lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169890482492.9002.15567040644206875649.git-patchwork-notify@kernel.org> Date: Thu, 02 Nov 2023 06:00:24 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Hao Sun <sunhao.th@...il.com> Cc: ast@...nel.org, daniel@...earbox.net, john.fastabend@...il.com, andrii@...nel.org, martin.lau@...ux.dev, song@...nel.org, yonghong.song@...ux.dev, kpsingh@...nel.org, sdf@...gle.com, haoluo@...gle.com, jolsa@...nel.org, mykolal@...com, shuah@...nel.org, eddyz87@...il.com, shung-hsi.yu@...e.com, bpf@...r.kernel.org, linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org, stable@...r.kernel.org Subject: Re: [PATCH bpf v3 0/2] bpf: Fix incorrect immediate spill Hello: This series was applied to bpf/bpf.git (master) by Alexei Starovoitov <ast@...nel.org>: On Wed, 01 Nov 2023 13:33:50 +0100 you wrote: > Immediate is incorrectly cast to u32 before being spilled, losing sign > information. The range information is incorrect after load again. Fix > immediate spill by remove the cast. The second patch add a test case > for this. > > Signed-off-by: Hao Sun <sunhao.th@...il.com> > > [...] Here is the summary with links: - [bpf,v3,1/2] bpf: Fix check_stack_write_fixed_off() to correctly spill imm https://git.kernel.org/bpf/bpf/c/811c363645b3 - [bpf,v3,2/2] selftests/bpf: Add test for immediate spilled to stack https://git.kernel.org/bpf/bpf/c/85eb035e6cfd You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists