lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 27 Feb 2022 21:27:54 +0100 From: Jakub Sitnicki <jakub@...udflare.com> To: bpf@...r.kernel.org Cc: netdev@...r.kernel.org, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii@...nel.org>, kernel-team@...udflare.com, Martin KaFai Lau <kafai@...com>, Ilya Leoshkevich <iii@...ux.ibm.com> Subject: [PATCH bpf-next v2 0/3] Fixes for sock_fields selftests This is a respin of a fix for error reporting in sock_fields test. Fixing the error reporting has uncovered bugs in the recently added test for sk->dst_port access. Series now includes patches that address the broken test. The series has been tested on x86_64 and s390. v1 -> v2: - Limit read_sk_dst_port only to client traffic (patch 2) - Make read_sk_dst_port pass on litte- and big-endian (patch 3) v1: https://lore.kernel.org/bpf/20220225184130.483208-1-jakub@cloudflare.com/ Jakub Sitnicki (3): selftests/bpf: Fix error reporting from sock_fields programs selftests/bpf: Check dst_port only on the client socket selftests/bpf: Fix test for 4-byte load from dst_port on big-endian .../selftests/bpf/progs/test_sock_fields.c | 30 ++++++++++++++++--- 1 file changed, 26 insertions(+), 4 deletions(-) -- 2.35.1
Powered by blists - more mailing lists