Message ID | 20240822080124.2995724-1-eddyz87@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf: fix null pointer access for malformed BPF_CORE_TYPE_ID_LOCAL relos | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Thu, 22 Aug 2024 01:01:22 -0700 you wrote: > Liu RuiTong reported an in-kernel null pointer derefence when > processing BPF_CORE_TYPE_ID_LOCAL relocations referencing non-existing > BTF types. Fix this by adding proper id checks. > > Changes v2->v3: > - selftest update suggested by Andrii: > avoid memset(0) for log buffer and do memset(0) for bpf_attr. > > [...] Here is the summary with links: - [bpf-next,v3,1/2] bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos https://git.kernel.org/bpf/bpf-next/c/3d2786d65aaa - [bpf-next,v3,2/2] selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation https://git.kernel.org/bpf/bpf-next/c/110bbd3a2ed7 You are awesome, thank you!