[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260107133511.GA345651@kernel.org>
Date: Wed, 7 Jan 2026 13:35:11 +0000
From: Simon Horman <horms@...nel.org>
To: Sebastian Roland Wolf <Sebastian.Wolf@...e-systems.de>
Cc: Felix Fietkau <nbd@....name>, Sean Wang <sean.wang@...iatek.com>,
Lorenzo Bianconi <lorenzo@...nel.org>,
Andrew Lunn <andrew+netdev@...n.ch>,
Matthias Brugger <matthias.bgg@...il.com>,
AngeloGioacchino Del Regno <angelogioacchino.delregno@...labora.com>,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-arm-kernel@...ts.infradead.org,
linux-mediatek@...ts.infradead.org,
Sebastian Roland Wolf <srw@...t533.premium-rootserver.net>
Subject: Re: [PATCH v2] net: mediatek: add null pointer check for hardware
offloading
On Sat, Jan 03, 2026 at 01:50:08AM +0100, Sebastian Roland Wolf wrote:
> From: Sebastian Roland Wolf <srw@...t533.premium-rootserver.net>
>
> Add a null pointer check to prevent kernel crashes when hardware
> offloading is active on MediaTek devices.
>
> In some edge cases, the ethernet pointer or its associated netdev
> element can be NULL. Checking these pointers before access is
> mandatory to avoid segmentation faults and kernel oops.
>
> This improves the robustness of the validation check for mtk_eth
> ingress devices introduced in commit 73cfd947dbdb ("net: mediatek:
> add support for ingress traffic offloading").
>
> Fixes: 73cfd947dbdb ("net: mediatek: add support for ingress traffic offloading")
> net: mediatek: Add null pointer check to prevent crashes with active hardware offloading.
Hi Sebastian,
I agree that the cited hash is a good commit to reference, but
I think the Fixes line has been mangled. A correct tag for that hash is:
Fixes: 73cfd947dbdb ("net: ethernet: mtk_eth_soc: ppe: prevent ppe update for non-mtk devices")
Also, please no blank line here, between the Fixes line and your Signed-off by.
>
> Signed-off-by: Sebastian Roland Wolf <Sebastian.Wolf@...e-systems.de>
...
Powered by blists - more mailing lists