[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAADnVQJ5Q-nx4-utPCWMuVgtSsfcWbwNH5eh1TLed049MREUrg@mail.gmail.com>
Date: Wed, 6 Nov 2019 21:57:40 -0800
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: Martin KaFai Lau <kafai@...com>
Cc: bpf <bpf@...r.kernel.org>,
Network Development <netdev@...r.kernel.org>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
David Miller <davem@...emloft.net>,
Kernel Team <kernel-team@...com>
Subject: Re: [PATCH v3 bpf-next 1/3] bpf: Account for insn->off when doing bpf_probe_read_kernel
On Wed, Nov 6, 2019 at 5:46 PM Martin KaFai Lau <kafai@...com> wrote:
>
> In the bpf interpreter mode, bpf_probe_read_kernel is used to read
> from PTR_TO_BTF_ID's kernel object. It currently missed considering
> the insn->off. This patch fixes it.
>
> Fixes: 2a02759ef5f8 ("bpf: Add support for BTF pointers to interpreter")
> Signed-off-by: Martin KaFai Lau <kafai@...com>
Applied the 1st patch.
2nd and 3rd will go for 'nit' respin?
Powered by blists - more mailing lists