Re: [PATCH bpf v6 0/3] bpf: prevent userspace memory access

From: patchwork-bot+netdevbpf
Date: Fri Apr 26 2024 - 13:01:00 EST


Hello:

This series was applied to bpf/bpf.git (master)
by Alexei Starovoitov <ast@xxxxxxxxxx>:

On Wed, 24 Apr 2024 10:02:07 +0000 you wrote:
> V5: https://lore.kernel.org/bpf/20240324185356.59111-1-puranjay12@xxxxxxxxx/
> Changes in V6:
> - Disable the verifier's instrumentation in x86-64 and update the JIT to
> take care of vsyscall page in addition to userspace addresses.
> - Update bpf_testmod to test for vsyscall addresses.
>
> V4: https://lore.kernel.org/bpf/20240321124640.8870-1-puranjay12@xxxxxxxxx/
> Changes in V5:
> - Use TASK_SIZE_MAX + PAGE_SIZE, VSYSCALL_ADDR as userspace boundary in
> x86-64 JIT.
> - Added Acked-by: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
>
> [...]

Here is the summary with links:
- [bpf,v6,1/3] bpf: verifier: prevent userspace memory access
https://git.kernel.org/bpf/bpf/c/66e13b615a0c
- [bpf,v6,2/3] bpf, x86: Fix PROBE_MEM runtime load check
https://git.kernel.org/bpf/bpf/c/b599d7d26d6a
- [bpf,v6,3/3] selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64
https://git.kernel.org/bpf/bpf/c/7cd6750d9a56

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html