From patchwork Wed May 12 02:27:22 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jie Wang X-Patchwork-Id: 93182 X-Patchwork-Delegate: qi.z.zhang@intel.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2550DA0C3F; Wed, 12 May 2021 06:33:22 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 914754003F; Wed, 12 May 2021 06:33:21 +0200 (CEST) Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mails.dpdk.org (Postfix) with ESMTP id AB8044003E for ; Wed, 12 May 2021 06:33:19 +0200 (CEST) IronPort-SDR: ccApqjbohvw8TiYVLFIJyfK1oVo1RO0Ytc5bqLr3Z580oglbzYU12l3zM2TiT/j6349q0JxUeI VGvKRQy4PvxA== X-IronPort-AV: E=McAfee;i="6200,9189,9981"; a="199294734" X-IronPort-AV: E=Sophos;i="5.82,292,1613462400"; d="scan'208";a="199294734" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP; 11 May 2021 21:33:14 -0700 IronPort-SDR: ujTfCrlXu4MDk28erlgkN/NXfXYp3RoU2gbD5i0Q/mTws1ZxnFJsNYojxKwY4U1a8pDpLLEq4r On6b8vXPtfcw== X-IronPort-AV: E=Sophos;i="5.82,292,1613462400"; d="scan'208";a="471301182" Received: from vfio-vm.cd.intel.com ([10.240.178.195]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 May 2021 19:39:37 -0700 From: Wang Jie To: dev@dpdk.org Cc: Qiming Yang , Qi Zhang , Wang Jie Date: Wed, 12 May 2021 02:27:22 +0000 Message-Id: <20210512022722.4732-1-jie1x.wang@intel.com> X-Mailer: git-send-email 2.17.1 Subject: [dpdk-dev] [PATCH] net/ice: fix VSI array out of bounds X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" In the loop, when the index of array "vsi->rss_key" is equal to "vsi->rss_key_size", the array will be out of bounds. Fixes: 50370662b727 ("net/ice: support device and queue ops") Signed-off-by: Wang Jie Acked-by: Qi Zhang --- drivers/net/ice/ice_ethdev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ice/ice_ethdev.c b/drivers/net/ice/ice_ethdev.c index 3e60acc01a..65efb3e966 100644 --- a/drivers/net/ice/ice_ethdev.c +++ b/drivers/net/ice/ice_ethdev.c @@ -3034,7 +3034,7 @@ static int ice_init_rss(struct ice_pf *pf) /* configure RSS key */ if (!rss_conf->rss_key) { /* Calculate the default hash key */ - for (i = 0; i <= vsi->rss_key_size; i++) + for (i = 0; i < vsi->rss_key_size; i++) vsi->rss_key[i] = (uint8_t)rte_rand(); } else { rte_memcpy(vsi->rss_key, rss_conf->rss_key,