lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190301070311.374650-1-kafai@fb.com> Date: Thu, 28 Feb 2019 23:03:11 -0800 From: Martin KaFai Lau <kafai@...com> To: <netdev@...r.kernel.org> CC: Alexei Starovoitov <ast@...com>, Daniel Borkmann <daniel@...earbox.net>, <kernel-team@...com> Subject: [PATCH bpf-next 0/2] Fix bpf_tcp_sock and bpf_sk_fullsock issue related to bpf_sk_release This set addresses issue about accessing invalid ptr returned from bpf_tcp_sock() and bpf_sk_fullsock() after bpf_sk_release(). Martin KaFai Lau (2): bpf: Fix bpf_tcp_sock and bpf_sk_fullsock issue related to bpf_sk_release bpf: Test ref release issue in bpf_tcp_sock and bpf_sk_fullsock. include/linux/bpf_verifier.h | 9 ++ kernel/bpf/verifier.c | 89 ++++++++++++------- .../selftests/bpf/verifier/ref_tracking.c | 73 +++++++++++++++ 3 files changed, 137 insertions(+), 34 deletions(-) -- 2.17.1
Powered by blists - more mailing lists