lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20130530234833.GD31349@verge.net.au>
Date:	Fri, 31 May 2013 08:48:33 +0900
From:	Simon Horman <horms@...ge.net.au>
To:	Chen Gang <gang.chen@...anux.com>
Cc:	David Miller <davem@...emloft.net>, netdev <netdev@...r.kernel.org>
Subject: Re: [Regression net-next] include/linux/skbuff.h: "1a37e41 net: Use
 16bits for *_headers fields of struct skbuff"

On Thu, May 30, 2013 at 07:21:17PM +0800, Chen Gang wrote:
> Hello Maintainers:
> 
> When not define NET_SKBUFF_DATA_USES_OFFSET, 'sk_buff_data_t' will be a
> pointer, then the last parameter of memmove() in mangle_contents() will
> be a pointer in "net/netfilter/nf_nat_helper.c".
> 
> The reason is from the patch "1a37e41 net: Use 16bits for *_headers
> fields of struct skbuff", it changed the type of 'skb->network_header'
> for saving size, it needs additional improvement.
> 
> The related warning (make EXTRA_CFLAGS=-W ARCH=m68k allmodconfig):
>   arch/m68k/include/asm/string.h:61:14: note: expected ‘__kernel_size_t’ but argument is of type ‘sk_buff_data_t’
> 
> 
> in "net/netfilter/nf_nat_helper.c"

Hi Chen,

thanks for pointing this out. I am preparing a patch to resolve this
problem.


> 
>  91 /* Frobs data inside this packet, which is linear. */
>  92 static void mangle_contents(struct sk_buff *skb,
>  93                             unsigned int dataoff,
>  94                             unsigned int match_offset,
>  95                             unsigned int match_len,
>  96                             const char *rep_buffer,
>  97                             unsigned int rep_len)
>  98 {
>  99         unsigned char *data;
> 100 
> 101         BUG_ON(skb_is_nonlinear(skb));
> 102         data = skb_network_header(skb) + dataoff;
> 103 
> 104         /* move post-replacement */
> 105         memmove(data + match_offset + rep_len,
> 106                 data + match_offset + match_len,
> 107                 skb->tail - (skb->network_header + dataoff +
> 108                              match_offset + match_len));
> 109 
> 
> 
> in "include/linux/skbuff.h":
> 
>  409 struct sk_buff {
>  410         /* These two members must be first. */
>  411         struct sk_buff          *next;
>  412         struct sk_buff          *prev;
>  413 
>  414         ktime_t                 tstamp;
>  415 
>  416         struct sock             *sk;
>  417         struct net_device       *dev;
>  418 
>  ...
>  515         __be16                  inner_protocol;
>  516         __u16                   inner_transport_header;
>  517         __u16                   inner_network_header;
>  518         __u16                   inner_mac_header;
>  519         __u16                   transport_header;
>  520         __u16                   network_header;
>  521         __u16                   mac_header;
>  522         /* These elements must be at the end, see alloc_skb() for details.  */
>  523         sk_buff_data_t          tail;
>  524         sk_buff_data_t          end;
>  525         unsigned char           *head,
>  526                                 *data;
>  527         unsigned int            truesize;
>  528         atomic_t                users;
>  529 };
>  530 
> 
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ