lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 27 May 2022 23:20:11 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Menglong Dong <menglong8.dong@...il.com> Cc: ast@...nel.org, daniel@...earbox.net, andrii@...nel.org, kafai@...com, songliubraving@...com, yhs@...com, john.fastabend@...il.com, kpsingh@...nel.org, netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org, imagedong@...cent.com, benbjiang@...cent.com, flyingpeng@...cent.com Subject: Re: [PATCH bpf v2] bpf: fix probe read error in ___bpf_prog_run() Hello: This patch was applied to bpf/bpf.git (master) by Daniel Borkmann <daniel@...earbox.net>: On Tue, 24 May 2022 10:12:27 +0800 you wrote: > From: Menglong Dong <imagedong@...cent.com> > > I think there is something wrong with BPF_PROBE_MEM in ___bpf_prog_run() > in big-endian machine. Let's make a test and see what will happen if we > want to load a 'u16' with BPF_PROBE_MEM. > > Let's make the src value '0x0001', the value of dest register will become > 0x0001000000000000, as the value will be loaded to the first 2 byte of > DST with following code: > > [...] Here is the summary with links: - [bpf,v2] bpf: fix probe read error in ___bpf_prog_run() https://git.kernel.org/bpf/bpf/c/caff1fa4118c You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists