Message ID | 20240424100210.11982-1-puranjay@kernel.org (mailing list archive) |
---|---|
Headers | show |
Series | bpf: prevent userspace memory access | expand |
Hello: This series was applied to bpf/bpf.git (master) by Alexei Starovoitov <ast@kernel.org>: On Wed, 24 Apr 2024 10:02:07 +0000 you wrote: > V5: https://lore.kernel.org/bpf/20240324185356.59111-1-puranjay12@gmail.com/ > Changes in V6: > - Disable the verifier's instrumentation in x86-64 and update the JIT to > take care of vsyscall page in addition to userspace addresses. > - Update bpf_testmod to test for vsyscall addresses. > > V4: https://lore.kernel.org/bpf/20240321124640.8870-1-puranjay12@gmail.com/ > Changes in V5: > - Use TASK_SIZE_MAX + PAGE_SIZE, VSYSCALL_ADDR as userspace boundary in > x86-64 JIT. > - Added Acked-by: Ilya Leoshkevich <iii@linux.ibm.com> > > [...] Here is the summary with links: - [bpf,v6,1/3] bpf: verifier: prevent userspace memory access https://git.kernel.org/bpf/bpf/c/66e13b615a0c - [bpf,v6,2/3] bpf, x86: Fix PROBE_MEM runtime load check https://git.kernel.org/bpf/bpf/c/b599d7d26d6a - [bpf,v6,3/3] selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 https://git.kernel.org/bpf/bpf/c/7cd6750d9a56 You are awesome, thank you!