>This patch fixes a possible buffer overrun problem in crypto perf test. >Previously when user configured aad size is over 12 bytes the copy of >template aad will cause a buffer overrun. >The problem is fixed by only copy up to 12 bytes of aad template. > >Fixes: 761a321acf91 ("event/cnxk: support vectorized Tx event fast >path" ) >Cc: pbhagavat...@marvell.com >
I don't see how the above mentioned patch is related to test-crypto-perf. Could you please recheck? >Signed-off-by: Przemyslaw Zegan <przemyslawx.ze...@intel.com> >--- > app/test-crypto-perf/cperf_test_vectors.c | 6 +++++- > 1 file changed, 5 insertions(+), 1 deletion(-) > >diff --git a/app/test-crypto-perf/cperf_test_vectors.c b/app/test- >crypto-perf/cperf_test_vectors.c >index 0af01ff911..2c7e314ec8 100644 >--- a/app/test-crypto-perf/cperf_test_vectors.c >+++ b/app/test-crypto-perf/cperf_test_vectors.c >@@ -548,12 +548,16 @@ cperf_test_vector_get_dummy(struct >cperf_options *options) > t_vec->aead_key.data = aead_key; > > if (options->aead_aad_sz) { >- t_vec->aad.data = rte_malloc(NULL, >+ t_vec->aad.data = rte_zmalloc(NULL, > options->aead_aad_sz, 16); > if (t_vec->aad.data == NULL) { > rte_free(t_vec); > return NULL; > } >+ >+ if(options->aead_aad_sz > 12) >+ options->aead_aad_sz = 12; >+ > memcpy(t_vec->aad.data, aad, options- >>aead_aad_sz); > t_vec->aad.phys_addr = >rte_malloc_virt2iova(t_vec->aad.data); > t_vec->aad.length = options->aead_aad_sz; >-- >2.17.1 > >-------------------------------------------------------------- >Intel Research and Development Ireland Limited >Registered in Ireland >Registered Office: Collinstown Industrial Park, Leixlip, County Kildare >Registered Number: 308263 > > >This e-mail and any attachments may contain confidential material for >the sole >use of the intended recipient(s). Any review or distribution by others is >strictly prohibited. If you are not the intended recipient, please contact >the >sender and delete all copies.