BPF List
 help / color / mirror / Atom feed
* [PATCH bpf-next v4 0/2] bpf: fix verification of indirect var-off stack access
@ 2023-12-06 16:58 Andrei Matei
  2023-12-06 16:58 ` [PATCH bpf-next v4 1/2] " Andrei Matei
  2023-12-06 16:58 ` [PATCH bpf-next v4 2/2] bpf: guard stack limits against 32bit overflow Andrei Matei
  0 siblings, 2 replies; 7+ messages in thread
From: Andrei Matei @ 2023-12-06 16:58 UTC (permalink / raw)
  To: bpf, andrii.nakryiko, sunhao.th, eddyz87; +Cc: Andrei Matei

V3 to V4:
  - include a test per Eduard's request
  - target bpf-next per Alexei's request (patches didn't change)

V2 to V3:
  - simplify checks for max_off (don't call
    check_stack_slot_within_bounds for it)
  - append a commit to protect against overflow in the addition of the
    register and the offset

V1 to V2:
  - fix max_off calculation for access size = 0

Andrei Matei (2):
  bpf: fix verification of indirect var-off stack access
  bpf: guard stack limits against 32bit overflow

 kernel/bpf/verifier.c | 20 +++++++-------------
 1 file changed, 7 insertions(+), 13 deletions(-)

-- 
2.39.2


^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2023-12-07  3:30 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-12-06 16:58 [PATCH bpf-next v4 0/2] bpf: fix verification of indirect var-off stack access Andrei Matei
2023-12-06 16:58 ` [PATCH bpf-next v4 1/2] " Andrei Matei
2023-12-06 17:12   ` Eduard Zingerman
2023-12-06 18:56   ` Andrii Nakryiko
2023-12-07  3:30     ` Andrei Matei
2023-12-06 16:58 ` [PATCH bpf-next v4 2/2] bpf: guard stack limits against 32bit overflow Andrei Matei
2023-12-06 19:04   ` Andrii Nakryiko

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox