lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 21 Dec 2022 17:07:00 -0800 From: Jakub Kicinski <kuba@...nel.org> To: Shawn Bohrer <sbohrer@...udflare.com> Cc: magnus.karlsson@...il.com, netdev@...r.kernel.org, bpf@...r.kernel.org, bjorn@...nel.org, kernel-team@...udflare.com, davem@...emloft.net Subject: Re: [PATCH] veth: Fix race with AF_XDP exposing old or uninitialized descriptors On Tue, 20 Dec 2022 12:59:03 -0600 Shawn Bohrer wrote: > if (stats.xdp_tx > 0) > veth_xdp_flush(rq, &bq); This one does not need similar treatment, right? Only thing I could spot is potential races in updating stats, but that seems like a larger issue with veth xdp. > - if (stats.xdp_redirect > 0) > - xdp_do_flush();
Powered by blists - more mailing lists