Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp176000yba; Tue, 23 Apr 2019 22:17:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqyCchOgiQn8P3N6jVcKNcmCM1oExXQ9JGapu+YRFf4XxgyS1idD8ejzchA8hO2RP29ByrMl X-Received: by 2002:a17:902:e182:: with SMTP id cd2mr30551818plb.240.1556083062913; Tue, 23 Apr 2019 22:17:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556083062; cv=none; d=google.com; s=arc-20160816; b=nTEaKQZAU134O9kj2DvR2suqUuO5l+C+J27+2PKmZxC6xcHzTVZg0CsyON2CFQGbQd mZBxag9qgYKgA8uqkt3zD5kmGmwJY9rKLEwF3S4HpvwxWfIg0KGsbNrJ6T17JteOhtls +ei1frXcmlJZ2yC3+an6ZaVfARGcrjA47PiNE1uMF3uYr2iwXZGTpqdu+VvGUFQq0aKH 6IL8h6LFsXcXA/h7xHFnVKilNz1ALhQ+Lg5Iu/w5CTVd1pWfTUPxzY2bhlnAlYOw6RjY DCRub4scUKWoi4PKBLRm0BVFJ9YKFlrdf9qI6+tuII8iuqIPBIqs/wPbGTSgPhT04qmo xv7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject :smtp-origin-cluster:cc:to:smtp-origin-hostname:from :smtp-origin-hostprefix:dkim-signature; bh=FKM86vzGVWMsHvjlcaHnvMjzrwLXYOENyblxu5Zhi2w=; b=H3n08n4yDYVruicfxyRMEUmgdYgCAjNos2/YMVJm8dka9SS7Q5j7j/0EMwqPNs55eD eJB7L6bKV9qXL8Ntuo0S8qzMSO5z8JzS/iSrZoLhvwDxTuM/xEjYSEkgRteYXt3ItfaZ lFsRBY6EuXESo0/v+K1KONFh6GK8+lOXR1q3m9nBHAucG0ggm/A5boE9hpY8tKdu4K6w pX0kobO+BWzUyruXgA8+Ccob9ENNaFSsOM51lP3L2lVPxtagl4l+T+Eew6IT7Shdg0+2 g//svurZCfHKRWp0sIbvNlFdwz/vYGe/RI+5Yf/wJS1Rq0sWB76jpjQPINbIJCh9MCnx 2B/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=f0SX9uln; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 98si18260254plb.84.2019.04.23.22.17.26; Tue, 23 Apr 2019 22:17:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=f0SX9uln; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727001AbfDXFO3 (ORCPT + 99 others); Wed, 24 Apr 2019 01:14:29 -0400 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:60096 "EHLO mx0b-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726002AbfDXFO3 (ORCPT ); Wed, 24 Apr 2019 01:14:29 -0400 Received: from pps.filterd (m0109332.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3O5ENWx003881 for ; Tue, 23 Apr 2019 22:14:27 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=facebook; bh=FKM86vzGVWMsHvjlcaHnvMjzrwLXYOENyblxu5Zhi2w=; b=f0SX9ulnzjlPagikhdDxMKJRzRo4yrdz1V8J/hi1Jj7/0FMWToqhMsLKJ+vXR3L434g4 4Q/lmF+66FxObV+sdkQG3s3EMi8/9dMFTzjSXmz/WoepGbaPF7zjYvKjsurqMW5M6Q04 0YNE7u6cMcQv9kjkhHfC+jE2ErdEUzi4G9k= Received: from maileast.thefacebook.com ([199.201.65.23]) by mx0a-00082601.pphosted.com with ESMTP id 2s24kek627-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for ; Tue, 23 Apr 2019 22:14:27 -0700 Received: from mx-out.facebook.com (2620:10d:c0a1:3::13) by mail.thefacebook.com (2620:10d:c021:18::174) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) id 15.1.1713.5; Tue, 23 Apr 2019 22:14:27 -0700 Received: by devvm24792.prn1.facebook.com (Postfix, from userid 150176) id C2A9C13BA5DE1; Tue, 23 Apr 2019 14:20:49 -0700 (PDT) Smtp-Origin-Hostprefix: devvm From: Tao Ren Smtp-Origin-Hostname: devvm24792.prn1.facebook.com To: "David S . Miller" , Maxim Mikityanskiy , Bartosz Golaszewski , , , Jakub Kicinski , Samuel Mendoza-Jonas , Joel Stanley , Andrew Jeffery , CC: Tao Ren Smtp-Origin-Cluster: prn1c35 Subject: [PATCH net v2 2/2] net/ncsi: handle overflow when incrementing mac address Date: Tue, 23 Apr 2019 14:20:48 -0700 Message-ID: <20190423212048.1984122-1-taoren@fb.com> X-Mailer: git-send-email 2.17.1 X-FB-Internal: Safe MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-04-24_03:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Previously BMC's MAC address is calculated by simply adding 1 to the last byte of network controller's MAC address, and it produces incorrect result when network controller's MAC address ends with 0xFF. The problem can be fixed by calling "net_addr_inc" function to increment MAC address; besides, the MAC address is also validated before assigning to BMC. Fixes: cb10c7c0dfd9 ("net/ncsi: Add NCSI Broadcom OEM command") Signed-off-by: Tao Ren --- net/ncsi/ncsi-rsp.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) Changes in v2: - increment MAC address by calling net_addr_inc function. - validate MAC address before assigning to BMC. diff --git a/net/ncsi/ncsi-rsp.c b/net/ncsi/ncsi-rsp.c index dc07fcc7938e..802db01e3075 100644 --- a/net/ncsi/ncsi-rsp.c +++ b/net/ncsi/ncsi-rsp.c @@ -11,6 +11,7 @@ #include #include #include +#include #include #include @@ -667,7 +668,10 @@ static int ncsi_rsp_handler_oem_bcm_gma(struct ncsi_request *nr) ndev->priv_flags |= IFF_LIVE_ADDR_CHANGE; memcpy(saddr.sa_data, &rsp->data[BCM_MAC_ADDR_OFFSET], ETH_ALEN); /* Increase mac address by 1 for BMC's address */ - saddr.sa_data[ETH_ALEN - 1]++; + eth_addr_inc((u8 *)saddr.sa_data); + if (!is_valid_ether_addr((const u8 *)saddr.sa_data)) + return -ENXIO; + ret = ops->ndo_set_mac_address(ndev, &saddr); if (ret < 0) netdev_warn(ndev, "NCSI: 'Writing mac address to device failed\n"); -- 2.17.1