Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EC5EEC4332F for ; Thu, 18 Nov 2021 11:21:30 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id D2C2261A3D for ; Thu, 18 Nov 2021 11:21:30 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343806AbhKRLY1 (ORCPT ); Thu, 18 Nov 2021 06:24:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:51138 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343787AbhKRLXK (ORCPT ); Thu, 18 Nov 2021 06:23:10 -0500 Received: by mail.kernel.org (Postfix) with ESMTPS id E167361AD2; Thu, 18 Nov 2021 11:20:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1637234408; bh=CoWvvJ5SUlmGMCDBGkTvshowClGajIqZ5Cr0Xwr7xHc=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=I1vWlZbwHiwLgB8K6biR3K2diYzSBc9Qj3S/u2m4Wu7IiVpD8fUrIzZ0dmw3CWMFp RcI9Stk2Br46AyjzK18b9TIxlhp7VPDz3snq2D8mfIIAicc2w3IpbAe22P/T5H/2ld tokZVNDyIQ/f6F5ud30HWkanXzL6OGbFLuI5PhyZf+aVxX349aFAflmaPdhSL/QoQR 80QGOsEbIP4odleYamJrTL7+bZIeipxDTVAlFy/i06PRDrBDB/8Bx6g7/u1RDPro1w B62MEyivubZ5+/42E6ugpT/6X96MFBo4a+YuAx0/2Y8rkrIKa6iNYHoYxLHm/wyl6K 7NyrhyLiI8IGQ== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH] ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() From: patchwork-bot+netdevbpf@kernel.org Message-Id: <163723440886.3044.13326844858914802767.git-patchwork-notify@kernel.org> Date: Thu, 18 Nov 2021 11:20:08 +0000 References: <20211117034453.28963-1-starmiku1207184332@gmail.com> In-Reply-To: <20211117034453.28963-1-starmiku1207184332@gmail.com> To: Teng Qi Cc: yisen.zhuang@huawei.com, salil.mehta@huawei.com, davem@davemloft.net, kuba@kernel.org, lipeng321@huawei.com, huangguangbin2@huawei.com, zhengyongjun3@huawei.com, liuyonglong@huawei.com, shenyang39@huawei.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, baijiaju1990@gmail.com, islituo@gmail.com, oslab@tsinghua.edu.cn Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (master) by David S. Miller : On Wed, 17 Nov 2021 11:44:53 +0800 you wrote: > The if statement: > if (port >= DSAF_GE_NUM) > return; > > limits the value of port less than DSAF_GE_NUM (i.e., 8). > However, if the value of port is 6 or 7, an array overflow could occur: > port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off; > > [...] Here is the summary with links: - ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() https://git.kernel.org/netdev/net/c/a66998e0fbf2 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html