From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: Re: [PATCH] net: filter: fix upper BPF instruction limit Date: Thu, 19 Jun 2014 00:43:28 +0200 Message-ID: <53A21610.1040104@redhat.com> References: <20140618223457.GA31568@www.outflux.net> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: linux-kernel@vger.kernel.org, "David S. Miller" , Alexei Starovoitov , Eric Dumazet , Chema Gonzalez , netdev@vger.kernel.org To: Kees Cook Return-path: In-Reply-To: <20140618223457.GA31568@www.outflux.net> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On 06/19/2014 12:34 AM, Kees Cook wrote: > The original checks (via sk_chk_filter) for instruction count uses ">", > not ">=", so changing this in sk_convert_filter has the potential to break > existing seccomp filters that used exactly BPF_MAXINSNS many instructions. > > Fixes: bd4cf0ed331a ("net: filter: rework/optimize internal BPF interpreter's instruction set") > Signed-off-by: Kees Cook Acked-by: Daniel Borkmann