lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 7 Jul 2020 18:44:13 -0700 From: Martin KaFai Lau <kafai@...com> To: <bpf@...r.kernel.org> CC: Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, <kernel-team@...com>, <netdev@...r.kernel.org> Subject: [PATCH bpf 0/2] bpf: net: Fixes in sk_user_data of reuseport_array This set fixes two issues on sk_user_data when a sk is added to a reuseport_array. The first patch is to avoid the sk_user_data being copied to a cloned sk. The second patch avoids doing bpf_sk_reuseport_detach() on sk_user_data that is not managed by reuseport_array. Since the changes are mostly related to bpf reuseport_array, so it is currently tagged as bpf fixes. Martin KaFai Lau (2): bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone bpf: net: Avoid incorrect bpf_sk_reuseport_detach call include/net/sock.h | 3 ++- kernel/bpf/reuseport_array.c | 14 ++++++++++---- 2 files changed, 12 insertions(+), 5 deletions(-) -- 2.24.1
Powered by blists - more mailing lists