summaryrefslogtreecommitdiffstats
path: root/kernel
diff options
context:
space:
mode:
authorXuan Zhuo <xuanzhuo@linux.alibaba.com>2021-04-28 11:44:24 +0200
committerDaniel Borkmann <daniel@iogearbox.net>2021-05-04 00:28:06 +0200
commitac31565c21937eee9117e43c9cd34f557f6f1cb8 (patch)
tree8359163fe639b92bb0dfcedc3530450c765ed386 /kernel
parentlibbpf: Fix signed overflow in ringbuf_process_ring (diff)
downloadlinux-ac31565c21937eee9117e43c9cd34f557f6f1cb8.tar.xz
linux-ac31565c21937eee9117e43c9cd34f557f6f1cb8.zip
xsk: Fix for xp_aligned_validate_desc() when len == chunk_size
When desc->len is equal to chunk_size, it is legal. But when the xp_aligned_validate_desc() got chunk_end from desc->addr + desc->len pointing to the next chunk during the check, it caused the check to fail. This problem was first introduced in bbff2f321a86 ("xsk: new descriptor addressing scheme"). Later in 2b43470add8c ("xsk: Introduce AF_XDP buffer allocation API") this piece of code was moved into the new function called xp_aligned_validate_desc(). This function was then moved into xsk_queue.h via 26062b185eee ("xsk: Explicitly inline functions and move definitions"). Fixes: bbff2f321a86 ("xsk: new descriptor addressing scheme") Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Magnus Karlsson <magnus.karlsson@intel.com> Link: https://lore.kernel.org/bpf/20210428094424.54435-1-xuanzhuo@linux.alibaba.com
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions