lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 10 Jul 2010 19:36:34 -0700 (PDT) From: David Miller <davem@...emloft.net> To: tj@...nel.org Cc: linux-kernel@...r.kernel.org, netdev@...r.kernel.org, henning.fehrmann@....mpg.de, carsten.aulbert@....mpg.de Subject: Re: oops in tcp_xmit_retransmit_queue() w/ v2.6.32.15 From: Tejun Heo <tj@...nel.org> Date: Thu, 08 Jul 2010 10:22:02 +0200 > We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. ... > Does anything ring a bell? A long time ago we had a packet scheduler bug that could corrupt the TCP socket queues, but that was fixed in 2.6.27 so would definitely be fixed in your kernel. -------------------- commit 69747650c814a8a79fef412c7416adf823293a3e Author: David S. Miller <davem@...emloft.net> Date: Sun Aug 17 23:55:36 2008 -0700 pkt_sched: Fix return value corruption in HTB and TBF. Based upon a bug report by Josip Rodin. Packet schedulers should only return NET_XMIT_DROP iff the packet really was dropped. If the packet does reach the device after we return NET_XMIT_DROP then TCP can crash because it depends upon the enqueue path return values being accurate. Signed-off-by: David S. Miller <davem@...emloft.net> -------------------- Nothing else jumps to mind, sorry. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists