[PATCH] net/af_packet: fix crash in secondary process
Kerem Aksu
kerem.aksu at i2i-systems.com
Fri Sep 12 10:47:58 CEST 2025
dumpcap crashes when trying to capture from af_packet devices. This is
caused by allocating interface name with
strdup (i.e. malloc). Interface name is not accessible from secondary
process and causes segmentation fault. Use rte_malloc instead of
strdup to fix the issue.
Bugzilla ID: 1786
Fixes: 1b93c2aa81b4 ("net/af_packet: add interface name to internals")
Cc: stable at dpdk.org
Reported-by: Kerem Aksu <kerem.aksu at i2i-systems.com>
Signed-off-by: Kerem Aksu <kerem.aksu at i2i-systems.com>
---
.mailmap | 1 +
drivers/net/af_packet/rte_eth_af_packet.c | 9 ++++++---
2 files changed, 7 insertions(+), 3 deletions(-)
diff --git a/.mailmap b/.mailmap
index 73d573e400..fadf873d4f 100644
--- a/.mailmap
+++ b/.mailmap
@@ -824,6 +824,7 @@ Kefu Chai <tchaikov at gmail.com>
Keiichi Watanabe <keiichiw at chromium.org>
Keith Wiles <keith.wiles at intel.com> <keith.wiles at windriver.com>
Kent Wires <kent.wires at intel.com>
+Kerem Aksu <kerem.aksu at i2i-systems.com>
Keunhong Lee <dlrmsghd at gmail.com>
Kevin Laatz <kevin.laatz at intel.com>
Kevin Lampis <klampis at solarflare.com>
diff --git a/drivers/net/af_packet/rte_eth_af_packet.c b/drivers/net/af_packet/rte_eth_af_packet.c
index 85bc1201b4..6928fc200f 100644
--- a/drivers/net/af_packet/rte_eth_af_packet.c
+++ b/drivers/net/af_packet/rte_eth_af_packet.c
@@ -525,7 +525,7 @@ eth_dev_close(struct rte_eth_dev *dev)
rte_free(internals->rx_queue[q].rd);
rte_free(internals->tx_queue[q].rd);
}
- free(internals->if_name);
+ rte_free(internals->if_name);
rte_free(internals->rx_queue);
rte_free(internals->tx_queue);
@@ -875,9 +875,12 @@ rte_pmd_init_internals(struct rte_vdev_device *dev,
PMD_LOG_ERRNO(ERR, "%s: ioctl failed (SIOCGIFINDEX)", name);
goto free_internals;
}
- (*internals)->if_name = strdup(pair->value);
+ (*internals)->if_name = rte_zmalloc_socket(name, ifnamelen + 1,
+ 0, numa_node);
if ((*internals)->if_name == NULL)
goto free_internals;
+ memcpy((*internals)->if_name, pair->value, ifnamelen);
+ (*internals)->if_name[ifnamelen] = '\0';
(*internals)->if_index = ifr.ifr_ifindex;
if (ioctl(sockfd, SIOCGIFHWADDR, &ifr) == -1) {
@@ -1063,7 +1066,7 @@ rte_pmd_init_internals(struct rte_vdev_device *dev,
free_internals:
rte_free((*internals)->rx_queue);
rte_free((*internals)->tx_queue);
- free((*internals)->if_name);
+ rte_free((*internals)->if_name);
rte_free(*internals);
return -1;
}
--
2.34.1
--
Yasal Uyarı: *Bu elektronik posta bu linki kullanarak ulaşabileceğiniz
koşullara tabidir:** **https://i2i-systems.com/email-disclaimer/
<http://i2i-systems.com/about-us/email-disclaimer/>*
More information about the dev
mailing list