lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 09 Jul 2009 01:21:49 +0200 From: Eric Dumazet <eric.dumazet@...il.com> To: David Miller <davem@...emloft.net> CC: emil.s.tantilov@...el.com, emils.tantilov@...il.com, netdev@...r.kernel.org, jesse.brandeburg@...el.com, jeffrey.t.kirsher@...el.com, jolsa@...hat.com Subject: Re: [PATCH] net: sk_prot_alloc() should not blindly overwrite memory David Miller a écrit : > From: "Tantilov, Emil S" <emil.s.tantilov@...el.com> > Date: Wed, 8 Jul 2009 11:02:22 -0600 > >> Still seeing traces during the test even with this patch applied: >> >> [ 1089.430093] ------------[ cut here ]------------ >> [ 1089.435667] WARNING: at include/net/sock.h:423 udp_lib_unhash+0x73/0xa0() >> [ 1089.435670] Hardware name: S5520HC > > Ok I'll back this out for now, needs more investigation > obviously. Hmm... I never said it was supposed to fix Emil problem, just that I discovered one potential problem by code inspection. I could not find yet sk_refcnt mismatch. As we do less atomic ops per packet than before, some old bug could surface now... Emil, is it easy to reproduce this problem, considering I have a similar platform than yours (dual quad core machine, E5450 cpus @ 3GHz) ? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists