[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzbzOZtoRbfPXcU8xz49vc_9XM7YFjA=+DgHex4wzJcq_w@mail.gmail.com>
Date: Wed, 6 Nov 2019 18:45:01 -0800
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Martin KaFai Lau <kafai@...com>
Cc: bpf <bpf@...r.kernel.org>, Networking <netdev@...r.kernel.org>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
David Miller <davem@...emloft.net>,
Kernel Team <kernel-team@...com>
Subject: Re: [PATCH v3 bpf-next 1/3] bpf: Account for insn->off when doing bpf_probe_read_kernel
On Wed, Nov 6, 2019 at 5:47 PM Martin KaFai Lau <kafai@...com> wrote:
>
> In the bpf interpreter mode, bpf_probe_read_kernel is used to read
> from PTR_TO_BTF_ID's kernel object. It currently missed considering
> the insn->off. This patch fixes it.
>
> Fixes: 2a02759ef5f8 ("bpf: Add support for BTF pointers to interpreter")
> Signed-off-by: Martin KaFai Lau <kafai@...com>
> ---
Heh :)
Acked-by: Andrii Nakryiko <andriin@...com>
[...]
Powered by blists - more mailing lists