lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 10 Aug 2023 17:50:24 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Nick Child <nnac123@...ux.ibm.com>
Cc: netdev@...r.kernel.org, haren@...ux.ibm.com, ricklind@...ibm.com,
 danymadden@...ibm.com, tlfalcon@...ux.ibm.com, bjking1@...ux.ibm.com,
 horms@...nel.org
Subject: Re: [PATCH net v2 1/5] ibmvnic: Enforce stronger sanity checks on login
 response

Hello:

This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@...nel.org>:

On Wed,  9 Aug 2023 17:10:34 -0500 you wrote:
> Ensure that all offsets in a login response buffer are within the size
> of the allocated response buffer. Any offsets or lengths that surpass
> the allocation are likely the result of an incomplete response buffer.
> In these cases, a full reset is necessary.
> 
> When attempting to login, the ibmvnic device will allocate a response
> buffer and pass a reference to the VIOS. The VIOS will then send the
> ibmvnic device a LOGIN_RSP CRQ to signal that the buffer has been filled
> with data. If the ibmvnic device does not get a response in 20 seconds,
> the old buffer is freed and a new login request is sent. With 2
> outstanding requests, any LOGIN_RSP CRQ's could be for the older
> login request. If this is the case then the login response buffer (which
> is for the newer login request) could be incomplete and contain invalid
> data. Therefore, we must enforce strict sanity checks on the response
> buffer values.
> 
> [...]

Here is the summary with links:
  - [net,v2,1/5] ibmvnic: Enforce stronger sanity checks on login response
    https://git.kernel.org/netdev/net/c/db17ba719bce
  - [net,v2,2/5] ibmvnic: Unmap DMA login rsp buffer on send login fail
    https://git.kernel.org/netdev/net/c/411c565b4bc6
  - [net,v2,3/5] ibmvnic: Handle DMA unmapping of login buffs in release functions
    https://git.kernel.org/netdev/net/c/d78a671eb899
  - [net,v2,4/5] ibmvnic: Do partial reset on login failure
    https://git.kernel.org/netdev/net/c/23cc5f667453
  - [net,v2,5/5] ibmvnic: Ensure login failure recovery is safe from other resets
    https://git.kernel.org/netdev/net/c/6db541ae279b

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ