lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 Feb 2009 20:24:48 +0100 From: Jarek Poplawski <jarkao2@...il.com> To: Vlad Yasevich <vladislav.yasevich@...com> Cc: Krzysztof Oledzki <ole@....pl>, Marco Berizzi <pupilla@...mail.com>, netdev@...r.kernel.org Subject: Re: WARNING: at net/core/skbuff.c:154 with tcpdump and ipsec On Fri, Feb 13, 2009 at 01:56:01PM -0500, Vlad Yasevich wrote: ... > I did notice that pskb_expand_head() doesn't change the skb->truesize even > though it could grow the skb. I saw this problem with tcpdump while > experimenting with some SCTP code. > > This is not to say that it is the problem in this case, but it's one of > them that I've seen. Yes, I've read Herbert Xu's message pointing especially to xfrm_state_check_space(). So I would like to make sure if there is no other reason it triggers in packet_recvmsg() on these several reports. If af_packet code is OK, I guess we could update truesize for it: there is no reason to warn here about bugs from other, well known places. Jarek P. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists