[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20181005174713.4737-1-daniel@iogearbox.net>
Date: Fri, 5 Oct 2018 19:47:13 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org
Subject: pull-request: bpf 2018-10-05
Hi David,
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) Fix to truncate input on ALU operations in 32 bit mode, from Jann.
2) Fixes for cgroup local storage to reject reserved flags on element
update and rejection of map allocation with zero-sized value, from Roman.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
----------------------------------------------------------------
The following changes since commit d4ce58082f206bf6e7d697380c7bc5480a8b0264:
net-tcp: /proc/sys/net/ipv4/tcp_probe_interval is a u32 not int (2018-09-26 20:33:21 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to b799207e1e1816b09e7a5920fbb2d5fcf6edd681:
bpf: 32-bit RSH verification must truncate input before the ALU op (2018-10-05 18:41:45 +0200)
----------------------------------------------------------------
Jann Horn (1):
bpf: 32-bit RSH verification must truncate input before the ALU op
Roman Gushchin (2):
bpf: harden flags check in cgroup_storage_update_elem()
bpf: don't accept cgroup local storage with zero value size
kernel/bpf/local_storage.c | 5 ++++-
kernel/bpf/verifier.c | 10 +++++++++-
2 files changed, 13 insertions(+), 2 deletions(-)
Powered by blists - more mailing lists