From: Eric Dumazet
Date: Fri, 03 Feb 2017 14:59:38 -0800
> From: Eric Dumazet
>
> Splicing from TCP socket is vulnerable when a packet with URG flag is
> received and stored into receive queue.
>
> __tcp_splice_read() returns 0, and sk_wait_data() immediately
> returns since there is the probl
From: Eric Dumazet
Splicing from TCP socket is vulnerable when a packet with URG flag is
received and stored into receive queue.
__tcp_splice_read() returns 0, and sk_wait_data() immediately
returns since there is the problematic skb in queue.
This is a nice way to burn cpu (aka infinite loop)