Re: [PATCH net] tcp: avoid infinite loop in tcp_splice_read()

2017-02-06 Thread David Miller
From: Eric Dumazet Date: Fri, 03 Feb 2017 14:59:38 -0800 > From: Eric Dumazet > > Splicing from TCP socket is vulnerable when a packet with URG flag is > received and stored into receive queue. > > __tcp_splice_read() returns 0, and sk_wait_data() immediately > returns since there is the probl

[PATCH net] tcp: avoid infinite loop in tcp_splice_read()

2017-02-03 Thread Eric Dumazet
From: Eric Dumazet Splicing from TCP socket is vulnerable when a packet with URG flag is received and stored into receive queue. __tcp_splice_read() returns 0, and sk_wait_data() immediately returns since there is the problematic skb in queue. This is a nice way to burn cpu (aka infinite loop)