From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751596AbcGNLad (ORCPT ); Thu, 14 Jul 2016 07:30:33 -0400 Received: from aserp1040.oracle.com ([141.146.126.69]:25339 "EHLO aserp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751560AbcGNLa2 (ORCPT ); Thu, 14 Jul 2016 07:30:28 -0400 Date: Thu, 14 Jul 2016 14:30:16 +0300 From: Dan Carpenter To: Ursula Braun Cc: Martin Schwidefsky , Heiko Carstens , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org Subject: [patch] netiucv: silence an underflow warning Message-ID: <20160714113016.GJ18175@mwanda> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.6.0 (2016-04-01) X-Source-IP: aserv0022.oracle.com [141.146.126.234] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I haven't looked at the implications but we accidentally allow bs1 to be negative. It makes my static checker complain. Signed-off-by: Dan Carpenter diff --git a/drivers/s390/net/netiucv.c b/drivers/s390/net/netiucv.c index b0e8ffd..85a5744 100644 --- a/drivers/s390/net/netiucv.c +++ b/drivers/s390/net/netiucv.c @@ -1578,7 +1578,7 @@ static ssize_t buffer_write (struct device *dev, struct device_attribute *attr, *e); return -EINVAL; } - if (bs1 > NETIUCV_BUFSIZE_MAX) { + if (bs1 < 0 || bs1 > NETIUCV_BUFSIZE_MAX) { IUCV_DBF_TEXT_(setup, 2, "buffer_write: buffer size %d too large\n", bs1);