lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 7 Sep 2022 18:40:56 -0600 From: David Ahern <dsahern@...nel.org> To: Andrew Melnychenko <andrew@...nix.com>, edumazet@...gle.com, netdev@...r.kernel.org, virtualization@...ts.linux-foundation.org, linux-kernel@...r.kernel.org, davem@...emloft.net, kuba@...nel.org, jasowang@...hat.com, mst@...hat.com, pabeni@...hat.com, yoshfuji@...ux-ipv6.org Cc: yan@...nix.com, yuri.benditovich@...nix.com Subject: Re: [PATCH v3 1/6] udp: allow header check for dodgy GSO_UDP_L4 packets. On 9/7/22 6:50 AM, Andrew Melnychenko wrote: > diff --git a/net/ipv4/udp_offload.c b/net/ipv4/udp_offload.c > index 6d1a4bec2614..8e002419b4d5 100644 > --- a/net/ipv4/udp_offload.c > +++ b/net/ipv4/udp_offload.c > @@ -387,7 +387,7 @@ static struct sk_buff *udp4_ufo_fragment(struct sk_buff *skb, > if (!pskb_may_pull(skb, sizeof(struct udphdr))) > goto out; > > - if (skb_shinfo(skb)->gso_type & SKB_GSO_UDP_L4) > + if (skb_shinfo(skb)->gso_type & SKB_GSO_UDP_L4 && !skb_gso_ok(skb, features | NETIF_F_GSO_ROBUST)) that line needs to be wrapped. > return __udp_gso_segment(skb, features, false); > > mss = skb_shinfo(skb)->gso_size;
Powered by blists - more mailing lists