netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] net/mdiobus: Fix potential out-of-bounds read/write access
       [not found] <CGME20250609144014eucas1p2ee94d7aabff15fbadcc1af1fa64ce22d@eucas1p2.samsung.com>
@ 2025-06-09 14:37 ` Jakub Raczynski
  2025-06-09 14:57   ` Russell King (Oracle)
  0 siblings, 1 reply; 9+ messages in thread
From: Jakub Raczynski @ 2025-06-09 14:37 UTC (permalink / raw)
  To: andrew; +Cc: hkallweit1, linux, netdev, j.raczynski, wenjing.shan

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via mdiobus, there is no verification of
parameters passed to the ioctl and it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.

Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
---
 drivers/net/phy/mdio_bus.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
index a6bcb0fee863..60fd0cd7cb9c 100644
--- a/drivers/net/phy/mdio_bus.c
+++ b/drivers/net/phy/mdio_bus.c
@@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->read)
 		retval = bus->read(bus, addr, regnum);
 	else
@@ -474,6 +477,9 @@ int __mdiobus_write(struct mii_bus *bus, int addr, u32 regnum, u16 val)
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->write)
 		err = bus->write(bus, addr, regnum, val);
 	else
-- 
2.34.1


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH] net/mdiobus: Fix potential out-of-bounds read/write access
  2025-06-09 14:37 ` [PATCH] net/mdiobus: Fix potential out-of-bounds read/write access Jakub Raczynski
@ 2025-06-09 14:57   ` Russell King (Oracle)
       [not found]     ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucas1p1.samsung.com>
  0 siblings, 1 reply; 9+ messages in thread
From: Russell King (Oracle) @ 2025-06-09 14:57 UTC (permalink / raw)
  To: Jakub Raczynski; +Cc: andrew, hkallweit1, netdev, wenjing.shan

On Mon, Jun 09, 2025 at 04:37:58PM +0200, Jakub Raczynski wrote:
> When using publicly available tools like 'mdio-tools' to read/write data
> from/to network interface and its PHY via mdiobus, there is no verification of
> parameters passed to the ioctl and it accepts any mdio address.
> Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> but it is possible to pass higher value than that via ioctl.
> While read/write operation should generally fail in this case,
> mdiobus provides stats array, where wrong address may allow out-of-bounds
> read/write.
> 
> Fix that by adding address verification before read/write operation.
> While this excludes this access from any statistics, it improves security of
> read/write operation.
> 
> Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
> Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
> Reported-by: Wenjing Shan <wenjing.shan@samsung.com>

This is insufficient on its own. If you check the clause 45 accessors,
they have the same issue, so this should also be fixed.

Your patch would've been fine for the blamed commit, but we've had
4e4aafcddbbf ("net: mdio: Add dedicated C45 API to MDIO bus drivers")
in v6.3.

For easier back-porting, it probably makes sense to have this patch
and another separate patch addressing the ones introduced in the
more recent commit - and the two patches sent as a patch series.

Thanks.

-- 
RMK's Patch system: https://www.armlinux.org.uk/developer/patches/
FTTP is here! 80Mbps down 10Mbps up. Decent connectivity at last!

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
       [not found]     ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucas1p1.samsung.com>
@ 2025-06-09 15:31       ` Jakub Raczynski
       [not found]         ` <CGME20250609153156eucas1p2cf6399b609395de4d4a33b0cf6b4c15d@eucas1p2.samsung.com>
                           ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Jakub Raczynski @ 2025-06-09 15:31 UTC (permalink / raw)
  To: linux; +Cc: andrew, hkallweit1, netdev, Jakub Raczynski, Wenjing Shan

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via mdiobus, there is no verification of
parameters passed to the ioctl and it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.

Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
---
 drivers/net/phy/mdio_bus.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
index a6bcb0fee863..60fd0cd7cb9c 100644
--- a/drivers/net/phy/mdio_bus.c
+++ b/drivers/net/phy/mdio_bus.c
@@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->read)
 		retval = bus->read(bus, addr, regnum);
 	else
@@ -474,6 +477,9 @@ int __mdiobus_write(struct mii_bus *bus, int addr, u32 regnum, u16 val)
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->write)
 		err = bus->write(bus, addr, regnum, val);
 	else
-- 
2.34.1


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH 2/2] net/mdiobus: Fix potential out-of-bounds clause 45 read/write access
       [not found]         ` <CGME20250609153156eucas1p2cf6399b609395de4d4a33b0cf6b4c15d@eucas1p2.samsung.com>
@ 2025-06-09 15:31           ` Jakub Raczynski
  0 siblings, 0 replies; 9+ messages in thread
From: Jakub Raczynski @ 2025-06-09 15:31 UTC (permalink / raw)
  To: linux; +Cc: andrew, hkallweit1, netdev, Jakub Raczynski, Wenjing Shan

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via C45 (clause 45) mdiobus,
there is no verification of parameters passed to the ioctl and
it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before C45 read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.

Fixes: 4e4aafcddbbf ("net: mdio: Add dedicated C45 API to MDIO bus drivers")
Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
---
 drivers/net/phy/mdio_bus.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
index 60fd0cd7cb9c..fda2e27c1810 100644
--- a/drivers/net/phy/mdio_bus.c
+++ b/drivers/net/phy/mdio_bus.c
@@ -541,6 +541,9 @@ int __mdiobus_c45_read(struct mii_bus *bus, int addr, int devad, u32 regnum)
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->read_c45)
 		retval = bus->read_c45(bus, addr, devad, regnum);
 	else
@@ -572,6 +575,9 @@ int __mdiobus_c45_write(struct mii_bus *bus, int addr, int devad, u32 regnum,
 
 	lockdep_assert_held_once(&bus->mdio_lock);
 
+	if (addr >= PHY_MAX_ADDR)
+		return -ENXIO;
+
 	if (bus->write_c45)
 		err = bus->write_c45(bus, addr, devad, regnum, val);
 	else
-- 
2.34.1


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
  2025-06-09 15:31       ` [PATCH 1/2] " Jakub Raczynski
       [not found]         ` <CGME20250609153156eucas1p2cf6399b609395de4d4a33b0cf6b4c15d@eucas1p2.samsung.com>
@ 2025-06-11 12:10         ` patchwork-bot+netdevbpf
  2025-06-25 15:23         ` Dan Carpenter
  2 siblings, 0 replies; 9+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-06-11 12:10 UTC (permalink / raw)
  To: Jakub Raczynski; +Cc: linux, andrew, hkallweit1, netdev, wenjing.shan

Hello:

This series was applied to netdev/net.git (main)
by David S. Miller <davem@davemloft.net>:

On Mon,  9 Jun 2025 17:31:46 +0200 you wrote:
> When using publicly available tools like 'mdio-tools' to read/write data
> from/to network interface and its PHY via mdiobus, there is no verification of
> parameters passed to the ioctl and it accepts any mdio address.
> Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> but it is possible to pass higher value than that via ioctl.
> While read/write operation should generally fail in this case,
> mdiobus provides stats array, where wrong address may allow out-of-bounds
> read/write.
> 
> [...]

Here is the summary with links:
  - [1/2] net/mdiobus: Fix potential out-of-bounds read/write access
    https://git.kernel.org/netdev/net/c/0e629694126c
  - [2/2] net/mdiobus: Fix potential out-of-bounds clause 45 read/write access
    https://git.kernel.org/netdev/net/c/260388f79e94

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
  2025-06-09 15:31       ` [PATCH 1/2] " Jakub Raczynski
       [not found]         ` <CGME20250609153156eucas1p2cf6399b609395de4d4a33b0cf6b4c15d@eucas1p2.samsung.com>
  2025-06-11 12:10         ` [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds " patchwork-bot+netdevbpf
@ 2025-06-25 15:23         ` Dan Carpenter
  2025-06-25 16:38           ` Andrew Lunn
                             ` (2 more replies)
  2 siblings, 3 replies; 9+ messages in thread
From: Dan Carpenter @ 2025-06-25 15:23 UTC (permalink / raw)
  To: Jakub Raczynski; +Cc: linux, andrew, hkallweit1, netdev, Wenjing Shan

On Mon, Jun 09, 2025 at 05:31:46PM +0200, Jakub Raczynski wrote:
> When using publicly available tools like 'mdio-tools' to read/write data
> from/to network interface and its PHY via mdiobus, there is no verification of
> parameters passed to the ioctl and it accepts any mdio address.
> Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> but it is possible to pass higher value than that via ioctl.
> While read/write operation should generally fail in this case,
> mdiobus provides stats array, where wrong address may allow out-of-bounds
> read/write.
> 
> Fix that by adding address verification before read/write operation.
> While this excludes this access from any statistics, it improves security of
> read/write operation.
> 
> Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
> Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
> Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
> ---
>  drivers/net/phy/mdio_bus.c | 6 ++++++
>  1 file changed, 6 insertions(+)
> 
> diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
> index a6bcb0fee863..60fd0cd7cb9c 100644
> --- a/drivers/net/phy/mdio_bus.c
> +++ b/drivers/net/phy/mdio_bus.c
> @@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
>  
>  	lockdep_assert_held_once(&bus->mdio_lock);
>  
> +	if (addr >= PHY_MAX_ADDR)
> +		return -ENXIO;

addr is an int so Smatch wants this to be:

	if (addr < 0 || addr >= PHY_MAX_ADDR)
		return return -ENXIO;

I think that although addr is an int, the actual values are limited to
0-U16_MAX?

regards,
dan carpener


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
  2025-06-25 15:23         ` Dan Carpenter
@ 2025-06-25 16:38           ` Andrew Lunn
  2025-06-26  7:15           ` Russell King (Oracle)
       [not found]           ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucms1p3>
  2 siblings, 0 replies; 9+ messages in thread
From: Andrew Lunn @ 2025-06-25 16:38 UTC (permalink / raw)
  To: Dan Carpenter; +Cc: Jakub Raczynski, linux, hkallweit1, netdev, Wenjing Shan

On Wed, Jun 25, 2025 at 10:23:17AM -0500, Dan Carpenter wrote:
> On Mon, Jun 09, 2025 at 05:31:46PM +0200, Jakub Raczynski wrote:
> > When using publicly available tools like 'mdio-tools' to read/write data
> > from/to network interface and its PHY via mdiobus, there is no verification of
> > parameters passed to the ioctl and it accepts any mdio address.
> > Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> > but it is possible to pass higher value than that via ioctl.
> > While read/write operation should generally fail in this case,
> > mdiobus provides stats array, where wrong address may allow out-of-bounds
> > read/write.
> > 
> > Fix that by adding address verification before read/write operation.
> > While this excludes this access from any statistics, it improves security of
> > read/write operation.
> > 
> > Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
> > Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
> > Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
> > ---
> >  drivers/net/phy/mdio_bus.c | 6 ++++++
> >  1 file changed, 6 insertions(+)
> > 
> > diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
> > index a6bcb0fee863..60fd0cd7cb9c 100644
> > --- a/drivers/net/phy/mdio_bus.c
> > +++ b/drivers/net/phy/mdio_bus.c
> > @@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
> >  
> >  	lockdep_assert_held_once(&bus->mdio_lock);
> >  
> > +	if (addr >= PHY_MAX_ADDR)
> > +		return -ENXIO;
> 
> addr is an int so Smatch wants this to be:
> 
> 	if (addr < 0 || addr >= PHY_MAX_ADDR)
> 		return return -ENXIO;

Yes, addr should never be negative.

> I think that although addr is an int, the actual values are limited to
> 0-U16_MAX?

No, addr should be in the range 0-31. regnum should also be in the
range 0-31. These are clause 22 accesses. There are also clause 45
accesses, but they don't come through here. For those, addr is still
in the range 0-31, but regnum is 0-U16_MAX.

	Andrew

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
  2025-06-25 15:23         ` Dan Carpenter
  2025-06-25 16:38           ` Andrew Lunn
@ 2025-06-26  7:15           ` Russell King (Oracle)
       [not found]           ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucms1p3>
  2 siblings, 0 replies; 9+ messages in thread
From: Russell King (Oracle) @ 2025-06-26  7:15 UTC (permalink / raw)
  To: Dan Carpenter; +Cc: Jakub Raczynski, andrew, hkallweit1, netdev, Wenjing Shan

On Wed, Jun 25, 2025 at 10:23:17AM -0500, Dan Carpenter wrote:
> On Mon, Jun 09, 2025 at 05:31:46PM +0200, Jakub Raczynski wrote:
> > When using publicly available tools like 'mdio-tools' to read/write data
> > from/to network interface and its PHY via mdiobus, there is no verification of
> > parameters passed to the ioctl and it accepts any mdio address.
> > Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> > but it is possible to pass higher value than that via ioctl.
> > While read/write operation should generally fail in this case,
> > mdiobus provides stats array, where wrong address may allow out-of-bounds
> > read/write.
> > 
> > Fix that by adding address verification before read/write operation.
> > While this excludes this access from any statistics, it improves security of
> > read/write operation.
> > 
> > Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
> > Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
> > Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
> > ---
> >  drivers/net/phy/mdio_bus.c | 6 ++++++
> >  1 file changed, 6 insertions(+)
> > 
> > diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
> > index a6bcb0fee863..60fd0cd7cb9c 100644
> > --- a/drivers/net/phy/mdio_bus.c
> > +++ b/drivers/net/phy/mdio_bus.c
> > @@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
> >  
> >  	lockdep_assert_held_once(&bus->mdio_lock);
> >  
> > +	if (addr >= PHY_MAX_ADDR)
> > +		return -ENXIO;
> 
> addr is an int so Smatch wants this to be:
> 
> 	if (addr < 0 || addr >= PHY_MAX_ADDR)
> 		return return -ENXIO;
> 
> I think that although addr is an int, the actual values are limited to
> 0-U16_MAX?

0 to 31 inclusive.

-- 
RMK's Patch system: https://www.armlinux.org.uk/developer/patches/
FTTP is here! 80Mbps down 10Mbps up. Decent connectivity at last!

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds read/write access
       [not found]           ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucms1p3>
@ 2025-06-26  8:55             ` Jakub Raczynski
  0 siblings, 0 replies; 9+ messages in thread
From: Jakub Raczynski @ 2025-06-26  8:55 UTC (permalink / raw)
  To: Russell King (Oracle)
  Cc: Dan Carpenter, andrew@lunn.ch, hkallweit1@gmail.com,
	netdev@vger.kernel.org, Wenjing Shan

On Wed, Jun 25, 2025 at 10:23:17AM -0500, Dan Carpenter wrote:
> On Mon, Jun 09, 2025 at 05:31:46PM +0200, Jakub Raczynski wrote:
> > > When using publicly available tools like 'mdio-tools' to read/write data
> > > from/to network interface and its PHY via mdiobus, there is no verification of
> > > parameters passed to the ioctl and it accepts any mdio address.
> > > Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
> > > but it is possible to pass higher value than that via ioctl.
> > > While read/write operation should generally fail in this case,
> > > mdiobus provides stats array, where wrong address may allow out-of-bounds
> > > read/write.
> > >
> > > Fix that by adding address verification before read/write operation.
> > > While this excludes this access from any statistics, it improves security of
> > > read/write operation.
> > >
> > > Fixes: 080bb352fad00 ("net: phy: Maintain MDIO device and bus statistics")
> > > Signed-off-by: Jakub Raczynski <j.raczynski@samsung.com>
> > > Reported-by: Wenjing Shan <wenjing.shan@samsung.com>
> > > ---
> > >  drivers/net/phy/mdio_bus.c 6 ++++++
> > >  1 file changed, 6 insertions(+)
> > >
> > > diff --git a/drivers/net/phy/mdio_bus.c b/drivers/net/phy/mdio_bus.c
> > > index a6bcb0fee863..60fd0cd7cb9c 100644
> > > --- a/drivers/net/phy/mdio_bus.c
> > > +++ b/drivers/net/phy/mdio_bus.c
> > > @@ -445,6 +445,9 @@ int __mdiobus_read(struct mii_bus *bus, int addr, u32 regnum)
> > > 
> > >         lockdep_assert_held_once(&bus->mdio_lock);
> > > 
> > > +        if (addr >= PHY_MAX_ADDR)
> > > +                return -ENXIO;
> >
> > addr is an int so Smatch wants this to be:
> >
> >         if (addr < 0 addr >= PHY_MAX_ADDR)
> >                 return return -ENXIO;
> >
> > I think that although addr is an int, the actual values are limited to
> > 0-U16_MAX?

> 0 to 31 inclusive.

Should not be an issue. User calls use struct mii_ioctl_data which forces type of u16 so should not be a case. And some drivers force it too. Probably proper fix would be converting addr parameter to u16 to have consistent API.

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2025-06-26  8:55 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <CGME20250609144014eucas1p2ee94d7aabff15fbadcc1af1fa64ce22d@eucas1p2.samsung.com>
2025-06-09 14:37 ` [PATCH] net/mdiobus: Fix potential out-of-bounds read/write access Jakub Raczynski
2025-06-09 14:57   ` Russell King (Oracle)
     [not found]     ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucas1p1.samsung.com>
2025-06-09 15:31       ` [PATCH 1/2] " Jakub Raczynski
     [not found]         ` <CGME20250609153156eucas1p2cf6399b609395de4d4a33b0cf6b4c15d@eucas1p2.samsung.com>
2025-06-09 15:31           ` [PATCH 2/2] net/mdiobus: Fix potential out-of-bounds clause 45 " Jakub Raczynski
2025-06-11 12:10         ` [PATCH 1/2] net/mdiobus: Fix potential out-of-bounds " patchwork-bot+netdevbpf
2025-06-25 15:23         ` Dan Carpenter
2025-06-25 16:38           ` Andrew Lunn
2025-06-26  7:15           ` Russell King (Oracle)
     [not found]           ` <CGME20250609153151eucas1p12def205b1e442c456d043ab444418a56@eucms1p3>
2025-06-26  8:55             ` Jakub Raczynski

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).