lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 28 Feb 2014 19:16:56 +0000 From: Zoltan Kiss <zoltan.kiss@...rix.com> To: Jesse Gross <jesse@...ira.com>, <pshelar@...ira.com>, <tgraf@...hat.com>, <dev@...nvswitch.org> CC: <xen-devel@...ts.xenproject.org>, <netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org>, Zoltan Kiss <zoltan.kiss@...rix.com> Subject: [PATCH] openvswitch: Orphan frags before sending to userspace via Netlink to avoid guest stall The kernel datapath now switched to zerocopy Netlink messages, but that also means that the pages on frags array are sent straight to userspace. If those pages came outside the kernel, we have to swap them out with local copies. Signed-off-by: Zoltan Kiss <zoltan.kiss@...rix.com> --- net/openvswitch/datapath.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/net/openvswitch/datapath.c b/net/openvswitch/datapath.c index 36f8872..ffb563c 100644 --- a/net/openvswitch/datapath.c +++ b/net/openvswitch/datapath.c @@ -464,6 +464,12 @@ static int queue_userspace_packet(struct datapath *dp, struct sk_buff *skb, } nla->nla_len = nla_attr_size(skb->len); + if (unlikely(skb_orphan_frags(skb, GFP_ATOMIC))) { + err = -ENOMEM; + skb_tx_error(skb); + goto out; + } + skb_zerocopy(user_skb, skb, skb->len, hlen); /* Pad OVS_PACKET_ATTR_PACKET if linear copy was performed */ -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists