BPF List
 help / color / mirror / Atom feed
* [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access
@ 2023-12-05 19:32 Andrei Matei
  2023-12-05 19:32 ` [PATCH bpf v3 1/2] " Andrei Matei
                   ` (2 more replies)
  0 siblings, 3 replies; 8+ messages in thread
From: Andrei Matei @ 2023-12-05 19:32 UTC (permalink / raw)
  To: bpf, andrii.nakryiko, sunhao.th; +Cc: Andrei Matei

V2 to V3:
  - simplify checks for max_off (don't call
    check_stack_slot_within_bounds for it)
  - append a commit to protect against overflow in the addition of the
    register and the offset

V1 to V2:
  - fix max_off calculation for access size = 0

Andrei Matei (2):
  bpf: fix verification of indirect var-off stack access
  bpf: guard stack limits against 32bit overflow

 kernel/bpf/verifier.c | 20 +++++++-------------
 1 file changed, 7 insertions(+), 13 deletions(-)

-- 
2.39.2


^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2023-12-06 17:14 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-12-05 19:32 [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access Andrei Matei
2023-12-05 19:32 ` [PATCH bpf v3 1/2] " Andrei Matei
2023-12-06  0:27   ` Eduard Zingerman
2023-12-05 19:32 ` [PATCH bpf v3 2/2] bpf: guard stack limits against 32bit overflow Andrei Matei
2023-12-05 23:35 ` [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access Eduard Zingerman
2023-12-06  0:08   ` Alexei Starovoitov
2023-12-06 16:57   ` Andrei Matei
2023-12-06 17:14     ` Eduard Zingerman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox