* [PATCH 9/9] Fix leaking of kernel heap addresses in net/
@ 2010-11-07 16:33 Dan Rosenberg
0 siblings, 0 replies; only message in thread
From: Dan Rosenberg @ 2010-11-07 16:33 UTC (permalink / raw)
To: chas, davem, kuznet, pekkas, jmorris, yoshfuji, kaber,
remi.denis-courmont
Cc: netdev, security, stable
Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
diff -urp linux-2.6.37-rc1.orig/net/unix/af_unix.c linux-2.6.37-rc1/net/unix/af_unix.c
--- linux-2.6.37-rc1.orig/net/unix/af_unix.c 2010-11-01 07:54:12.000000000 -0400
+++ linux-2.6.37-rc1/net/unix/af_unix.c 2010-11-07 10:46:27.000000000 -0500
@@ -353,7 +353,8 @@ static void unix_sock_destructor(struct
WARN_ON(!sk_unhashed(sk));
WARN_ON(sk->sk_socket);
if (!sock_flag(sk, SOCK_DEAD)) {
- printk(KERN_INFO "Attempt to release alive unix socket: %p\n", sk);
+ printk(KERN_INFO "Attempt to release alive unix socket: %lu\n",
+ sock_i_ino(sk));
return;
}
@@ -2198,8 +2199,8 @@ static int unix_seq_show(struct seq_file
struct unix_sock *u = unix_sk(s);
unix_state_lock(s);
- seq_printf(seq, "%p: %08X %08X %08X %04X %02X %5lu",
- s,
+ seq_printf(seq, "%d: %08X %08X %08X %04X %02X %5lu",
+ 0,
atomic_read(&s->sk_refcnt),
0,
s->sk_state == TCP_LISTEN ? __SO_ACCEPTCON : 0,
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2010-11-07 16:33 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-11-07 16:33 [PATCH 9/9] Fix leaking of kernel heap addresses in net/ Dan Rosenberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).