From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B10B8A0350 for ; Mon, 21 Feb 2022 16:42:32 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A78504013F; Mon, 21 Feb 2022 16:42:32 +0100 (CET) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mails.dpdk.org (Postfix) with ESMTP id 61F144013F for ; Mon, 21 Feb 2022 16:42:31 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1645458150; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=B3/qTz7xs+Hm+SAuaIanbgUCqZ8dY/DBP3pU74QuWVE=; b=I00KL4gLa2Z4iTI+utk14RG69ZEfdMWaZT8dfhvEworqs6H7WiQV5rcVgl8JF932vuKk6v K7qN7tWzryL2lqTH9vomu8/HxCateVVG94vZ4cqVjCpipYmrjDj01GQizNT0XPS5KQyoYg d6UMsoePzTwhOfC5ledM2OmF9AVQeys= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-13-YGLDWWjVMa-4C3GKL2qHAw-1; Mon, 21 Feb 2022 10:42:27 -0500 X-MC-Unique: YGLDWWjVMa-4C3GKL2qHAw-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 9FA46100C663; Mon, 21 Feb 2022 15:42:26 +0000 (UTC) Received: from rh.Home (unknown [10.39.195.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7BD6D7E2E9; Mon, 21 Feb 2022 15:42:25 +0000 (UTC) From: Kevin Traynor To: Weiguo Li Cc: Radu Nicolau , dpdk stable Subject: patch 'net/iavf: fix null pointer dereference' has been queued to stable release 21.11.1 Date: Mon, 21 Feb 2022 15:35:54 +0000 Message-Id: <20220221153625.152324-165-ktraynor@redhat.com> In-Reply-To: <20220221153625.152324-1-ktraynor@redhat.com> References: <20220221153625.152324-1-ktraynor@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=ktraynor@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 21.11.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 02/26/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable/commit/f746bb72bac435c1cc81beb2e2fd444ece918db4 Thanks. Kevin --- >From f746bb72bac435c1cc81beb2e2fd444ece918db4 Mon Sep 17 00:00:00 2001 From: Weiguo Li Date: Fri, 28 Jan 2022 17:43:15 +0800 Subject: [PATCH] net/iavf: fix null pointer dereference [ upstream commit 1b72049dc2d3b024b8026f57001a98ea1f80e5a7 ] Check for memory allocation failure is added to avoid null pointer dereference. Fixes: 6bc987ecb860 ("net/iavf: support IPsec inline crypto") Signed-off-by: Weiguo Li Acked-by: Radu Nicolau --- drivers/net/iavf/iavf_ipsec_crypto.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/iavf/iavf_ipsec_crypto.c b/drivers/net/iavf/iavf_ipsec_crypto.c index adf101ab8a..6ac1b213db 100644 --- a/drivers/net/iavf/iavf_ipsec_crypto.c +++ b/drivers/net/iavf/iavf_ipsec_crypto.c @@ -1353,4 +1353,6 @@ iavf_ipsec_crypto_set_security_capabililites(struct iavf_security_ctx sizeof(struct rte_cryptodev_capabilities) * (number_of_capabilities + 1), 0); + if (!capabilities) + return -ENOMEM; capabilities[number_of_capabilities].op = RTE_CRYPTO_OP_TYPE_UNDEFINED; -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-02-21 15:22:48.119178762 +0000 +++ 0165-net-iavf-fix-null-pointer-dereference.patch 2022-02-21 15:22:44.317704635 +0000 @@ -1 +1 @@ -From 1b72049dc2d3b024b8026f57001a98ea1f80e5a7 Mon Sep 17 00:00:00 2001 +From f746bb72bac435c1cc81beb2e2fd444ece918db4 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 1b72049dc2d3b024b8026f57001a98ea1f80e5a7 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org