lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 26 May 2010 13:19:43 +1000 From: Anton Blanchard <anton@...ba.org> To: Eric Dumazet <eric.dumazet@...il.com> Cc: netdev@...r.kernel.org Subject: Re: Warning in net/ipv4/af_inet.c:154 Hi, > > Which is: > > > > WARN_ON(sk->sk_forward_alloc); > > > > Yes, the infamous one :) > > Is it reproductible ? What kind of workload is it ? > What is the NIC involved ? It was running sysbench against a postgresql database over localhost. In each case I checked, sk_forward_alloc was less than one page. I notice we update sk_forward_alloc in sk_mem_charge and sk_mem_uncharge. Since it isn't an atomic variable I went looking for a lock somewhere in the call chain (first thought was the socket lock). I couldn't find anything, but I could easily be missing something. Anton -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists