| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <20110124.144200.112610203.davem@davemloft.net> Date: Mon, 24 Jan 2011 14:42:00 -0800 (PST) From: David Miller <davem@...emloft.net> To: eric.dumazet@...il.com Cc: runningdoglackey@...oo.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, therbert@...gle.com Subject: Re: Problems with /proc/net/tcp6 - possible bug - ipv6 From: Eric Dumazet <eric.dumazet@...il.com> Date: Sat, 22 Jan 2011 16:15:44 +0100 > [PATCH] tcp: fix bug in listening_get_next() > > commit a8b690f98baf9fb19 (tcp: Fix slowness in read /proc/net/tcp) > introduced a bug in handling of SYN_RECV sockets. > > st->offset represents number of sockets found since beginning of > listening_hash[st->bucket]. > > We should not reset st->offset when iterating through > syn_table[st->sbucket], or else if more than ~25 sockets (if > PAGE_SIZE=4096) are in SYN_RECV state, we exit from listening_get_next() > with a too small st->offset > > Next time we enter tcp_seek_last_pos(), we are not able to seek past > already found sockets. > > Reported-by: PK <runningdoglackey@...oo.com> > CC: Tom Herbert <therbert@...gle.com> > Signed-off-by: Eric Dumazet <eric.dumazet@...il.com> Applied and queued up for -stable, thanks Eric. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists