Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp115591yba; Tue, 23 Apr 2019 20:50:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqx52ypTgwNmNGSVg3QcnVG6JHy6aPyeBkr2DiwgvKwpHar6TTNA+M3+KJpjBpHuf/aUldAj X-Received: by 2002:a17:902:e683:: with SMTP id cn3mr30171700plb.115.1556077836518; Tue, 23 Apr 2019 20:50:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556077836; cv=none; d=google.com; s=arc-20160816; b=jAHtcTosoqcAkG3t2lJZ89fACd1v9HaBZRUa7NbMUYwBg4udSIWnSLMCOCyIIRU2FP hyXylSM2lGa9d/wgVDgGJ39yQKKW5iMXzSKwal8v+xslaopoYFyuTtSVVKxKwk/4hEUf AQxej5SvzwliFP7TQ7juDhdSPFy4XM5stbyeEs4DUlT/d+DYpC+J8f5kfsdE+IMv7mTI jRyqIm6ILCPvUmij74H3gZRb2J5Xtvbc5vdOoSPjhzi4Tf+XuCqTGlkhWAEL5MGnoT2M 3zp0R5BRGXm1CwmYinPfTeCWR1UAoX5st/RUJZXt8mE1fT9qp/6VhuLzjzZbzXqqlQhn uBYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:to:from:subject:message-id :dkim-signature:dkim-signature; bh=TMK4saVMes0u+ASfn2Ds/1ITfBfjKM5mlrv8N7Sg0M8=; b=E9gMqThTTVdHpy/TtpMZ2M7uWXyuiBv0Oy9N2Esl7p+ec6WosFrbmFcG6c4rcK00YB O914skAQlWebu7aYtw4X1KSJqh05t89Y1aHnt8+ntma2bRhht6nh+f5mD0+pv/QJQ1lr H5WlFVbpyCkRuBxy3ZLhYM4lNjt+dVz0IjWs6bMywybmBXdZrJndAne/pOPe0qxU8bE9 M8d/I+Aj+lzEeXyIaqENGYK5cdb5Mz6xW0rOzY3B+hpPZ5NNFwIUB/4h2o+iUMZu9UaG 74dghMg1fjvlFISaopLLA0XvjnjveAkdYrf/H6x3JyNH5JELxYhJEmpAgJI4E2xFptPS zYVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mendozajonas.com header.s=fm2 header.b=DY3zWe4J; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=z8n6nZAY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ck11si11367922plb.170.2019.04.23.20.50.20; Tue, 23 Apr 2019 20:50:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@mendozajonas.com header.s=fm2 header.b=DY3zWe4J; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=z8n6nZAY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728915AbfDXDta (ORCPT + 99 others); Tue, 23 Apr 2019 23:49:30 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:50295 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726920AbfDXDta (ORCPT ); Tue, 23 Apr 2019 23:49:30 -0400 Received: from compute2.internal (compute2.nyi.internal [10.202.2.42]) by mailout.nyi.internal (Postfix) with ESMTP id 824E1205B8; Tue, 23 Apr 2019 23:49:27 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Tue, 23 Apr 2019 23:49:27 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= mendozajonas.com; h=message-id:subject:from:to:date:in-reply-to :references:content-type:mime-version:content-transfer-encoding; s=fm2; bh=TMK4saVMes0u+ASfn2Ds/1ITfBfjKM5mlrv8N7Sg0M8=; b=DY3zW e4JAoM2pHOihbCulxIzmOizA6AV6drKcrS6XRFVT8ps+cahyw4vPdiGCW+DXu1y8 jQ5jeC6pPVFX+AB3E+uYDXOp758r5Lf7ScQkT1tdowwdb7m6gwLU5nKbfBGkc2VA N1JH4O3OJEPuZl+RjCU30ihWJ/4pFs/Si8mUgjIcyBC98T5LsflIaaSJk4dY5hpO v+cguuCb/4oXnTFWlxIWxfSXUNMc71WzRbfSPx9ezX7Wqmd5cMEbNHdrQWiT4bgZ Az8I3yxV5xgdQRIPz1ZFKk7XJle9yXLm64iIiZOHpZlnM/v/77k8r8VqqPk831yh vxDwN5SmYnFeX6IxQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm2; bh=TMK4saVMes0u+ASfn2Ds/1ITfBfjKM5mlrv8N7Sg0 M8=; b=z8n6nZAYEUUvQxCg9RtP3SU80RiE6IY2DsjeenGNz4xEJfUTByaSe3quh F4gkgR27hV+WhbOJeVj59jEKfIIqVvSdBVCzK7+Armv9mNgHuohRpACIHjt8bt3/ 2vyQpb/yEIpiVEDccDUbGPS6U6tpz4E/3RBYZsuuCSFMzjHQcxYL1nLZbTm8ZL6w oM3KkuQIJuf70o2r1Tc5dFZt3qs38qcf4Gbf9QyqFlJJMMSeZ2MK5Z6xDF4x7Niu woOiXdaaWMmaX5l14sXnNAqCEhmFecYmM3jKtUtnpsNDB9zIL2gZllE0INkn+P8i AEvLdR80mkojrdHyHgHcjfpGaye5w== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrgeelgdejhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefkuffhvfffjghftggfggfgsehtjeertddtreejnecuhfhrohhmpefurghmuhgv lhcuofgvnhguohiirgdqlfhonhgrshcuoehsrghmsehmvghnughoiigrjhhonhgrshdrtg homheqnecukfhppeduvddvrdelledrkedvrddutdenucfrrghrrghmpehmrghilhhfrhho mhepshgrmhesmhgvnhguohiirghjohhnrghsrdgtohhmnecuvehluhhsthgvrhfuihiivg eptd X-ME-Proxy: Received: from v4 (unknown [122.99.82.10]) by mail.messagingengine.com (Postfix) with ESMTPA id 03182E424F; Tue, 23 Apr 2019 23:49:21 -0400 (EDT) Message-ID: Subject: Re: [PATCH net v4] net/ncsi: handle overflow when incrementing mac address From: Samuel Mendoza-Jonas To: Tao Ren , "David S . Miller" , Maxim Mikityanskiy , Bartosz Golaszewski , Jakub Kicinski , Joel Stanley , Andrew Jeffery , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "openbmc@lists.ozlabs.org" Date: Wed, 24 Apr 2019 13:49:17 +1000 In-Reply-To: <20190424014310.24253-1-taoren@fb.com> References: <20190424014310.24253-1-taoren@fb.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2019-04-24 at 01:43 +0000, Tao Ren wrote: > Previously BMC's MAC address is calculated by simply adding 1 to the > last byte of network controller's MAC address, and it produces incorrect > result when network controller's MAC address ends with 0xFF. > > The problem can be fixed by calling eth_addr_inc() function to increment > MAC address; besides, the MAC address is also validated before assigning > to BMC. > > Fixes: cb10c7c0dfd9 ("net/ncsi: Add NCSI Broadcom OEM command") > Signed-off-by: Tao Ren Acked-by: Samuel Mendoza-Jonas > --- > include/linux/etherdevice.h | 12 ++++++++++++ > net/ncsi/ncsi-rsp.c | 6 +++++- > 2 files changed, 17 insertions(+), 1 deletion(-) > > Changes in v4: > - revert the changes in eth_addr_dec() function comment. > Changes in v3: > - squash changes in "etherdevice.h" into this patch. > - fix format issue in function comment. > Changes in v2: > - increment MAC address by calling eth_addr_inc() function. > - validate MAC address before assigning to BMC. > > diff --git a/include/linux/etherdevice.h b/include/linux/etherdevice.h > index e2f3b21cd72a..aa8bfd6f738c 100644 > --- a/include/linux/etherdevice.h > +++ b/include/linux/etherdevice.h > @@ -448,6 +448,18 @@ static inline void eth_addr_dec(u8 *addr) > u64_to_ether_addr(u, addr); > } > > +/** > + * eth_addr_inc() - Increment the given MAC address. > + * @addr: Pointer to a six-byte array containing Ethernet address to increment. > + */ > +static inline void eth_addr_inc(u8 *addr) > +{ > + u64 u = ether_addr_to_u64(addr); > + > + u++; > + u64_to_ether_addr(u, addr); > +} > + > /** > * is_etherdev_addr - Tell if given Ethernet address belongs to the device. > * @dev: Pointer to a device structure > diff --git a/net/ncsi/ncsi-rsp.c b/net/ncsi/ncsi-rsp.c > index dc07fcc7938e..802db01e3075 100644 > --- a/net/ncsi/ncsi-rsp.c > +++ b/net/ncsi/ncsi-rsp.c > @@ -11,6 +11,7 @@ > #include > #include > #include > +#include > #include > > #include > @@ -667,7 +668,10 @@ static int ncsi_rsp_handler_oem_bcm_gma(struct ncsi_request *nr) > ndev->priv_flags |= IFF_LIVE_ADDR_CHANGE; > memcpy(saddr.sa_data, &rsp->data[BCM_MAC_ADDR_OFFSET], ETH_ALEN); > /* Increase mac address by 1 for BMC's address */ > - saddr.sa_data[ETH_ALEN - 1]++; > + eth_addr_inc((u8 *)saddr.sa_data); > + if (!is_valid_ether_addr((const u8 *)saddr.sa_data)) > + return -ENXIO; > + > ret = ops->ndo_set_mac_address(ndev, &saddr); > if (ret < 0) > netdev_warn(ndev, "NCSI: 'Writing mac address to device failed\n"); > -- > 2.17.1 >