lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 16 Jul 2021 17:50:10 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Haiyue Wang <haiyue.wang@...el.com> Cc: netdev@...r.kernel.org, csully@...gle.com, sagis@...gle.com, jonolson@...gle.com, davem@...emloft.net, kuba@...nel.org, awogbemila@...gle.com, yangchun@...gle.com, willemb@...gle.com, bcf@...gle.com, kuozhao@...gle.com, linux-kernel@...r.kernel.org Subject: Re: [PATCH v1] gve: fix the wrong AdminQ buffer overflow check Hello: This patch was applied to netdev/net-next.git (refs/heads/master): On Wed, 14 Jul 2021 15:34:59 +0800 you wrote: > The 'tail' pointer is also free-running count, so it needs to be masked > as 'adminq_prod_cnt' does, to become an index value of AdminQ buffer. > > Fixes: 5cdad90de62c ("gve: Batch AQ commands for creating and destroying queues.") > Signed-off-by: Haiyue Wang <haiyue.wang@...el.com> > --- > drivers/net/ethernet/google/gve/gve_adminq.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) Here is the summary with links: - [v1] gve: fix the wrong AdminQ buffer overflow check https://git.kernel.org/netdev/net-next/c/63a9192b8fa1 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists