Re: [dpdk-dev] [PATCH v3] gro: add missing invalid TCP header length check

2019-01-17 Thread Thomas Monjalon
16/01/2019 10:49, Ananyev, Konstantin: > From: Hu, Jiayu > > > > When the TCP header length of input packets is invalid (i.e., less > > than 20 bytes or greater than 60 bytes), check_seq_option() will > > access illegal memory area when compare TCP Options, which may > > cause a segmentation fault

Re: [dpdk-dev] [PATCH v3] gro: add missing invalid TCP header length check

2019-01-16 Thread Ananyev, Konstantin
> -Original Message- > From: Hu, Jiayu > Sent: Wednesday, January 16, 2019 12:46 AM > To: dev@dpdk.org > Cc: Ananyev, Konstantin ; tho...@monjalon.net; > Hu, Jiayu ; sta...@dpdk.org > Subject: [PATCH v3] gro: add missing invalid TCP header length check > > When the TCP header length of

[dpdk-dev] [PATCH v3] gro: add missing invalid TCP header length check

2019-01-15 Thread Jiayu Hu
When the TCP header length of input packets is invalid (i.e., less than 20 bytes or greater than 60 bytes), check_seq_option() will access illegal memory area when compare TCP Options, which may cause a segmentation fault. This patch adds missing invalid TCP header length check to avoid illegal me