lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <02d91acf-4b22-bb2e-8617-9277423c5789@mellanox.com>
Date:   Sun, 20 Aug 2017 12:19:41 +0300
From:   Tariq Toukan <tariqt@...lanox.com>
To:     Ben Hutchings <ben@...adent.org.uk>, linux-kernel@...r.kernel.org,
        stable@...r.kernel.org
Cc:     akpm@...ux-foundation.org, "David S. Miller" <davem@...emloft.net>,
        Talat Batheesh <talatb@...lanox.com>
Subject: Re: [PATCH 3.16 124/134] net/mlx4_en: Avoid adding steering rules
 with invalid ring


On 18/08/2017 4:13 PM, Ben Hutchings wrote:
> 3.16.47-rc1 review patch.  If anyone has any objections, please let me know.
Please notice that there's a fix for this patch, here:

6dc06c08bef1 net/mlx4: Fix the check in attaching steering rules

>
> ------------------
>
> From: Talat Batheesh <talatb@...lanox.com>
>
> commit 89c557687a32c294e9d25670a96e9287c09f2d5f upstream.
>
> Inserting steering rules with illegal ring is an invalid operation,
> block it.
>
> Fixes: 820672812f82 ('net/mlx4_en: Manage flow steering rules with ethtool')
> Signed-off-by: Talat Batheesh <talatb@...lanox.com>
> Signed-off-by: Tariq Toukan <tariqt@...lanox.com>
> Signed-off-by: David S. Miller <davem@...emloft.net>
> Signed-off-by: Ben Hutchings <ben@...adent.org.uk>
> ---
>   drivers/net/ethernet/mellanox/mlx4/en_ethtool.c | 5 +++++
>   1 file changed, 5 insertions(+)
>
> --- a/drivers/net/ethernet/mellanox/mlx4/en_ethtool.c
> +++ b/drivers/net/ethernet/mellanox/mlx4/en_ethtool.c
> @@ -930,6 +930,11 @@ static int mlx4_en_flow_replace(struct n
>   		qpn = priv->drop_qp.qpn;
>   	else if (cmd->fs.ring_cookie & EN_ETHTOOL_QP_ATTACH) {
>   		qpn = cmd->fs.ring_cookie & (EN_ETHTOOL_QP_ATTACH - 1);
> +		if (qpn < priv->rss_map.base_qpn ||
> +		    qpn >= priv->rss_map.base_qpn + priv->rx_ring_num) {
> +			en_warn(priv, "rxnfc: QP (0x%x) doesn't exist\n", qpn);
> +			return -EINVAL;
> +		}
>   	} else {
>   		if (cmd->fs.ring_cookie >= priv->rx_ring_num) {
>   			en_warn(priv, "rxnfc: RX ring (%llu) doesn't exist\n",
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ