lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 21 Dec 2020 14:09:36 -0500 From: Sasha Levin <sashal@...nel.org> To: Jean-Philippe Brucker <jean-philippe@...aro.org> Cc: linux-kernel@...r.kernel.org, stable@...r.kernel.org, John Fastabend <john.fastabend@...il.com>, Alexei Starovoitov <ast@...nel.org>, linux-kselftest@...r.kernel.org, netdev@...r.kernel.org, bpf@...r.kernel.org Subject: Re: [PATCH AUTOSEL 5.4 08/10] selftests/bpf: Fix array access with signed variable test On Sun, Dec 20, 2020 at 01:05:19PM +0100, Jean-Philippe Brucker wrote: >Hi, > >On Sat, Dec 19, 2020 at 10:34:55PM -0500, Sasha Levin wrote: >> From: Jean-Philippe Brucker <jean-philippe@...aro.org> >> >> [ Upstream commit 77ce220c0549dcc3db8226c61c60e83fc59dfafc ] >> >> The test fails because of a recent fix to the verifier, even though this > >That fix is commit b02709587ea3 ("bpf: Fix propagation of 32-bit signed >bounds from 64-bit bounds.") upstream, which only needed backport to 5.9. >So although backporting this patch to 5.4 shouldn't break anything, I >wouldn't bother. I'll drop it from 5.4, thanks! -- Thanks, Sasha
Powered by blists - more mailing lists