From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id DD748427E0; Mon, 20 Mar 2023 10:29:36 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7F13342D59; Mon, 20 Mar 2023 10:28:25 +0100 (CET) Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by mails.dpdk.org (Postfix) with ESMTP id 77C5F42D12 for ; Mon, 20 Mar 2023 10:28:09 +0100 (CET) Received: from dggpeml500024.china.huawei.com (unknown [172.30.72.57]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4Pg8TX3xmcz17MZl; Mon, 20 Mar 2023 17:25:04 +0800 (CST) Received: from localhost.localdomain (10.50.163.32) by dggpeml500024.china.huawei.com (7.185.36.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Mon, 20 Mar 2023 17:28:08 +0800 From: Chengwen Feng To: , , Jingjing Wu , Beilei Xing , Qi Zhang , Wenjun Wu , Xiaolong Ye , Haiyue Wang CC: Subject: [PATCH v2 16/44] net/iavf: fix segment fault when parse devargs Date: Mon, 20 Mar 2023 09:20:42 +0000 Message-ID: <20230320092110.37295-17-fengchengwen@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230320092110.37295-1-fengchengwen@huawei.com> References: <20230314124813.39521-1-fengchengwen@huawei.com> <20230320092110.37295-1-fengchengwen@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.50.163.32] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpeml500024.china.huawei.com (7.185.36.10) X-CFilter-Loop: Reflected X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org The rte_kvargs_process() was used to parse KV pairs, it also supports to parse 'only keys' (e.g. socket_id) type. And the callback function parameter 'value' is NULL when parsed 'only keys'. This patch fixes segment fault when parse input args with 'only keys'. Fixes: b14e8a57b9fe ("net/iavf: support quanta size configuration") Fixes: 4cce7422dd38 ("net/iavf: stop PCI probe in DCF mode") Cc: stable@dpdk.org Signed-off-by: Chengwen Feng --- drivers/net/iavf/iavf_ethdev.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/net/iavf/iavf_ethdev.c b/drivers/net/iavf/iavf_ethdev.c index 3196210f2c..654741b71f 100644 --- a/drivers/net/iavf/iavf_ethdev.c +++ b/drivers/net/iavf/iavf_ethdev.c @@ -2185,6 +2185,9 @@ parse_u16(__rte_unused const char *key, const char *value, void *args) u16 *num = (u16 *)args; u16 tmp; + if (value == NULL) + return -EINVAL; + errno = 0; tmp = strtoull(value, NULL, 10); if (errno || !tmp) { @@ -2815,6 +2818,9 @@ static int iavf_dcf_cap_check_handler(__rte_unused const char *key, const char *value, __rte_unused void *opaque) { + if (value == NULL) + return -EINVAL; + if (strcmp(value, "dcf")) return -1; -- 2.17.1