Re: [PATCH net-next] bpf, trace: make ctx access checks more robust

2017-01-16 Thread David Miller
From: Daniel Borkmann Date: Sun, 15 Jan 2017 01:34:25 +0100 > Make sure that ctx cannot potentially be accessed oob by asserting > explicitly that ctx access size into pt_regs for BPF_PROG_TYPE_KPROBE > programs must be within limits. In case some 32bit archs have pt_regs > not being a multiple o

[PATCH net-next] bpf, trace: make ctx access checks more robust

2017-01-14 Thread Daniel Borkmann
Make sure that ctx cannot potentially be accessed oob by asserting explicitly that ctx access size into pt_regs for BPF_PROG_TYPE_KPROBE programs must be within limits. In case some 32bit archs have pt_regs not being a multiple of 8, then BPF_DW access could cause such access. BPF_PROG_TYPE_KPROBE