Message ID | 20231219134800.1550388-1-menglong8.dong@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf: support to track BPF_JNE | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Tue, 19 Dec 2023 21:47:56 +0800 you wrote: > For now, the reg bounds is not handled for BPF_JNE case, which can cause > the failure of following case: > > /* The type of "a" is u32 */ > if (a > 0 && a < 100) { > /* the range of the register for a is [0, 99], not [1, 99], > * and will cause the following error: > * > * invalid zero-sized read > * > * as a can be 0. > */ > bpf_skb_store_bytes(skb, xx, xx, a, 0); > } > > [...] Here is the summary with links: - [bpf-next,v5,1/4] bpf: make the verifier tracks the "not equal" for regs https://git.kernel.org/bpf/bpf-next/c/d028f87517d6 - [bpf-next,v5,2/4] selftests/bpf: remove reduplicated s32 casting in "crafted_cases" https://git.kernel.org/bpf/bpf-next/c/1de584832375 - [bpf-next,v5,3/4] selftests/bpf: activate the OP_NE logic in range_cond() https://git.kernel.org/bpf/bpf-next/c/31d9cc96b1e3 - [bpf-next,v5,4/4] selftests/bpf: add testcase to verifier_bounds.c for BPF_JNE https://git.kernel.org/bpf/bpf-next/c/463ea64eb008 You are awesome, thank you!