lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Jun 2017 16:20:42 +0300 From: Amir Vadai <amir@...ai.me> To: Dan Carpenter <dan.carpenter@...cle.com> Cc: Jamal Hadi Salim <jhs@...atatu.com>, Cong Wang <xiyou.wangcong@...il.com>, Jiri Pirko <jiri@...nulli.us>, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org, kernel-janitors@...r.kernel.org Subject: Re: [PATCH net] net/act_pedit: fix an error code On Wed, Jun 14, 2017 at 01:29:31PM +0300, Dan Carpenter wrote: > I'm reviewing static checker warnings where we do ERR_PTR(0), which is > the same as NULL. I'm pretty sure we intended to return ERR_PTR(-EINVAL) > here. Sometimes these bugs lead to a NULL dereference but I don't > immediately see that problem here. > > Fixes: 71d0ed7079df ("net/act_pedit: Support using offset relative to the conventional network headers") > Signed-off-by: Dan Carpenter <dan.carpenter@...cle.com> > You are right, it was intended to be -EINVAL. Thanks. Acked-by: Amir Vadai <amir@...ai.me>
Powered by blists - more mailing lists