Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756887AbbKRUeb (ORCPT ); Wed, 18 Nov 2015 15:34:31 -0500 Received: from shards.monkeyblade.net ([149.20.54.216]:53647 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756842AbbKRUe2 (ORCPT ); Wed, 18 Nov 2015 15:34:28 -0500 Date: Wed, 18 Nov 2015 15:34:26 -0500 (EST) Message-Id: <20151118.153426.1337800771384292183.davem@davemloft.net> To: zlim.lnx@gmail.com Cc: ast@kernel.org, catalin.marinas@arm.com, will.deacon@arm.com, daniel@iogearbox.net, yang.shi@linaro.org, xi.wang@gmail.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, netdev@vger.kernel.org Subject: Re: [PATCH] arm64: bpf: fix buffer pointer From: David Miller In-Reply-To: <1447836962-4086-1-git-send-email-zlim.lnx@gmail.com> References: <1447836962-4086-1-git-send-email-zlim.lnx@gmail.com> X-Mailer: Mew version 6.6 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 18 Nov 2015 12:34:28 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 680 Lines: 19 From: Zi Shen Lim Date: Wed, 18 Nov 2015 00:56:02 -0800 > During code review, I noticed we were passing a bad buffer pointer > to bpf_load_pointer helper function called by jitted code. > > Point to the buffer allocated by JIT, so we don't silently corrupt > other parts of the stack. > > Signed-off-by: Zi Shen Lim Can I get some review from other ARM folks before I apply this? Thanks. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/