Re: [PATCH] ring: fix overflow in memory size calcuation

2022-02-05 Thread David Marchand
On Tue, Dec 14, 2021 at 4:30 AM Zhihong Wang wrote: > > Parameters count and esize are both unsigned int, and their product can > legally exceed unsigned int and lead to runtime access violation. > > Fixes: cc4b218790f6 ("ring: support configurable element size") > Cc: sta...@dpdk.org > > Signed-o

RE: [PATCH] ring: fix overflow in memory size calcuation

2021-12-15 Thread Ananyev, Konstantin
> Parameters count and esize are both unsigned int, and their product can > legally exceed unsigned int and lead to runtime access violation. > > Fixes: cc4b218790f6 ("ring: support configurable element size") > Cc: sta...@dpdk.org > > Signed-off-by: Zhihong Wang > --- > lib/ring/rte_ring.c

RE: [PATCH] ring: fix overflow in memory size calcuation

2021-12-15 Thread Morten Brørup
> From: Liang Ma [mailto:lian...@liangbit.com] > Sent: Wednesday, 15 December 2021 09.01 > > On Tue, Dec 14, 2021 at 11:30:16AM +0800, Zhihong Wang wrote: > > Parameters count and esize are both unsigned int, and their product > can > > legally exceed unsigned int and lead to runtime access violat

Re: [PATCH] ring: fix overflow in memory size calcuation

2021-12-15 Thread Liang Ma
On Tue, Dec 14, 2021 at 11:30:16AM +0800, Zhihong Wang wrote: > Parameters count and esize are both unsigned int, and their product can > legally exceed unsigned int and lead to runtime access violation. > > Fixes: cc4b218790f6 ("ring: support configurable element size") > Cc: sta...@dpdk.org > >

[PATCH] ring: fix overflow in memory size calcuation

2021-12-13 Thread Zhihong Wang
Parameters count and esize are both unsigned int, and their product can legally exceed unsigned int and lead to runtime access violation. Fixes: cc4b218790f6 ("ring: support configurable element size") Cc: sta...@dpdk.org Signed-off-by: Zhihong Wang --- lib/ring/rte_ring.c | 2 +- 1 file change