lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7c4dc799-ebf6-47fe-a25f-bb84d6faa0cf@orange.com>
Date: Thu, 7 Nov 2024 23:58:02 +0100
From: Alexandre Ferrieux <alexandre.ferrieux@...il.com>
To: Jamal Hadi Salim <jhs@...atatu.com>,
 Alexandre Ferrieux <alexandre.ferrieux@...il.com>
Cc: edumazet@...gle.com, xiyou.wangcong@...il.com, jiri@...nulli.us,
 netdev@...r.kernel.org
Subject: Re: [PATCH net v3] net: sched: cls_u32: Fix u32's systematic failure
 to free IDR entries for hnodes.

On 07/11/2024 15:47, Jamal Hadi Salim wrote:
> On Thu, Nov 7, 2024 at 9:45 AM Jamal Hadi Salim <jhs@...atatu.com> wrote:
>>
>> Hi,
>>
>> On Wed, Nov 6, 2024 at 9:32 AM Alexandre Ferrieux
>> <alexandre.ferrieux@...il.com> wrote:
>> >
>> > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
>> > Signed-off-by: Alexandre Ferrieux <alexandre.ferrieux@...nge.com>
>>
>> I'd like to take a closer look at this - just tied up with something
>> at the moment. Give me a day or so.
>> Did you run tdc tests after your patch?
> 
> Also, for hero status points, consider submitting a tdc test case.

Hi Jamal, thanks for looking into this.
Just posted a v4 with a tdc test case.
Of course, I also verified that "tdc -c u32" has no regression :)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ