Edward Cree
|
9305706c2e
bpf/verifier: fix min/max handling in BPF_SUB
|
8 years ago |
Daniel Borkmann
|
4cabc5b186
bpf: fix mixed signed/unsigned derived min/max value bounds
|
8 years ago |
John Fastabend
|
43188702b3
bpf, verifier: add additional patterns to evaluate_reg_imm_alu
|
8 years ago |
Daniel Borkmann
|
f96da09473
bpf: simplify narrower ctx access
|
8 years ago |
David S. Miller
|
b079115937
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
|
8 years ago |
Daniel Borkmann
|
6bdf6abc56
bpf: prevent leaking pointer via xadd on unpriviledged
|
8 years ago |
Yonghong Song
|
239946314e
bpf: possibly avoid extra masking for narrower load in verifier
|
8 years ago |
Yonghong Song
|
31fd85816d
bpf: permits narrower load from bpf program context fields
|
8 years ago |
Daniel Borkmann
|
36e24c0030
bpf: reset id on spilled regs in clear_all_pkt_pointers
|
8 years ago |
Daniel Borkmann
|
4a2ff55aa4
bpf: reset id on CONST_IMM transition
|
8 years ago |
Daniel Borkmann
|
d25da6caa2
bpf: don't check spilled reg state for non-STACK_SPILLed type slots
|
8 years ago |
Daniel Borkmann
|
92046578ac
bpf: cgroup skb progs cannot access ld_abs/ind
|
8 years ago |
Chenbo Feng
|
fb9a307d11
bpf: Allow CGROUP_SKB eBPF program to access sk_buff
|
8 years ago |
Alexei Starovoitov
|
80a58d0255
bpf: reconcile bpf_tail_call and stack_depth
|
8 years ago |
Alexei Starovoitov
|
8726679a0f
bpf: teach verifier to track stack depth
|
8 years ago |
Alexei Starovoitov
|
71189fa9b0
bpf: free up BPF_JMP | BPF_CALL | BPF_X opcode
|
8 years ago |
Daniel Borkmann
|
a9789ef9af
bpf: properly reset caller saved regs after helper call and ld_abs/ind
|
8 years ago |
Daniel Borkmann
|
1ad2f5838d
bpf: fix incorrect pruning decision when alignment must be tracked
|
8 years ago |
David S. Miller
|
e4eda884db
net: Make IP alignment calulations clearer.
|
8 years ago |
Daniel Borkmann
|
3c2ce60bdd
bpf: adjust verifier heuristics
|
8 years ago |
David S. Miller
|
6832a333ed
bpf: Handle multiple variable additions into packet pointers in verifier.
|
8 years ago |
David S. Miller
|
e07b98d9bf
bpf: Add strict alignment flag for BPF_PROG_LOAD.
|
8 years ago |
David S. Miller
|
c5fc9692d1
bpf: Do per-instruction state dumping in verifier when log_level > 1.
|
8 years ago |
David S. Miller
|
d117441674
bpf: Track alignment of register values in the verifier.
|
8 years ago |
Daniel Borkmann
|
0d0e57697f
bpf: don't let ldimm64 leak map addresses on unprivileged
|
8 years ago |
Yonghong Song
|
332270fdc8
bpf: enhance verifier to understand stack pointer arithmetic
|
8 years ago |
Daniel Borkmann
|
e390b55d5a
bpf: make bpf_xdp_adjust_head support mandatory
|
8 years ago |
David S. Miller
|
7b9f6da175
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
|
8 years ago |
David S. Miller
|
6f14f443d3
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
|
8 years ago |
Daniel Borkmann
|
79adffcd64
bpf, verifier: fix rejection of unaligned access checks for map_value_adj
|
8 years ago |