lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sat,  3 Nov 2018 01:47:03 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org
Subject: pull-request: bpf 2018-11-03

Hi David,

The following pull-request contains BPF updates for your *net* tree.

The main changes are:

1) Fix BPF prog kallsyms and bpf_prog_get_info_by_fd() jited address export
   to not use page start but actual start instead to work correctly with
   profiling e.g. finding hot instructions from stack traces. Also fix latter
   with regards to dumping address and jited len for !multi prog, from Song.

2) Fix bpf_prog_get_info_by_fd() for !root to zero info.nr_jited_func_lens
   instead of leaving the user provided length, from Daniel.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit 7de414a9dd91426318df7b63da024b2b07e53df5:

  net: drop skb on failure in ip_check_defrag() (2018-11-01 13:55:30 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 28c2fae726bf5003cd209b0d5910a642af98316f:

  bpf: fix bpf_prog_get_info_by_fd to return 0 func_lens for unpriv (2018-11-02 13:51:15 -0700)

----------------------------------------------------------------
Daniel Borkmann (2):
      Merge branch 'bpf-accurate-prog-addr'
      bpf: fix bpf_prog_get_info_by_fd to return 0 func_lens for unpriv

Song Liu (3):
      bpf: show real jited prog address in /proc/kallsyms
      bpf: show real jited address in bpf_prog_info->jited_ksyms
      bpf: show main program address and length in bpf_prog_info

 kernel/bpf/core.c    |  4 +---
 kernel/bpf/syscall.c | 35 +++++++++++++++++++++++++----------
 2 files changed, 26 insertions(+), 13 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ