Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752012AbaF2B7N (ORCPT ); Sat, 28 Jun 2014 21:59:13 -0400 Received: from mail-lb0-f169.google.com ([209.85.217.169]:34978 "EHLO mail-lb0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751405AbaF2B7L (ORCPT ); Sat, 28 Jun 2014 21:59:11 -0400 MIME-Version: 1.0 In-Reply-To: References: <1403913966-4927-1-git-send-email-ast@plumgrid.com> <1403913966-4927-9-git-send-email-ast@plumgrid.com> From: Andy Lutomirski Date: Sat, 28 Jun 2014 18:58:50 -0700 Message-ID: Subject: Re: [PATCH RFC net-next 08/14] bpf: add eBPF verifier To: Alexei Starovoitov Cc: "David S. Miller" , Ingo Molnar , Linus Torvalds , Steven Rostedt , Daniel Borkmann , Chema Gonzalez , Eric Dumazet , Peter Zijlstra , Arnaldo Carvalho de Melo , Jiri Olsa , Thomas Gleixner , "H. Peter Anvin" , Andrew Morton , Kees Cook , Linux API , Network Development , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 28, 2014 at 1:25 PM, Alexei Starovoitov wrote: > On Sat, Jun 28, 2014 at 9:01 AM, Andy Lutomirski wrote: >> On Fri, Jun 27, 2014 at 5:06 PM, Alexei Starovoitov wrote: >>> Safety of eBPF programs is statically determined by the verifier, which detects: >> >> This is a very high-level review. I haven't tried to read all the >> code yet, and this is mostly questions rather than real comments. > > These were great questions! I hope I answered them. If not, please > continue asking. I have plenty more questions, but here's one right now: does anything prevent programs from using pointers in comparisons, returning pointers, or otherwise figuring out the value of a pointer? If so, I think it would be worthwhile to prevent that so that eBPF programs can't learn kernel addresses. --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/