From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DD98BC4320A for ; Fri, 6 Aug 2021 08:07:50 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BEA50611B0 for ; Fri, 6 Aug 2021 08:07:50 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242060AbhHFIIE (ORCPT ); Fri, 6 Aug 2021 04:08:04 -0400 Received: from new3-smtp.messagingengine.com ([66.111.4.229]:55863 "EHLO new3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236751AbhHFIIE (ORCPT ); Fri, 6 Aug 2021 04:08:04 -0400 Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailnew.nyi.internal (Postfix) with ESMTP id 59A31580109; Fri, 6 Aug 2021 04:07:48 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Fri, 06 Aug 2021 04:07:48 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kroah.com; h= date:from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=fm1; bh=Z4+mRWREBPLpUH7u1/TqVHSfNkL vwQYhR1MaKBMAwGM=; b=zdQY+4UMhEltPLYJHhnQQ0DYhTEEreN2tTwqpzQg/zl dUsznVotV32fNIu/D3RZOjkybXinbQJmfIdBbHaTv7y5Q+SlHgM3LProYOV4KM67 WiXk9/yh8yswt4159fKKv4xFhEMKpE7+4lG7bdYvu+r4Iu76i2GSNNGrBH12opHC bblC8eV5Et+klH2sSkIZKdrUICqRrhYCZLzNouCEROQR42rfCfsVSGEKdapjUQKD YeHP1MMa00dhlK9+5vr5uB48U5rVx4JdU5onbsm8Stu6lfGzQzVB2XX1wHEoJe2H 3HGE+7xL2Mofm03Lz7nEZDdVX64PHWzTpVEQLrCzAFw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=Z4+mRW REBPLpUH7u1/TqVHSfNkLvwQYhR1MaKBMAwGM=; b=WMrQMr5pBTM6uJ+vvwPpS/ L3KGNxibn/iAkKmhQ6uux1iZv8hu4Y1Vj6PARtOcpQvJSngL/PZYfBxccJVWGD4z TKr223zBtULvL7fwF4KPyWOLt0dHNSNCnvzZj8bb8OkbEoOkdpvJEb9vsGOxO7Wb rFUukJBlz4S19LDp1XdceBt4TZImNo/cy6h1KcEh3Ipigffo87TI16KwAQ5kaX/h TyDYsW0ll9K4JhgpMR0zqA2Vq9nh9X1qrC3C02Va9A44vQWtsuv/ElceZzxe2QVZ tMF91v4Wdyu8bu4Wz76dY2VPki8SJ2CpIg2fKvBVAgCSrLG2llJkMtzeCjOzwteA == X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddrjedtgdduvdefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepfffhvffukfhfgggtuggjsehttdertddttddvnecuhfhrohhmpefirhgvghcu mffjuceoghhrvghgsehkrhhorghhrdgtohhmqeenucggtffrrghtthgvrhhnpeeuleeltd ehkeeltefhleduuddvhfffuedvffduveegheekgeeiffevheegfeetgfenucffohhmrghi nhepkhgvrhhnvghlrdhorhhgnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpe hmrghilhhfrhhomhepghhrvghgsehkrhhorghhrdgtohhm X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 6 Aug 2021 04:07:47 -0400 (EDT) Date: Fri, 6 Aug 2021 10:07:45 +0200 From: Greg KH To: Ovidiu Panait Cc: stable@vger.kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, ast@kernel.org, john.fastabend@gmail.com, benedict.schlueter@rub.de, piotras@gmail.com Subject: Re: [PATCH 5.4 0/6] bpf: backport fixes for CVE-2021-33624 Message-ID: References: <20210805155343.3618696-1-ovidiu.panait@windriver.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210805155343.3618696-1-ovidiu.panait@windriver.com> Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On Thu, Aug 05, 2021 at 06:53:37PM +0300, Ovidiu Panait wrote: > NOTE: the fixes were manually adjusted to apply to 5.4, so copying bpf@ to see > if there are any concerns. > > With this patchseries (applied on top of [1], which was not merged yet), all > bpf verifier selftests pass: > root@intel-x86-64:~# ./test_verifier > ... > #1056/p XDP pkt read, pkt_meta' <= pkt_data, good access OK > #1057/p XDP pkt read, pkt_meta' <= pkt_data, bad access 1 OK > #1058/p XDP pkt read, pkt_meta' <= pkt_data, bad access 2 OK > #1059/p XDP pkt read, pkt_data <= pkt_meta', good access OK > #1060/p XDP pkt read, pkt_data <= pkt_meta', bad access 1 OK > #1061/p XDP pkt read, pkt_data <= pkt_meta', bad access 2 OK > Summary: 1571 PASSED, 0 SKIPPED, 0 FAILED > > [1] https://lore.kernel.org/stable/20210804172001.3909228-2-ovidiu.panait@windriver.com/T/#u > All now queued up, thanks! greg k-h