diff options
| author | Michael J. Ruhl <michael.j.ruhl@intel.com> | 2018-09-28 07:34:57 -0700 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-11-24 08:19:27 +0100 |
| commit | e0dee1c839e3bc66e8a5ca0316eec9ca742d7c02 (patch) | |
| tree | 0108b806fb36fe626914fdf72f2c66873a705847 /kernel/nsproxy.c | |
| parent | 8d93707e71958661198b643be9e0bf8e5b7415d0 (diff) | |
IB/hfi1: Error path MAD response size is incorrect
[ Upstream commit 935c84ac649a147e1aad2c48ee5c5a1a9176b2d0 ]
If a MAD packet has incorrect header information, the logic uses the reply
path to report the error. The reply path expects *resp_len to be set
prior to return. Unfortunately, *resp_len is set to 0 for this path.
This causes an incorrect response packet.
Fix by ensuring that the *resp_len is defaulted to the incoming packet
size (wc->bytes_len - sizeof(GRH)).
Reviewed-by: Mike Marciniszyn <mike.marciniszyn@intel.com>
Signed-off-by: Michael J. Ruhl <michael.j.ruhl@intel.com>
Signed-off-by: Dennis Dalessandro <dennis.dalessandro@intel.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'kernel/nsproxy.c')
0 files changed, 0 insertions, 0 deletions
