lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20170531.125939.899346888273269086.davem@davemloft.net>
Date:   Wed, 31 May 2017 12:59:39 -0400 (EDT)
From:   David Miller <davem@...emloft.net>
To:     brouer@...hat.com
Cc:     alexei.starovoitov@...il.com, netdev@...r.kernel.org
Subject: Re: [PATCH net] samples/bpf: bpf_load.c order of prog_fd[] should
 correspond with ELF order

From: Jesper Dangaard Brouer <brouer@...hat.com>
Date: Tue, 30 May 2017 14:37:51 +0200

> An eBPF ELF file generated with LLVM can contain several program
> section, which can be used for bpf tail calls.  The bpf prog file
> descriptors are accessible via array prog_fd[].
> 
> At-least XDP samples assume ordering, and uses prog_fd[0] is the main
> XDP program to attach.  The actual order of array prog_fd[] depend on
> whether or not a bpf program section is referencing any maps or not.
> Not using a map result in being loaded/processed after all other
> prog section.  Thus, this can lead to some very strange and hard to
> debug situation, as the user can only see a FD and cannot correlated
> that with the ELF section name.
> 
> The fix is rather simple, and even removes duplicate memcmp code.
> Simply load program sections as the last step, instead of
> load_and_attach while processing the relocation section.
> 
> When working with tail calls, it become even more essential that the
> order of prog_fd[] is consistant, like the current dependency of the
> map_fd[] order.
> 
> Signed-off-by: Jesper Dangaard Brouer <brouer@...hat.com>

Applied to net-next, thanks Jesper.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ