lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 Jun 2008 13:47:46 +0200 From: Ingo Molnar <mingo@...e.hu> To: David Miller <davem@...emloft.net> Cc: kuznet@....inr.ac.ru, vgusev@...nvz.org, mcmanus@...ksong.com, xemul@...nvz.org, netdev@...r.kernel.org, ilpo.jarvinen@...sinki.fi, linux-kernel@...r.kernel.org Subject: Re: [TCP]: TCP_DEFER_ACCEPT causes leak sockets * Ingo Molnar <mingo@...e.hu> wrote: > > Please test the patch I actually applied. > > i just updated all my testsystems to revert the change i tested so > far, and updated it to yours. The delta between the two is the 3 lines > patch below. > > A few testsystems already booted into your patch, so if i dont report > a hung TCP connection in the next 6 hours consider it: > > Tested-by: Ingo Molnar <mingo@...e.hu> this threw the warning below - never saw that before in thousands of bootups and this was the only networking change that happened. config and bootlog attached. Might be unlucky coincidence. Ingo [ 173.354049] NETDEV WATCHDOG: eth0: transmit timed out [ 173.354148] ------------[ cut here ]------------ [ 173.354221] WARNING: at net/sched/sch_generic.c:222 dev_watchdog+0x9a/0xec() [ 173.354298] Modules linked in: [ 173.354421] Pid: 13452, comm: cc1 Tainted: G W 2.6.26-rc6-00273-g81ae43a-dirty #2573 [ 173.354516] [<c01250ca>] warn_on_slowpath+0x46/0x76 [ 173.354641] [<c011d428>] ? try_to_wake_up+0x1d6/0x1e0 [ 173.354815] [<c01411e9>] ? trace_hardirqs_off+0xb/0xd [ 173.357370] [<c011d43d>] ? default_wake_function+0xb/0xd [ 173.357370] [<c014112a>] ? trace_hardirqs_off_caller+0x15/0xc9 [ 173.357370] [<c01411e9>] ? trace_hardirqs_off+0xb/0xd [ 173.357370] [<c0142c83>] ? trace_hardirqs_on+0xb/0xd [ 173.357370] [<c0142b33>] ? trace_hardirqs_on_caller+0x16/0x15b [ 173.357370] [<c0142c83>] ? trace_hardirqs_on+0xb/0xd [ 173.357370] [<c06bb3c9>] ? _spin_unlock_irqrestore+0x5b/0x71 [ 173.357370] [<c0133d46>] ? __queue_work+0x2d/0x32 [ 173.357370] [<c0134023>] ? queue_work+0x50/0x72 [ 173.357483] [<c0134059>] ? schedule_work+0x14/0x16 [ 173.357654] [<c05c59b8>] dev_watchdog+0x9a/0xec [ 173.357783] [<c012d456>] run_timer_softirq+0x13d/0x19d [ 173.357905] [<c05c591e>] ? dev_watchdog+0x0/0xec [ 173.358073] [<c05c591e>] ? dev_watchdog+0x0/0xec [ 173.360804] [<c0129ad7>] __do_softirq+0xb2/0x15c [ 173.360804] [<c0129a25>] ? __do_softirq+0x0/0x15c [ 173.360804] [<c0105526>] do_softirq+0x84/0xe9 [ 173.360804] [<c0129996>] irq_exit+0x4b/0x88 [ 173.360804] [<c010ec7a>] smp_apic_timer_interrupt+0x73/0x81 [ 173.360804] [<c0103ddd>] apic_timer_interrupt+0x2d/0x34 [ 173.360804] ======================= [ 173.360804] ---[ end trace a7919e7f17c0a725 ]--- [ 173.396182] evbug.c: Event. Dev: <NULL>, Type: 0, Code: 0, Value: 0 [ 173.446150] evbug.c: Event. Dev: <NULL>, Type: 0, Code: 0, Value: 0 View attachment "config" of type "text/plain" (46021 bytes) Download attachment "boot.log.bz2" of type "application/x-bzip2" (62071 bytes)
Powered by blists - more mailing lists