diff options
author | Xuan Zhuo <xuanzhuo@linux.alibaba.com> | 2021-04-28 11:44:24 +0200 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2021-05-04 00:28:06 +0200 |
commit | ac31565c21937eee9117e43c9cd34f557f6f1cb8 (patch) | |
tree | 8359163fe639b92bb0dfcedc3530450c765ed386 /kernel | |
parent | libbpf: Fix signed overflow in ringbuf_process_ring (diff) | |
download | linux-ac31565c21937eee9117e43c9cd34f557f6f1cb8.tar.xz linux-ac31565c21937eee9117e43c9cd34f557f6f1cb8.zip |
xsk: Fix for xp_aligned_validate_desc() when len == chunk_size
When desc->len is equal to chunk_size, it is legal. But when the
xp_aligned_validate_desc() got chunk_end from desc->addr + desc->len
pointing to the next chunk during the check, it caused the check to
fail.
This problem was first introduced in bbff2f321a86 ("xsk: new descriptor
addressing scheme"). Later in 2b43470add8c ("xsk: Introduce AF_XDP buffer
allocation API") this piece of code was moved into the new function called
xp_aligned_validate_desc(). This function was then moved into xsk_queue.h
via 26062b185eee ("xsk: Explicitly inline functions and move definitions").
Fixes: bbff2f321a86 ("xsk: new descriptor addressing scheme")
Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Magnus Karlsson <magnus.karlsson@intel.com>
Link: https://lore.kernel.org/bpf/20210428094424.54435-1-xuanzhuo@linux.alibaba.com
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions