Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1772990ybl; Sat, 11 Jan 2020 02:31:48 -0800 (PST) X-Google-Smtp-Source: APXvYqypkOHSz7BxbYjmi5bVi4qoXt5aH7XrR0CZARwm/6Zs+qU4FxmVCqx92+AIyfG5hDrsk20V X-Received: by 2002:a9d:dc1:: with SMTP id 59mr6358384ots.250.1578738708618; Sat, 11 Jan 2020 02:31:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578738708; cv=none; d=google.com; s=arc-20160816; b=joocFsQ27GEI5+DmA2uU39A7qTQ4JDwZXRbzzEK67YaPJY97XZLjj43RFsbO5wxtab 7UxsSAZs3Q76dFVvvrA8+8HOmDmxqLyhUIe8LN8ry3aSX9UBFhbX4+7daTZbL4waSwlG qL+WlK8HBvbPQEGqMpZraqsK8JFK3pS+ERxR4agld5yqturOh+PdkZQCTKJqcsNHYOw5 D7+7hcbSMJH9XcRkE0/NyNOWM2vyrWNSFbGdp7eQ0yNUzWO1rPfpUP21MYggSKbyMEzO tQK+z3ywVU9VfGdVovEVweuJCMXFlYBQpW0Vc66O3zbGiaSbZMMaAZ2Us/A2N1PK/1Au h4Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mLdOeJ/NfXD7+hB1QpaEQmLb6oTE5ixjd7cB6e3kd7o=; b=dqFPDtG0Qqosba0I2cF/1vXdSpSyJFJTtbLnaeL0GStkk2m00PkMKY5E8UTsa42HLX twbvxo+JEvUlPRMCYQeZSmCxN7nFaP/c4FZ72evD2mqVRlKTtfsZ8Ynzso1oRl7yPwxw uHTO+I/wdZe0tdWs0vqhUnLQdcImwOArTe2MjIvNK8o51Grs1R3B2QMesX2vfZK0PwxA 9o6Fbur9lVIqLwOlFrsoPFQv1decgUK7DFx4wDDifIYSHAHu8UuJ7rmJXtO8U1AsDsBN Cnfn3CkRL44wa+obCkXj/K40wQXXmCV3k/GeXMHrgbpe/yR0jga7vefxSyVT6ZsUYOZ5 Aysw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m7iWWjLE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 10si2752633ois.76.2020.01.11.02.31.37; Sat, 11 Jan 2020 02:31:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m7iWWjLE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731425AbgAKKaq (ORCPT + 99 others); Sat, 11 Jan 2020 05:30:46 -0500 Received: from mail.kernel.org ([198.145.29.99]:41488 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731057AbgAKKap (ORCPT ); Sat, 11 Jan 2020 05:30:45 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AC36820678; Sat, 11 Jan 2020 10:30:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578738644; bh=GRvpzFux5iBUXMUHdJa8t5OG0vh54puq7F4YFhsJArA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=m7iWWjLEwsgNLB+WYTKWcKohG9AUlPPMAan8zjFMw1HNcF2NRfJ/DKSYJgk9IWxdT bYXf/lxTb2+x2BKBeM2qBIw6Xuq1haSbGgbEkux3TlAUw4StaQftowHtaowbF80yH7 WYQ5wFRAjhT5yusyCTRyEh751chogvnFhdMkLVjg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jose Abreu , "David S. Miller" , Sasha Levin Subject: [PATCH 5.4 112/165] net: stmmac: Do not accept invalid MTU values Date: Sat, 11 Jan 2020 10:50:31 +0100 Message-Id: <20200111094931.707541491@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094921.347491861@linuxfoundation.org> References: <20200111094921.347491861@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jose Abreu [ Upstream commit eaf4fac478077d4ed57cbca2c044c4b58a96bd98 ] The maximum MTU value is determined by the maximum size of TX FIFO so that a full packet can fit in the FIFO. Add a check for this in the MTU change callback. Also check if provided and rounded MTU does not passes the maximum limit of 16K. Changes from v2: - Align MTU before checking if its valid Fixes: 7ac6653a085b ("stmmac: Move the STMicroelectronics driver") Signed-off-by: Jose Abreu Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c index d9520c029ae5..1b4968e4a313 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c @@ -3745,12 +3745,24 @@ static void stmmac_set_rx_mode(struct net_device *dev) static int stmmac_change_mtu(struct net_device *dev, int new_mtu) { struct stmmac_priv *priv = netdev_priv(dev); + int txfifosz = priv->plat->tx_fifo_size; + + if (txfifosz == 0) + txfifosz = priv->dma_cap.tx_fifo_size; + + txfifosz /= priv->plat->tx_queues_to_use; if (netif_running(dev)) { netdev_err(priv->dev, "must be stopped to change its MTU\n"); return -EBUSY; } + new_mtu = STMMAC_ALIGN(new_mtu); + + /* If condition true, FIFO is too small or MTU too large */ + if ((txfifosz < new_mtu) || (new_mtu > BUF_SIZE_16KiB)) + return -EINVAL; + dev->mtu = new_mtu; netdev_update_features(dev); -- 2.20.1