On Dec 17, 2013, at 10:10 AM, Ben Pfaff <b...@nicira.com> wrote:

> On Tue, Dec 17, 2013 at 12:16:23AM -0800, Alex Wang wrote:
>> Commit da546e0 (dpif: Allow execute to modify the packet.) uninitializes
>> the "dpif_upcall.packet" of "struct upcall" when dpif_recv() returns error.
>> Since the "struct upcall" is allocated via xmalloc, this will cause SEGFAULT
>> if dpif_recv() returns error before memset the memory to all zero.
>> 
>> This commit fixes the bug by using xzalloc to allocate memory for "struct
>> upcall".
>> 
>> Signed-off-by: Alex Wang <al...@nicira.com>
> 
> A struct upcall is quite large.  I would prefer not to clear the whole
> thing if we can avoid it.

I just sent a patch that avoids it.

  Jarno

_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to