[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <9cc31112-5f70-cae4-2e85-5446650c915e@iogearbox.net>
Date: Tue, 4 Dec 2018 17:23:50 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: Alexei Starovoitov <ast@...nel.org>,
"David S . Miller" <davem@...emloft.net>
Cc: ecree@...arflare.com, anatoly.trosinenko@...il.com,
netdev@...r.kernel.org, kernel-team@...com
Subject: Re: [PATCH bpf 0/3] bpf: improve verifier resilience
On 12/04/2018 07:46 AM, Alexei Starovoitov wrote:
> Three patches to improve verifier ability to handle pathological bpf programs
> with a lot of branches:
> - make sure prog_load syscall can be aborted
> - improve branch taken analysis
> - introduce per-insn complexity limit for unprivileged programs
>
> Alexei Starovoitov (3):
> bpf: check pending signals while verifying programs
> bpf: improve verifier branch analysis
> bpf: add per-insn complexity limit
>
> kernel/bpf/verifier.c | 103 +++++++++++++++++---
> tools/testing/selftests/bpf/test_verifier.c | 4 +-
> 2 files changed, 91 insertions(+), 16 deletions(-)
>
Applied to bpf, thanks!
Powered by blists - more mailing lists