Received: by 10.192.165.148 with SMTP id m20csp1660869imm; Thu, 3 May 2018 03:22:00 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqNNvPFf1EMaaQa77Z10uHFClsXkU7NHZUxVCb6JdzIasFJYWlRdr4V/y+8kluAtH1d0NhN X-Received: by 2002:a65:56c2:: with SMTP id w2-v6mr4404568pgs.381.1525342920026; Thu, 03 May 2018 03:22:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525342919; cv=none; d=google.com; s=arc-20160816; b=gt1URomJCq+VwAuu/Tie5NbVs+qcV2ia2ZWAEOH9A4lz/3qHmeJ8nZVnjABbkc4dCP 5Z9Wnk8vUElE7YjZp2j48jeJJD7SS35Pv2rx8xNdLNmN15SpfTBsFuZ/o7r6HOtL72T6 INE44qxv6sht+XXJSQW1eTEULOe7ltOWNvAU10kXgs4NNtlYDOCQDxE1Z0rqcIenpYjQ kV60CzS0a/tQt2p3k9Jh1GSsgnvHPwJ/9Hupi63gkVC4zsDHU0VZRHDBPzfOTj1jQ3fY b7EaX8j4S3+a1+1dRANMSpqSHQ0d1tLUM55VHFPdrZ10axadJBwWg2EcZ3UD5NHGIpsg Di9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=mz5ciXNn4qA6ZNLl2CYMIkPeCU9tJu85b2xS23ANBOk=; b=RpYpmaUFADZo9WJgI2tFJ9NiBrsdU22ZAY1inVVwvTRz/H6xpF54BgYqkFXqYCA/P0 HcoDRDWVv61Y5IKV2l+/2qriqHIibx1aFHJmOAKYp3CWDQTsl+x5qdU84hrcNfU8uPWs fuxwDXIxsIG1PW0l99CyklT52MFX00UEjuKe5zVvN2qfTwxFKWj/p0NQWtDHkiX5wtCH 9oFV1nz/TAcmIrd2BA5jz9634WuZwfdkCzltM11FSUyFvxbHec10B88XK3Ig8V+/Hn5y erES9pYW9WZ7SokrCHQ8zMifpZ+Th6MuHmtBwaM8kor7OaP+e6ozwUdlwr+Bo0bG/C78 ZybA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f6-v6si11262892pgc.262.2018.05.03.03.21.45; Thu, 03 May 2018 03:21:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751887AbeECKVi (ORCPT + 99 others); Thu, 3 May 2018 06:21:38 -0400 Received: from mga12.intel.com ([192.55.52.136]:34661 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752036AbeECKVe (ORCPT ); Thu, 3 May 2018 06:21:34 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 May 2018 03:21:33 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,358,1520924400"; d="scan'208";a="38353668" Received: from smile.fi.intel.com (HELO smile) ([10.237.72.86]) by orsmga008.jf.intel.com with ESMTP; 03 May 2018 03:21:29 -0700 Message-ID: <1525342889.21176.636.camel@linux.intel.com> Subject: Re: [PATCH v2 0/3] Few NFC fixes from android-4.14 tree From: Andy Shevchenko To: Amit Pundir , lkml , linux-wireless@vger.kernel.org Cc: Suren Baghdasaryan , Samuel Ortiz , Christophe Ricard , Greg KH , John Stultz , Dmitry Shmidt , Todd Kjos , Android Kernel Team Date: Thu, 03 May 2018 13:21:29 +0300 In-Reply-To: <1525283288-7027-1-git-send-email-amit.pundir@linaro.org> References: <1525283288-7027-1-git-send-email-amit.pundir@linaro.org> Organization: Intel Finland Oy Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.26.5-1+b1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2018-05-02 at 23:18 +0530, Amit Pundir wrote: > Hi, > > Submitting v2 of NFC fixes I picked up from android-4.14 tree[1] > for review and comments. > > Again like to point out that I have not feature tested these patches > at all. Only made small cosmetic changes to the original patches > (removed Android-only tag and internal bug ID) and build tested for > arm, before posting them here for review. > > Really appreciate any comments or feedback on how to take it forward. > > Changes since v1: > * Dropped "NFC: st21nfca: Fix memory OOB and leak issues in > connectivity > events handler" patch for now. I'm yet to verify if the additional > aid_len and params_len checks for buffer size are really required, > and > I didn't want to hold up this patch series for one patch alone. > * Dropped redundant __func__ use dev_dbg() in "NFC: fdp: Fix possible > buffer overflow in WCS4000 NFC driver" patch. > > Also drivers/nfc/fdp/ is full of __func__ parameter usage in > dev_dbg(), > so submitting a new patch separately to clean that up. > After addressing one comment, FWIW, Reviewed-by: Andy Shevchenko > Regards, > Amit Pundir > [1] https://android.googlesource.com/kernel/common/+log/android-4.14 > > Suren Baghdasaryan (3): > NFC: st21nfca: Fix out of bounds kernel access when handling ATR_REQ > NFC: Fix possible memory corruption when handling SHDLC I-Frame > commands > NFC: fdp: Fix possible buffer overflow in WCS4000 NFC driver > > drivers/nfc/fdp/fdp.c | 22 +++++++++++----------- > drivers/nfc/fdp/i2c.c | 29 ++++++++++++++++++----------- > drivers/nfc/st21nfca/dep.c | 3 ++- > net/nfc/hci/core.c | 10 ++++++++++ > 4 files changed, 41 insertions(+), 23 deletions(-) > -- Andy Shevchenko Intel Finland Oy