Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp135641yba; Tue, 23 Apr 2019 21:19:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqweSlGMk8742/9jaaY5oQphNp54vqmB1BYg1RzftGWpUfve+xbRXHngAkAqVJrHe0xI+s2v X-Received: by 2002:a63:d10:: with SMTP id c16mr16261839pgl.156.1556079549745; Tue, 23 Apr 2019 21:19:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556079549; cv=none; d=google.com; s=arc-20160816; b=jq6CaV20FEpYtJX7mFW4eFSuT/sriUTNDT7ltzYTw13mBGscwAzB7NDfCmPRu4319k itXMTVc2daD4TDTn914xRWT9o0AbAGl8tMZLfehx3zf8bPGvi1HDvEyQZsAX1GOf+fKk hoC5fRQtQ0YXuURiCDjT7ZI6n5B+cA4XwIiyvB7IYBN8MoaVibhgysXskpl1lkhdoyNZ Ar0PA/8pYGOctPFdu2UZvleua8/+Sj5A5n1OffBJWh+ZSW/WF3xEU9VCivXQAFCAG4RX 5QYl28HKU2jZNEDxV5IR+L43dOuclzQVlniEPOxvkWTljQF+cAg1wTNIRQg/9eFUx2nS etuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=RGEXzJy3tNUqYBbjso9C1rzk1YKVtjrxgvEB96Q30cY=; b=uUnaYDbRB9nE9Ms/9J36NlxEso1i4cas1OXDhVOoTfUh8V/xFmKNYLpyjShw1m7sxe u4Hz0gTMlsIvT6Y8hdtXmgDzlG/IT50yFSxMgfl1fnsU8pvYEoWrwziLhuGFny6/jiC8 yyU9x5OEhqx2P8QVXOm8VS9O6oyB6f0i3cQ72Hfh00M0tR7gKrO33EbfQgqBD+rEtGFA 34lv8fQa9QqczjPkECumuaHxlskMsE+Pr9CS2+h+dx/w8yNEKkiljJ47kF6bj3oNwurg NHyNh/2Z5NXC95Gn37xMXjvQUwKein6qD4fJ/T5STPui/61zx64TSohDZ+WAXJbSLeqp ncCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y10si16812529pga.96.2019.04.23.21.18.54; Tue, 23 Apr 2019 21:19:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727001AbfDXEQW (ORCPT + 99 others); Wed, 24 Apr 2019 00:16:22 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:49800 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725440AbfDXEQV (ORCPT ); Wed, 24 Apr 2019 00:16:21 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id A6C801423FDC2; Tue, 23 Apr 2019 21:16:20 -0700 (PDT) Date: Tue, 23 Apr 2019 21:16:18 -0700 (PDT) Message-Id: <20190423.211618.1009243431874480506.davem@davemloft.net> To: taoren@fb.com Cc: maximmi@mellanox.com, bgolaszewski@baylibre.com, sam@mendozajonas.com, jakub.kicinski@netronome.com, joel@jms.id.au, andrew@aj.id.au, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, openbmc@lists.ozlabs.org Subject: Re: [PATCH net v4] net/ncsi: handle overflow when incrementing mac address From: David Miller In-Reply-To: <20190424014310.24253-1-taoren@fb.com> References: <20190424014310.24253-1-taoren@fb.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 23 Apr 2019 21:16:21 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tao Ren Date: Wed, 24 Apr 2019 01:43:32 +0000 > Previously BMC's MAC address is calculated by simply adding 1 to the > last byte of network controller's MAC address, and it produces incorrect > result when network controller's MAC address ends with 0xFF. > > The problem can be fixed by calling eth_addr_inc() function to increment > MAC address; besides, the MAC address is also validated before assigning > to BMC. > > Fixes: cb10c7c0dfd9 ("net/ncsi: Add NCSI Broadcom OEM command") > Signed-off-by: Tao Ren Applied and queued up for -stable, thanks everyone.