lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <29E928B8732A4CB19946EEA9F004FACB@hacdom.okisemi.com>
Date:	Thu, 27 Jan 2011 17:45:35 +0900
From:	"Toshiharu Okada" <toshiharu-linux@....okisemi.com>
To:	"David Miller" <davem@...emloft.net>
Cc:	<netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
	<qi.wang@...el.com>, <yong.y.wang@...el.com>,
	<andrew.chih.howe.khor@...el.com>, <joel.clark@...el.com>,
	<kok.howg.ewe@...el.com>
Subject: Re: [PATCH] pch_gbe: Fix the issue that the receiving data is not normal.

Hi David

Thank you for your comment.
I will confirm them  and will submit the patch modified.

Best regards
Toshiharu Okada(OKI semiconductor)
----- Original Message ----- 
From: "David Miller" <davem@...emloft.net>
To: <toshiharu-linux@....okisemi.com>
Cc: <netdev@...r.kernel.org>; <linux-kernel@...r.kernel.org>; 
<qi.wang@...el.com>; <yong.y.wang@...el.com>; 
<andrew.chih.howe.khor@...el.com>; <joel.clark@...el.com>; 
<kok.howg.ewe@...el.com>
Sent: Wednesday, January 26, 2011 6:32 AM
Subject: Re: [PATCH] pch_gbe: Fix the issue that the receiving data is not 
normal.


From: Toshiharu Okada <toshiharu-linux@....okisemi.com>
Date: Mon, 24 Jan 2011 13:43:31 +0900

> This PCH_GBE driver had an issue that the receiving data is not normal.
> This driver had not removed correctly the padding data
> which the DMA include in receiving data.
>
> This patch fixed this issue.
>
> Signed-off-by: Toshiharu Okada <toshiharu-linux@....okisemi.com>

There are bugs in these changes:

>  if (skb_copy_flag) { /* recycle  skb */
>  struct sk_buff *new_skb;
>  new_skb =
> -     netdev_alloc_skb(netdev,
> -      length + NET_IP_ALIGN);
> +     netdev_alloc_skb(netdev, length);
>  if (new_skb) {
>  if (!skb_padding_flag) {
>  skb_reserve(new_skb,
> - NET_IP_ALIGN);
> + PCH_GBE_DMA_PADDING);
>  }
>  memcpy(new_skb->data, skb->data,
>  length);

If "!skb_padding_flag" then you will write past the end of the SKB
data in that memcpy.

You cannot allocate only "length" then proceed to reserve 
PCH_GBE_DMA_PADDING
and then add "length" worth of data on top of that.  In such a cause you
must allocate at least "length + PCH_GBE_DMA_PADDING".

Furthermore you _MUST_ respect NET_IP_ALIGN.  Some platforms set this value
to "0", because otherwise performance suffers greatly.

There are two seperate issues, removing the padding bytes provided by
the device, and aligning the IP headers as wanted by the cpu
architecutre.  Therefore they should be handled seperately, and we
therefore should still see references to NET_IP_ALIGN in your patch.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ