[PATCH] examples/l3fwd: resolve stack buffer overflow issue
Thomas Monjalon
thomas at monjalon.net
Mon Mar 14 23:16:20 CET 2022
> > This patch fixes the stack buffer overflow error reported
> > from AddressSanitizer.
> > Function send_packetsx4() tries to access out of bound data
> > from rte_mbuf and fill it into TX buffer even in the case
> > where no pending packets (len = 0).
> > Performance impact:- No
> >
> > ASAN error report:-
> > ==819==ERROR: AddressSanitizer: stack-buffer-overflow on address
> > 0xffffe2c0dcf0 at pc 0x0000005e791c bp 0xffffe2c0d7e0 sp 0xffffe2c0d800
> > READ of size 8 at 0xffffe2c0dcf0 thread T0
> > #0 0x5e7918 in send_packetsx4 ../examples/l3fwd/l3fwd_common.h:251
> > #1 0x5e7918 in send_packets_multi ../examples/l3fwd/l3fwd_neon.h:226
> >
> > Signed-off-by: Rahul Bhansali <rbhansali at marvell.com>
> Reviewed-by: Conor Walsh <conor.walsh at intel.com>
> Acked-by: Konstantin Ananyev <konstantin.ananyev at intel.com>
Applied, thanks.
More information about the dev
mailing list