lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 3 Jan 2019 12:46:13 +0100
From:   Heiko Carstens <>
To:     Martin KaFai Lau <>,
        Eugene Syromyatnikov <>
        Yonghong Song <>,
        Alexei Starovoitov <>,
        "Dmitry V. Levin" <>
Subject: "bpf: Improve the info.func_info and info.func_info_rec_size
 behavior" breaks strace self tests


the kernel commit 7337224fc150 ("bpf: Improve the info.func_info and
info.func_info_rec_size behavior") breaks one of strace's self tests:

FAIL: bpf-obj_get_info_by_fd-prog-v.gen

Looking into the kernel commit, it seems that the user space visible
uapi change is intentional; even though it might break existing user

To reproduce:

git clone
cd strace
make -j $(nproc)
cd tests
make -j $(nproc) check

Powered by blists - more mailing lists