lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 15 May 2011 17:12:51 +0200 From: Pablo Neira Ayuso <pablo@...filter.org> To: Hans Schillstrom <hans@...illstrom.com> CC: Simon Horman <horms@...ge.net.au>, Hans Schillstrom <hans.schillstrom@...csson.com>, ja@....bg, lvs-devel@...r.kernel.org, netdev@...r.kernel.org, netfilter-devel@...r.kernel.org Subject: Re: [PATCH 1/1] IPVS: seq_release_net should be used. On 14/05/11 12:05, Hans Schillstrom wrote: > On Saturday, May 14, 2011 02:50:26 Simon Horman wrote: >> On Fri, May 13, 2011 at 08:03:20AM +0200, Hans Schillstrom wrote: >>> Without this patch every access to ip_vs in procfs will increase >>> the netns count i.e. an unbalanced get_net()/put_net(). >>> (ipvsadm commands also use procfs.) >>> The result is you can't exit a netns if reading ip_vs_* procfs entries. >> >> Hi Hans, >> >> we should try and get this into 2.6.39, right? > > Yes, this is a trivial bug fix I'll pass it to davem. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists