lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <166197781476.8460.17070230581972195161.git-patchwork-notify@kernel.org> Date: Wed, 31 Aug 2022 20:30:14 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Martin KaFai Lau <martin.lau@...ux.dev> Cc: bpf@...r.kernel.org, netdev@...r.kernel.org, ast@...nel.org, andrii@...nel.org, daniel@...earbox.net, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, kernel-team@...com, pabeni@...hat.com, sdf@...gle.com Subject: Re: [PATCH bpf-next 1/2] bpf: net: Avoid loading module when calling bpf_setsockopt(TCP_CONGESTION) Hello: This series was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@...earbox.net>: On Tue, 30 Aug 2022 16:19:46 -0700 you wrote: > When bpf prog changes tcp-cc by calling bpf_setsockopt(TCP_CONGESTION), > it should not try to load module which may be a blocking > operation. This details was correct in the v1 [0] but missed by > mistake in the later revision in > commit cb388e7ee3a8 ("bpf: net: Change do_tcp_setsockopt() to use the sockopt's lock_sock() and capable()") > > This patch fixes it by checking the has_current_bpf_ctx(). > > [...] Here is the summary with links: - [bpf-next,1/2] bpf: net: Avoid loading module when calling bpf_setsockopt(TCP_CONGESTION) https://git.kernel.org/bpf/bpf-next/c/84e5a0f208ca - [bpf-next,2/2] selftest/bpf: Ensure no module loading in bpf_setsockopt(TCP_CONGESTION) https://git.kernel.org/bpf/bpf-next/c/197072945a70 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists