Date: Fri, 28 Jan 2011 21:10:16 +0200 From: Manolis Kiagias <sonic2000gr@gmail.com> To: freebsd-security@freebsd.org Subject: Re: Recent full disclosure post - Local DOS Message-ID: <4D431498.8090105@gmail.com> In-Reply-To: <4D42FF0E.9030407@tomjudge.com> References: <4D42D2B2.4030806@tomjudge.com> <4D42EA05.2070707@tomjudge.com> <201101281209.51046.john@baldwin.cx> <4D42FF0E.9030407@tomjudge.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 01/28/2011 07:38 PM, Tom Judge wrote: > >> This is an IPPROTO_TCP, TCP_NOPUSH with an optval of 0. >> >> Can you try making a far simpler program that just does: >> >> int optval, s; >> >> s = socket(PF_INET, SOCK_STREAM, 0); >> if (s< 0) >> err(1, "socket"); >> optval = 0; >> if (setsockopt(s, IPPROTO_TCP, TCP_NOPUSH,&optval, sizeof(optval))< 0) >> err(1, "setsockopt"); >> >> and see if that breaks? >> >> > Hi John, > > I can't repeat this with the code you sent. I tried this in a while (1) > loop and had 4 instances running without issue. > > Tom > > FWIW, I can't crash 7.4-RC2 (i386) and 8.2-RC2 (amd64) with either the original or John's code. Tried both as user and root.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4D431498.8090105>
