ring: fix overflow in memory size calculation
authorZhihong Wang <wangzhihong.wzh@bytedance.com>
Tue, 14 Dec 2021 03:30:16 +0000 (11:30 +0800)
committerDavid Marchand <david.marchand@redhat.com>
Sat, 5 Feb 2022 17:15:33 +0000 (18:15 +0100)
commit0e4dc6af06228c8504a5538512cb31ed7bf6cc23
treef54b9f400a4129b992d04da38449c6e5342a6526
parent436e82b78c471f08769cebbdf0abce243063c24f
ring: fix overflow in memory size calculation

Parameters count and esize are both unsigned int, and their product can
legaly exceed unsigned int and lead to runtime access violation.

Fixes: cc4b218790f6 ("ring: support configurable element size")
Cc: stable@dpdk.org
Signed-off-by: Zhihong Wang <wangzhihong.wzh@bytedance.com>
Reviewed-by: Liang Ma <liangma@liangbit.com>
Reviewed-by: Morten Brørup <mb@smartsharesystems.com>
Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
lib/ring/rte_ring.c