From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 15D7048A44 for ; Fri, 31 Oct 2025 15:39:21 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 0F66740696; Fri, 31 Oct 2025 15:39:21 +0100 (CET) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mails.dpdk.org (Postfix) with ESMTP id 2586C40696 for ; Fri, 31 Oct 2025 15:39:19 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1761921558; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2QQzWFi3Ps08ae1r11HxhpZ/KETprtF5g/ygfrb38Og=; b=Oyi7TCNYxW8ZhlT94lbiKRMg1u9KXPbIfYkrN33GzSAYLI2A8+m7NdsZ0ZC9tSnTiEem29 krHiBTc+8xG2ktosPnfKQPs0zdJ7JR/hEMlqDgBFdBFWY/eo/H202VuiMfxtHEyJdUjDvJ IoEQvCskagu4M8ITbJe7TVDKqHp32qk= Received: from mx-prod-mc-08.mail-002.prod.us-west-2.aws.redhat.com (ec2-35-165-154-97.us-west-2.compute.amazonaws.com [35.165.154.97]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-674-4it2fGXIMo2CbPFBqQdK7Q-1; Fri, 31 Oct 2025 10:39:13 -0400 X-MC-Unique: 4it2fGXIMo2CbPFBqQdK7Q-1 X-Mimecast-MFC-AGG-ID: 4it2fGXIMo2CbPFBqQdK7Q_1761921552 Received: from mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.111]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-08.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 17AB018002F9; Fri, 31 Oct 2025 14:39:12 +0000 (UTC) Received: from rh.redhat.com (unknown [10.44.32.50]) by mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 6BF9318004D4; Fri, 31 Oct 2025 14:39:10 +0000 (UTC) From: Kevin Traynor To: Vanshika Shukla Cc: Sachin Saxena , dpdk stable Subject: patch 'net/enetfec: fix out-of-bounds access in UIO mapping' has been queued to stable release 24.11.4 Date: Fri, 31 Oct 2025 14:33:44 +0000 Message-ID: <20251031143421.324432-102-ktraynor@redhat.com> In-Reply-To: <20251031143421.324432-1-ktraynor@redhat.com> References: <20251031143421.324432-1-ktraynor@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.4.1 on 10.30.177.111 X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: D77wdRuEThyg1UyKPCAp45yVXtTOCmfx1v1ZOj5UFDw_1761921552 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: 8bit content-type: text/plain; charset="US-ASCII"; x-default=true X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 24.11.4 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 11/05/25. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable/commit/9ef9ed084e79639f094b55ab0809c5aafb28ccc0 Thanks. Kevin --- >From 9ef9ed084e79639f094b55ab0809c5aafb28ccc0 Mon Sep 17 00:00:00 2001 From: Vanshika Shukla Date: Mon, 6 Oct 2025 13:34:01 +0530 Subject: [PATCH] net/enetfec: fix out-of-bounds access in UIO mapping [ upstream commit 22b0837bd93a777b8ca7fcf234985175e456a4f5 ] NXP internal Coverity flagged a potential out-of-bounds access due to invalid mapping size. This patch adds a check to ensure the mapping size is within valid bounds before proceeding with memory mapping. Fixes: b84fdd39638b ("net/enetfec: support UIO") Signed-off-by: Vanshika Shukla Acked-by: Sachin Saxena --- drivers/net/enetfec/enet_uio.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/net/enetfec/enet_uio.c b/drivers/net/enetfec/enet_uio.c index 23cb4e7e93..f32d5e1b1e 100644 --- a/drivers/net/enetfec/enet_uio.c +++ b/drivers/net/enetfec/enet_uio.c @@ -1,4 +1,4 @@ /* SPDX-License-Identifier: BSD-3-Clause - * Copyright 2021,2024 NXP + * Copyright 2021,2024-2025 NXP */ @@ -143,4 +143,8 @@ uio_map_mem(int uio_device_fd, int uio_device_id, /* Read mapping size and physical address expressed in hexa(base 16) */ uio_map_size = strtol(uio_map_size_str, NULL, 16); + if (uio_map_size <= 0 || uio_map_size > INT_MAX) { + ENETFEC_PMD_ERR("Invalid mapping size: %u.", uio_map_size); + return NULL; + } uio_map_p_addr = strtol(uio_map_p_addr_str, NULL, 16); -- 2.51.0 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2025-10-31 13:53:55.334103064 +0000 +++ 0102-net-enetfec-fix-out-of-bounds-access-in-UIO-mapping.patch 2025-10-31 13:53:52.283350897 +0000 @@ -1 +1 @@ -From 22b0837bd93a777b8ca7fcf234985175e456a4f5 Mon Sep 17 00:00:00 2001 +From 9ef9ed084e79639f094b55ab0809c5aafb28ccc0 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 22b0837bd93a777b8ca7fcf234985175e456a4f5 ] + @@ -12 +13,0 @@ -Cc: stable@dpdk.org