lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 23 May 2014 12:13:23 +0100 From: Jim Baxter <jim_baxter@...tor.com> To: David Laight <David.Laight@...LAB.COM>, 'Bjørn Mork' <bjorn@...k.no> CC: 'Eric Dumazet' <eric.dumazet@...il.com>, "linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "David S. Miller" <davem@...emloft.net>, "kamal@...onical.com" <kamal@...onical.com>, "edumazet@...gle.com" <edumazet@...gle.com>, "mszeredi@...e.cz" <mszeredi@...e.cz>, "fw@...len.de" <fw@...len.de> Subject: Re: skbuff truesize incorrect. On 23/05/14 11:45, David Laight wrote: > From: Bjørn Mork [mailto:bjorn@...k.no] >> David Laight <David.Laight@...LAB.COM> writes: > ... >>> Note that some of the usb ethernet drivers allocate large skb then >>> lie about the truesize. >> >> Hmm, which drivers are these? > > $ grep truesize linux/drivers/net/usb/* > > asix_88179_178a, smsc95xx, sr9700. > > David > What are the side effects of changing the truesize, if the original uncloned skb has the full truesize then isn't the potential memory usage still counted for the avoidance of OOM? I suppose if the uncloned skb is deleted you would then have a problem so a chain of URB's would be the safest solution. Jim -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists