lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 28 Nov 2014 16:07:40 +0800 From: FengYu LeiDian <fengyuleidian0615@...il.com> To: Li RongQing <roy.qing.li@...il.com> CC: netdev <netdev@...r.kernel.org> Subject: Re: [PATCH iproute2] ip xfrm: support 64bit kernel and 32bit userspace 于 2014年11月28日 15:35, Li RongQing 写道: > On Fri, Nov 28, 2014 at 3:08 PM, FengYu LeiDian > <fengyuleidian0615@...il.com> wrote: >> >于 2014年11月28日 14:58,roy.qing.li@...il.com 写道: >>> >>From: Li RongQing<roy.qing.li@...il.com> >>> >> >>> >>The size of struct xfrm_userpolicy_info is 168 bytes for 64bit kernel, and >>> >>164 bytes for 32bit userspace because of the different alignment. and lead >>> >>to "ip xfrm" be unable to work. >>> >> >>> >>add a pad in struct xfrm_userpolicy_info, and enable it by set >>> >>KERNEL_64_USERSPACE_32 to y >> > >> > >> >It's not easy to fix it like this. >> > >> >Refer: >> >http://marc.info/?l=linux-netdev&m=139280143513650&w=2 >> >http://thread.gmane.org/gmane.linux.network/157118/focus=157122 >> > > is it be practical to find all structures which has the issue for > 64bit kernel and 32 bit > userspace, and conditionally add a pad for them Apparently struct xfrm_userpolicy_info is not the only one, you could try to set SA as well, it breaks also... Fix those where it hurts, hehe :) Otherwise, the "compat layer" fix style is good choice. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists