Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1095888pxb; Sun, 19 Sep 2021 06:05:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyzQnMYHQGkeMqjfDqiM1JKnv0gZ0aVgNR9xLip9Amzzj6CZDTr4RPM5J1ADA3GUAH1RgIv X-Received: by 2002:a6b:5d10:: with SMTP id r16mr3846336iob.148.1632056745258; Sun, 19 Sep 2021 06:05:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632056745; cv=none; d=google.com; s=arc-20160816; b=ZmJiFATtZ/Ebh3XWgCVpX1fssppdhmg0/8xRH3miQEA1neC1elpnv15r57SW4/J6v+ BXr4ZQv3s9TW3jWR9VoccUZ+bI6QgOmvjqBpoKrs7V2A303gTpMCyQCr1eTOSpphavm9 TaePJyRMs875PfeaGCLrCDFdfLySbhO1y9mo+5vWCXKV/I7UfuKkas7B0eci3pR7XAsO +JYRT+uqqVQ8Z67UiMg93PxcentR9cTRyAr+DFNIMhiw6O7Z0/J4mnLxmSw4rR5XXDtY aoOltMazAQMXB+3S18xTTcfH7TLESzwRZft95RTpG33TgdSVxNOZJgGxAyEqM0rObgNF rxMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=zKgnriSkEe6YcsII9RY18wprpnl0i859Ka5etnEmT2k=; b=CfVDMPWRg5KUorw5HuZDWECtftE4Nu+dcrcuzsnmQLIyjFeWdG3sc3reIJpLTZEaPF JiINBd/SHcLmZPI4iS19pDFCDbbRVYYS/ZgDEDZExsuzYJt7sSmw5MlYX78pTZmE3oiZ EVtcH1hrKr5pBV8Wu+Vww9b+S2FtQVrGfvFqqM1oksR7f7Dp5hS2NjDVGczVK0VHFnE7 UrnFExMirg13aMZgHr26hmuwWQd0YLNDFTrX2BH0d7U6GSNTbfPIk1gH1RBzaiXyON2f hYI13hEAVieC3io1jxUbXerOGt+kt92fYin0nOM4orc2Rb4pIuhLH1zmijAjmTPUOJIo i8sg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JX4ERWr2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u3si9620918jae.21.2021.09.19.06.05.30; Sun, 19 Sep 2021 06:05:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JX4ERWr2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231285AbhISLVm (ORCPT + 99 others); Sun, 19 Sep 2021 07:21:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:57602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230402AbhISLVe (ORCPT ); Sun, 19 Sep 2021 07:21:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id 225796127B; Sun, 19 Sep 2021 11:20:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632050409; bh=aeIkJIXEmm7B9ae1/L3fQukM4/3iDBnYEE5trTfm2lw=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=JX4ERWr29jpQnFwg3r1vJ7veJvdCVp0NuPDRR3XinTEdmF6R44aou82z3U1GOMbni 41EWBQzqeUT6LpsezQbNQmZeK4YXDjJwQkB81K4cL2nLC/kEDM6m7KZLfcTIpZaDCZ VhOswQuuvv204YYXp2/dJco3nZdWnZbWkJd2zppNTAw1B25eGAXlUTkjgDfVggaB/j 1+82hMAi61gsxUYRgY1iBbYpUC35n1KaaliGSgBQJAwCDA7pjgtr1yFjSx4JCQCXAa W2f278Z+vKuS1GDKYlKBk//3ubFp7rgC15y0XgGirkXTT2kbrsSRnMVb5F7n+M1/gV dbd9cQFTY/RaQ== Received: from pdx-korg-docbuild-2.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by pdx-korg-docbuild-2.ci.codeaurora.org (Postfix) with ESMTP id 1120E60A37; Sun, 19 Sep 2021 11:20:09 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH net] enetc: Fix illegal access when reading affinity_hint From: patchwork-bot+netdevbpf@kernel.org Message-Id: <163205040906.14261.2098100374293719653.git-patchwork-notify@kernel.org> Date: Sun, 19 Sep 2021 11:20:09 +0000 References: <20210917102206.20616-1-claudiu.manoil@nxp.com> In-Reply-To: <20210917102206.20616-1-claudiu.manoil@nxp.com> To: Claudiu Manoil Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, davem@davemloft.net, kuba@kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (refs/heads/master): On Fri, 17 Sep 2021 13:22:05 +0300 you wrote: > irq_set_affinity_hit() stores a reference to the cpumask_t > parameter in the irq descriptor, and that reference can be > accessed later from irq_affinity_hint_proc_show(). Since > the cpu_mask parameter passed to irq_set_affinity_hit() has > only temporary storage (it's on the stack memory), later > accesses to it are illegal. Thus reads from the corresponding > procfs affinity_hint file can result in paging request oops. > > [...] Here is the summary with links: - [net] enetc: Fix illegal access when reading affinity_hint https://git.kernel.org/netdev/net/c/7237a494decf You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html