lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 29 Nov 2022 18:40:37 +0800 From: Pengcheng Yang <yangpc@...gsu.com> To: bpf@...r.kernel.org, netdev@...r.kernel.org, John Fastabend <john.fastabend@...il.com>, Daniel Borkmann <daniel@...earbox.net>, Jakub Sitnicki <jakub@...udflare.com>, Lorenz Bauer <lmb@...udflare.com> Cc: Pengcheng Yang <yangpc@...gsu.com> Subject: [PATCH bpf v3 0/4] bpf, sockmap: Fix some issues with using apply_bytes Patch 1~3 fixes three issues with using apply_bytes when redirecting. Patch 4 adds ingress tests for txmsg with apply_bytes in selftests. Thanks to John Fastabend and Jakub Sitnicki for correct solution. --- Changes in v3: *Patch 2: Rename 'flags', modify based on Jakub Sitnicki's patch Changes in v2: *Patch 2: Clear psock->flags explicitly before releasing the sock lock Pengcheng Yang (4): bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data bpf, sockmap: Fix missing BPF_F_INGRESS flag when using apply_bytes bpf, sockmap: Fix data loss caused by using apply_bytes on ingress redirect selftests/bpf: Add ingress tests for txmsg with apply_bytes include/linux/skmsg.h | 1 + include/net/tcp.h | 4 ++-- net/core/skmsg.c | 9 ++++++--- net/ipv4/tcp_bpf.c | 19 ++++++++++++------- net/tls/tls_sw.c | 6 ++++-- tools/testing/selftests/bpf/test_sockmap.c | 18 ++++++++++++++++++ 6 files changed, 43 insertions(+), 14 deletions(-) -- 1.8.3.1
Powered by blists - more mailing lists