Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755632AbdGXUoO (ORCPT ); Mon, 24 Jul 2017 16:44:14 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:42760 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754142AbdGXUoJ (ORCPT ); Mon, 24 Jul 2017 16:44:09 -0400 Date: Mon, 24 Jul 2017 13:44:08 -0700 (PDT) Message-Id: <20170724.134408.1220348031618074380.davem@davemloft.net> To: sean.wang@mediatek.com Cc: john@phrozen.org, nbd@openwrt.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mediatek@lists.infradead.org Subject: Re: [PATCH v2 net] net: ethernet: mediatek: avoid potential invalid memory access From: David Miller In-Reply-To: References: X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 24 Jul 2017 13:44:08 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 475 Lines: 14 From: Date: Sat, 22 Jul 2017 20:45:55 +0800 > From: Sean Wang > > Potential dangerous invalid memory might be accessed if invalid mac value > reflected from the forward port field in rxd4 caused by possible potential > hardware defects. So added a simple sanity checker to avoid the kind of > situation happening. > > Signed-off-by: Sean Wang > Acked-by: John Crispin Applied.