mbox series

[bpf-next,v5,0/3] bpf: fix verification of indirect var-off stack access

Message ID 20231207041150.229139-1-andreimatei1@gmail.com (mailing list archive)
Headers show
Series bpf: fix verification of indirect var-off stack access | expand

Message

Andrei Matei Dec. 7, 2023, 4:11 a.m. UTC
V4 to V5:
  - split the test into a separate patch

V3 to V4:
  - include a test per Eduard's request
  - target bpf-next per Alexei's request (patches didn't change)


V2 to V3:
  - simplify checks for max_off (don't call
    check_stack_slot_within_bounds for it)
  - append a commit to protect against overflow in the addition of the
    register and the offset

V1 to V2:
  - fix max_off calculation for access size = 0


Andrei Matei (3):
  bpf: fix verification of indirect var-off stack access
  bpf: add verifier regression test for previous patch
  bpf: guard stack limits against 32bit overflow

 kernel/bpf/verifier.c                         | 20 +++++--------
 .../selftests/bpf/progs/verifier_var_off.c    | 29 +++++++++++++++++++
 2 files changed, 36 insertions(+), 13 deletions(-)

Comments

patchwork-bot+netdevbpf@kernel.org Dec. 7, 2023, 7:10 p.m. UTC | #1
Hello:

This series was applied to bpf/bpf-next.git (master)
by Andrii Nakryiko <andrii@kernel.org>:

On Wed,  6 Dec 2023 23:11:47 -0500 you wrote:
> V4 to V5:
>   - split the test into a separate patch
> 
> V3 to V4:
>   - include a test per Eduard's request
>   - target bpf-next per Alexei's request (patches didn't change)
> 
> [...]

Here is the summary with links:
  - [bpf-next,v5,1/3] bpf: fix verification of indirect var-off stack access
    https://git.kernel.org/bpf/bpf-next/c/4f114bc280bb
  - [bpf-next,v5,2/3] bpf: add verifier regression test for previous patch
    https://git.kernel.org/bpf/bpf-next/c/ec32ca301faa
  - [bpf-next,v5,3/3] bpf: guard stack limits against 32bit overflow
    https://git.kernel.org/bpf/bpf-next/c/755f82668d81

You are awesome, thank you!