lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 25 Sep 2019 16:43:11 -0700 From: Allan Zhang <allanzhang@...gle.com> To: daniel@...earbox.net, songliubraving@...com, netdev@...r.kernel.org, bpf@...r.kernel.org Cc: linux-kernel@...r.kernel.org, Allan Zhang <allanzhang@...gle.com> Subject: [PATCH 0/1] bpf: Fix bpf_event_output re-entry issue BPF_PROG_TYPE_SOCK_OPS program can reenter bpf_event_output because it can be called from atomic and non-atomic contexts since we don't have bpf_prog_active to prevent it happen. This patch enables 3 level of nesting to support normal, irq and nmi context. We can easily reproduce the issue by running neper crr mode with 100 flows and 10 threads from neper client side. Allan Zhang (1): bpf: Fix bpf_event_output re-entry issue kernel/trace/bpf_trace.c | 26 +++++++++++++++++++++----- 1 file changed, 21 insertions(+), 5 deletions(-) -- 2.23.0.351.gc4317032e6-goog
Powered by blists - more mailing lists