lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 12 Jan 2016 15:56:09 -0500 (EST) From: David Miller <davem@...emloft.net> To: rabin@....in Cc: netdev@...r.kernel.org, ast@...nel.org, daniel@...earbox.net, linux-arm-kernel@...ts.infradead.org Subject: Re: [PATCHv2] net: bpf: reject invalid shifts From: Rabin Vincent <rabin@....in> Date: Tue, 12 Jan 2016 20:17:08 +0100 > On ARM64, a BUG() is triggered in the eBPF JIT if a filter with a > constant shift that can't be encoded in the immediate field of the > UBFM/SBFM instructions is passed to the JIT. Since these shifts > amounts, which are negative or >= regsize, are invalid, reject them in > the eBPF verifier and the classic BPF filter checker, for all > architectures. > > Signed-off-by: Rabin Vincent <rabin@....in> > --- > v2: handle BPF_ARSH too Applied and queued up for -stable, thanks.
Powered by blists - more mailing lists