lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4C222234.60903@extricom.com> Date: Wed, 23 Jun 2010 18:03:16 +0300 From: Eran Liberty <liberty@...ricom.com> To: David Miller <davem@...emloft.net> CC: galak@...nel.crashing.org, netdev@...r.kernel.org Subject: Re: [PATCH] gainfar.c : skb_over_panic David Miller wrote: > From: Eran Liberty <liberty@...ricom.com> > Date: Thu, 17 Jun 2010 19:32:54 +0300 > > >> I have demonstrated skb_over_panic with linux 2.6.32.15 on a mpc8548 >> based product. >> > > A fix for a similar bug was necessary for the ucc_geth driver, > see below. > > The real problem is that skb->data assignment, the rest of the > SKB state has to be reset, and not doing that is what results in > the skb_over_panic calls. > > >From db176edc89abbf22e6db6853f8581f9475fe8ec1 Mon Sep 17 00:00:00 2001 > From: Sergey Matyukevich <geomatsi@...il.com> > Date: Mon, 14 Jun 2010 06:35:20 +0000 > Subject: [PATCH] ucc_geth: fix for RX skb buffers recycling > > This patch implements a proper modification of RX skb buffers before > recycling. Adjusting only skb->data is not enough because after that > skb->tail and skb->len become incorrect. > > Signed-off-by: Sergey Matyukevich <geomatsi@...il.com> > Signed-off-by: David S. Miller <davem@...emloft.net> > --- > drivers/net/ucc_geth.c | 2 ++ > 1 files changed, 2 insertions(+), 0 deletions(-) > > diff --git a/drivers/net/ucc_geth.c b/drivers/net/ucc_geth.c > index 4a34833..807470e 100644 > --- a/drivers/net/ucc_geth.c > +++ b/drivers/net/ucc_geth.c > @@ -3215,6 +3215,8 @@ static int ucc_geth_rx(struct ucc_geth_private *ugeth, u8 rxQ, int rx_work_limit > __func__, __LINE__, (u32) skb); > if (skb) { > skb->data = skb->head + NET_SKB_PAD; > + skb->len = 0; > + skb_reset_tail_pointer(skb); > __skb_queue_head(&ugeth->rx_recycle, skb); > } > > When I do go via this code this patch helps. But, I have managed to reach the skb_over_panic without going first via __skb_queue_head() which render this patch useless... So I am investigating this before suggesting any patch. doing something like this: if (unlikely(skb->tail + pkt_len > skb->end)) { pr_err("gfar_clean_rx_ring(): skb_over_panic event avoided\n"); dev_kfree_skb_any(skb); } else { skb_put(skb, pkt_len); dev->stats.rx_bytes += pkt_len; if (in_irq() || irqs_disabled()) printk("Interrupt problem!\n"); gfar_process_frame(dev, skb, amount_pull); } successfully avoids the skb_over_panic(), But I rather find the offending skb creator then continuously defend against its arrival. -- Liberty -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists