lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Jan 2013 10:59:43 +0100 From: Hannes Frederic Sowa <hannes@...essinduktion.org> To: Yannick Koehler <yannick@...hler.name> Cc: netdev@...r.kernel.org Subject: Re: Unix Socket buffer attribution On Mon, Jan 21, 2013 at 09:01:53PM -0500, Yannick Koehler wrote: > I believe that the problem is that once we move the skb into the > client's receive queue we need to decrease the sk_wmem_alloc variable > of the server socket since that skb is no more tied to the server. > The code should then account for this memory as part of the > sk_rmem_alloc variable on the client's socket. The function > "skb_set_owner_r(skb,owner)" would seem to be the function to do that, > so it would seem to me. Your analysis does make sense. Could you cook a patch? Thanks, Hannes -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists