lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2024021349-presume-prance-d230@gregkh>
Date: Tue, 13 Feb 2024 13:05:18 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: Max Schulze <max.schulze@...ine.de>
Cc: Paolo Abeni <pabeni@...hat.com>, netdev@...r.kernel.org,
	davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
	tdeseyn@...hat.com
Subject: Re: [PATCH v2 net] tcp: allow again tcp_disconnect() when threads
 are waiting

On Tue, Feb 13, 2024 at 12:54:03PM +0100, Max Schulze wrote:
> 
> 
> Am 14.10.23 um 02:00 schrieb patchwork-bot+netdevbpf@...nel.org:
> > Hello:
> >
> > This patch was applied to netdev/net.git (main)
> > by Jakub Kicinski <kuba@...nel.org>:
> >
> > On Wed, 11 Oct 2023 09:20:55 +0200 you wrote:
> >> As reported by Tom, .NET and applications build on top of it rely
> >> on connect(AF_UNSPEC) to async cancel pending I/O operations on TCP
> >> socket.
> >>
> >> The blamed commit below caused a regression, as such cancellation
> >> can now fail.
> >>
> >> [...]
> 
> 
> Hello authors, Gregkh,
> 
> it looks to me like the breaking commit
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/tcp.c?h=linux-4.19.y&id=0377416ce1744c03584df3e9461d4b881356d608
> 
> 
> was applied to stable, but not the fix?
> 
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/tcp.c?id=419ce133ab928ab5efd7b50b2ef36ddfd4eadbd2
> 
> Could you consider applying the fix for 4.19 also?

I would love to, but the commit does not apply.  Can you please provide
us with working backports for 4.19.y, 5.4.y, 5.10.y and 5.15.y and I
will be glad to queue them up.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ