From: Hou Tao <houtao1@xxxxxxxxxx> Hi, The patch set is just a bundle of fixes. Patch #1 fixes the out-of-bound for sockmap link fdinfo. Patch #2 adds a static assertion to guarantee such out-of-bound access will never happen again. Patch #3 fixes the kmemleak report when parsing the mount options for bpffs. Patch #4~#7 fix issues related to bits iterator. Please check the individual patches for more details. And comments are always welcome. v2: * patch #1: update tools/include/uapi/linux/bpf.h as well (Alexei) * patch #2: new patch. Add a static assertion for bpf_link_type_strs[] (Andrii) * patch #4: doesn't set nr_bits to zero in bpf_iter_bits_next (Andrii) * patch #5: use 512 as the maximal value of nr_words * patch #6: change the type of both bits and bits_copy to u64 (Andrii) v1: https://lore.kernel.org/bpf/20241008091718.3797027-1-houtao@xxxxxxxxxxxxxxx/ Hou Tao (7): bpf: Add the missing BPF_LINK_TYPE invocation for sockmap bpf: Add assertion for the size of bpf_link_type_strs[] bpf: Preserve param->string when parsing mount options bpf: Free dynamically allocated bits in bpf_iter_bits_destroy() bpf: Check the validity of nr_words in bpf_iter_bits_new() bpf: Use __u64 to save the bits in bits iterator selftests/bpf: Test multiplication overflow of nr_bits in bits_iter include/linux/bpf_types.h | 7 +-- include/uapi/linux/bpf.h | 3 ++ kernel/bpf/helpers.c | 45 +++++++++++++++---- kernel/bpf/inode.c | 5 ++- kernel/bpf/syscall.c | 2 + tools/include/uapi/linux/bpf.h | 3 ++ .../selftests/bpf/progs/verifier_bits_iter.c | 14 ++++++ 7 files changed, 63 insertions(+), 16 deletions(-) -- 2.29.2