lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <27c31e30-b2d6-43a4-8ad6-adbeb38db9ee@orange.com>
Date: Fri, 8 Nov 2024 00:14:29 +0100
From: Alexandre Ferrieux <alexandre.ferrieux@...il.com>
To: Alexandre Ferrieux <alexandre.ferrieux@...il.com>,
 Jamal Hadi Salim <jhs@...atatu.com>
Cc: edumazet@...gle.com, xiyou.wangcong@...il.com, jiri@...nulli.us,
 netdev@...r.kernel.org
Subject: Re: [PATCH net v3] net: sched: cls_u32: Fix u32's systematic failure
 to free IDR entries for hnodes.

On 07/11/2024 23:58, Alexandre Ferrieux wrote:
> On 07/11/2024 15:47, Jamal Hadi Salim wrote:
>> On Thu, Nov 7, 2024 at 9:45 AM Jamal Hadi Salim <jhs@...atatu.com> wrote:
>>>
>>> Hi,
>>>
>>> On Wed, Nov 6, 2024 at 9:32 AM Alexandre Ferrieux
>>> <alexandre.ferrieux@...il.com> wrote:
>>> >
>>> > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
>>> > Signed-off-by: Alexandre Ferrieux <alexandre.ferrieux@...nge.com>
>>>
>>> I'd like to take a closer look at this - just tied up with something
>>> at the moment. Give me a day or so.
>>> Did you run tdc tests after your patch?
>> 
>> Also, for hero status points, consider submitting a tdc test case.
> 
> Hi Jamal, thanks for looking into this.
> Just posted a v4 with a tdc test case.
> Of course, I also verified that "tdc -c u32" has no regression :)

And a v5 with a proper title as requested by Eric, along with his Reviewed-by.
(Sorry for violating the rule "one version per 24h" but there's no code change)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ