lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <122af5c891fcc65fb6179ec53a89374daa4600aa.camel@redhat.com> Date: Tue, 04 Oct 2022 12:21:20 +0200 From: Paolo Abeni <pabeni@...hat.com> To: Kuniyuki Iwashima <kuniyu@...zon.com>, "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, David Ahern <dsahern@...nel.org>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org> Cc: Kuniyuki Iwashima <kuni1840@...il.com>, netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com, linux-kernel@...r.kernel.org, Vladislav Yasevich <vyasevic@...hat.com> Subject: Re: [PATCH RESEND v3 net 3/5] tcp/udp: Call inet6_destroy_sock() in IPv6 sk->sk_destruct(). Hello, On Mon, 2022-10-03 at 08:44 -0700, Kuniyuki Iwashima wrote: [...] > @@ -1723,7 +1736,7 @@ struct proto udpv6_prot = { > .connect = ip6_datagram_connect, > .disconnect = udp_disconnect, > .ioctl = udp_ioctl, > - .init = udp_init_sock, > + .init = udpv6_init_sock, > .destroy = udpv6_destroy_sock, > .setsockopt = udpv6_setsockopt, > .getsockopt = udpv6_getsockopt, It looks like even UDPv6 lite can be ADDRFORMed to ipv4, so I guess we need a similar chunk for udplitev6_prot? With that we can unexport udp_init_sock, I guess. Thanks, Paolo
Powered by blists - more mailing lists