diff options
| author | 2018-09-25 02:13:01 -0600 | |
|---|---|---|
| committer | 2018-09-25 10:39:34 -0700 | |
| commit | 22f9cde3401077ea450b69bf9b0bba373e12e454 (patch) | |
| tree | 7c51fbb18bf4a47ede96817e964cffd7c3953014 /drivers/net/xen-netback/common.h | |
| parent | xen-netback: fix input validation in xenvif_set_hash_mapping() (diff) | |
| download | wireguard-linux-22f9cde3401077ea450b69bf9b0bba373e12e454.tar.xz wireguard-linux-22f9cde3401077ea450b69bf9b0bba373e12e454.zip | |
xen-netback: validate queue numbers in xenvif_set_hash_mapping()
Checking them before the grant copy means nothing as to the validity of
the incoming request. As we shouldn't make the new data live before
having validated it, introduce a second instance of the mapping array.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/xen-netback/common.h')
| -rw-r--r-- | drivers/net/xen-netback/common.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/drivers/net/xen-netback/common.h b/drivers/net/xen-netback/common.h index a46a1e94505d..936c0b3e0ba2 100644 --- a/drivers/net/xen-netback/common.h +++ b/drivers/net/xen-netback/common.h @@ -241,8 +241,9 @@ struct xenvif_hash_cache { struct xenvif_hash { unsigned int alg; u32 flags; + bool mapping_sel; u8 key[XEN_NETBK_MAX_HASH_KEY_SIZE]; - u32 mapping[XEN_NETBK_MAX_HASH_MAPPING_SIZE]; + u32 mapping[2][XEN_NETBK_MAX_HASH_MAPPING_SIZE]; unsigned int size; struct xenvif_hash_cache cache; }; |
