lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 17 May 2012 10:59:45 +0800 From: Jason Wang <jasowang@...hat.com> To: Shirley Ma <mashirle@...ibm.com> CC: eric.dumazet@...il.com, mst@...hat.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, ebiederm@...ssion.com, davem@...emloft.net Subject: Re: [V2 PATCH 2/9] macvtap: zerocopy: fix truesize underestimation On 05/16/2012 11:03 PM, Shirley Ma wrote: > On Wed, 2012-05-16 at 11:04 +0800, Jason Wang wrote: >>>> diff --git a/drivers/net/macvtap.c b/drivers/net/macvtap.c >>>> index bd4a70d..7cb2684 100644 >>>> --- a/drivers/net/macvtap.c >>>> +++ b/drivers/net/macvtap.c >>>> @@ -519,6 +519,7 @@ static int zerocopy_sg_from_iovec(struct >> sk_buff >>>> *skb, const struct iovec *from, >>>> struct page *page[MAX_SKB_FRAGS]; >>>> int num_pages; >>>> unsigned long base; >>>> + unsigned long truesize; >>>> >>>> len = from->iov_len - offset; >>>> if (!len) { >>>> @@ -533,10 +534,11 @@ static int zerocopy_sg_from_iovec(struct >> sk_buff >>>> *skb, const struct iovec *from, >>>> (num_pages> MAX_SKB_FRAGS - >>>> skb_shinfo(skb)->nr_frags)) >>>> /* put_page is in skb free */ >>>> return -EFAULT; >>>> + truesize = size * PAGE_SIZE; >>> Here should be truesize = size * PAGE_SIZE - offset, right? >>> >> We get the whole user page, so need to account them all. Also this is >> aligned with skb_copy_ubufs(). > Then this would double count the size of "first" offset left from > previous copy, both skb->len and truesize. > > Thanks > Shirley > Didn't see how this affact skb->len. And for truesize, I think they are different, when the offset were not zero, the data in this vector were divided into two parts. First part is copied into skb directly, and the second were pinned from a whole userspace page by get_user_pages_fast(), so we need count the whole page to the socket limit to prevent evil application. Thanks -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists