizu.com (172.16.137.70) by IT-EXMB-1-125.meizu.com (172.16.1.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Fri, 15 Apr 2022 15:21:37 +0800 From: Haowen Bai To: Greg Kroah-Hartman CC: Haowen Bai , , Subject: [PATCH V4] staging: rtl8192e: Fix signedness bug in rtllib_rx_assoc_resp() Date: Fri, 15 Apr 2022 15:21:35 +0800 Message-ID: <1650007296-31508-1-git-send-email-baihaowen@meizu.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <20220415065810.GQ3293@kadam> References: <20220415065810.GQ3293@kadam> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [172.16.137.70] X-ClientProxiedBy: IT-EXMB-1-126.meizu.com (172.16.1.126) To IT-EXMB-1-125.meizu.com (172.16.1.125) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The rtllib_rx_assoc_resp() function has a signedness bug because it's a declared as a u16 but it return -ENOMEM. When you look at it more closely it returns a mix of error codes including 0xcafe, -ENOMEM, and a->status which is WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG. This is a mess. Clean it up to just return standard kernel error codes. We can print out the a->status before returning a regular error code. The printks in the caller need to be adjusted as well. Signed-off-by: Haowen Bai --- V1->V2: reduce return random value; print its own error message. V2->V3: change commit message; change s16 -> int. V3->V4: add message suggested by Dan Carpenter. If you look up what a->status is, it can only be WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG which is not worth preserving really. drivers/staging/rtl8192e/rtllib_softmac.c | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/drivers/staging/rtl8192e/rtllib_softmac.c b/drivers/staging/rtl8192e/rtllib_softmac.c index 82bf05eb1cbf..38ac733c3245 100644 --- a/drivers/staging/rtl8192e/rtllib_softmac.c +++ b/drivers/staging/rtl8192e/rtllib_softmac.c @@ -1764,7 +1764,7 @@ static void rtllib_softmac_check_all_nets(struct rtllib_device *ieee) spin_unlock_irqrestore(&ieee->lock, flags); } -static inline u16 auth_parse(struct net_device *dev, struct sk_buff *skb, +static inline int auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) { struct rtllib_authentication *a; @@ -1773,7 +1773,7 @@ static inline u16 auth_parse(struct net_device *dev, struct sk_buff *skb, if (skb->len < (sizeof(struct rtllib_authentication) - sizeof(struct rtllib_info_element))) { netdev_dbg(dev, "invalid len in auth resp: %d\n", skb->len); - return 0xcafe; + return -EINVAL; } *challenge = NULL; a = (struct rtllib_authentication *) skb->data; @@ -1787,7 +1787,13 @@ static inline u16 auth_parse(struct net_device *dev, struct sk_buff *skb, return -ENOMEM; } } - return le16_to_cpu(a->status); + + if (a->status) { + netdev_info(ieee->dev, "auth_parse() failed"); + return -EINVAL; + } + + return 0; } static int auth_rq_parse(struct net_device *dev, struct sk_buff *skb, u8 *dest) @@ -2282,7 +2288,7 @@ rtllib_rx_assoc_resp(struct rtllib_device *ieee, struct sk_buff *skb, static void rtllib_rx_auth_resp(struct rtllib_device *ieee, struct sk_buff *skb) { - u16 errcode; + int errcode; u8 *challenge; int chlen = 0; bool bSupportNmode = true, bHalfSupportNmode = false; @@ -2292,8 +2298,7 @@ static void rtllib_rx_auth_resp(struct rtllib_device *ieee, struct sk_buff *skb) if (errcode) { ieee->softmac_stats.rx_auth_rs_err++; netdev_info(ieee->dev, - "Authentication response status code 0x%x", - errcode); + "Authentication response status code %d", errcode); rtllib_associate_abort(ieee); return; } -- 2.7.4