From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH] net/ncsi: prevent a couple array underflows Date: Thu, 17 May 2018 16:28:07 -0400 (EDT) Message-ID: <20180517.162807.2024433602650608102.davem@davemloft.net> References: <20180517123336.GB7655@mwanda> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: sam@mendozajonas.com, netdev@vger.kernel.org, gwshan@linux.vnet.ibm.com, kernel-janitors@vger.kernel.org To: dan.carpenter@oracle.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:34660 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752112AbeEQU2K (ORCPT ); Thu, 17 May 2018 16:28:10 -0400 In-Reply-To: <20180517123336.GB7655@mwanda> Sender: netdev-owner@vger.kernel.org List-ID: From: Dan Carpenter Date: Thu, 17 May 2018 15:33:36 +0300 > We recently refactored this code and introduced a static checker > warning. Smatch complains that if cmd->index is zero then we would > underflow the arrays. That's obviously true. > > The question is whether we prevent cmd->index from being zero at a > different level. I've looked at the code and I don't immediately see > a check for that. > > Fixes: 062b3e1b6d4f ("net/ncsi: Refactor MAC, VLAN filters") > Signed-off-by: Dan Carpenter Applied to net-next, thanks Dan.