From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: Re: [PATCH] tools/bpftool: silence a static check warning Date: Mon, 15 Jan 2018 11:35:06 +0100 Message-ID: <2c2c2cf6-acf2-af9f-83ef-21dbcd0a5551@iogearbox.net> References: <20180115081547.bf2u3aqitnm3bmtl@mwanda> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, kernel-janitors@vger.kernel.org To: Dan Carpenter , Alexei Starovoitov Return-path: Received: from www62.your-server.de ([213.133.104.62]:60296 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755341AbeAOKfM (ORCPT ); Mon, 15 Jan 2018 05:35:12 -0500 In-Reply-To: <20180115081547.bf2u3aqitnm3bmtl@mwanda> Content-Language: en-US Sender: netdev-owner@vger.kernel.org List-ID: Hi Dan, On 01/15/2018 09:15 AM, Dan Carpenter wrote: > There is a static checker warning that proglen has an upper bound but no > lower bound. The allocation will just fail harmlessly so it's not a big > deal. > > Signed-off-by: Dan Carpenter > > diff --git a/tools/bpf/bpf_jit_disasm.c b/tools/bpf/bpf_jit_disasm.c > index 30044bc4f389..2d7bb5dc0b8c 100644 > --- a/tools/bpf/bpf_jit_disasm.c > +++ b/tools/bpf/bpf_jit_disasm.c > @@ -205,7 +205,7 @@ static uint8_t *get_last_jit_image(char *haystack, size_t hlen, > regfree(®ex); > return NULL; > } > - if (proglen > 1000000) { > + if (proglen < 0 || proglen > 1000000) { Could you just change proglen into unsigned? It's parsing the bpf_jit_dump() and there we use proglen=%u anyway. > printf("proglen of %d too big, stopping\n", proglen); > return NULL; > } > Thanks, Daniel