[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<174915723425.3244853.1418000264549776836.git-patchwork-notify@kernel.org>
Date: Thu, 05 Jun 2025 21:00:34 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Luis Gerhorst <luis.gerhorst@....de>
Cc: memxor@...il.com, ast@...nel.org, daniel@...earbox.net,
john.fastabend@...il.com, andrii@...nel.org, martin.lau@...ux.dev,
eddyz87@...il.com, song@...nel.org, yonghong.song@...ux.dev,
kpsingh@...nel.org, sdf@...ichev.me, haoluo@...gle.com, jolsa@...nel.org,
bpf@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH bpf-next] bpf: Clarify sanitize_check_bounds()
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@...nel.org>:
On Tue, 3 Jun 2025 22:45:57 +0200 you wrote:
> As is, it appears as if pointer arithmetic is allowed for everything
> except PTR_TO_{STACK,MAP_VALUE} if one only looks at
> sanitize_check_bounds(). However, this is misleading as the function
> only works together with retrieve_ptr_limit() and the two must be kept
> in sync. This patch documents the interdependency and adds a check to
> ensure they stay in sync.
>
> [...]
Here is the summary with links:
- [bpf-next] bpf: Clarify sanitize_check_bounds()
https://git.kernel.org/bpf/bpf-next/c/97744b4971d8
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists