diff options
author | Honggang LI <[email protected]> | 2024-05-23 17:46:17 +0800 |
---|---|---|
committer | Leon Romanovsky <[email protected]> | 2024-06-09 11:51:32 +0300 |
commit | f67ac0061c7614c1548963d3ef1ee1606efd8636 (patch) | |
tree | badb2888aa59932108bbdb240083b8929d807f9b /lib/test_fortify/write_overflow-strncpy-src.c | |
parent | 03fa18a992d5626fd7bf3557a52e826bf8b326b3 (diff) |
RDMA/rxe: Fix responder length checking for UD request packets
According to the IBA specification:
If a UD request packet is detected with an invalid length, the request
shall be an invalid request and it shall be silently dropped by
the responder. The responder then waits for a new request packet.
commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking")
defers responder length check for UD QPs in function `copy_data`.
But it introduces a regression issue for UD QPs.
When the packet size is too large to fit in the receive buffer.
`copy_data` will return error code -EINVAL. Then `send_data_in`
will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into
ERROR state.
Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking")
Signed-off-by: Honggang LI <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Reviewed-by: Zhu Yanjun <[email protected]>
Signed-off-by: Leon Romanovsky <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions