diff options
author | 2023-12-07 10:57:36 -0800 | |
---|---|---|
committer | 2023-12-07 13:58:14 -0800 | |
commit | 483af466e4ee3326d150877ea0626e95c67a395e (patch) | |
tree | ceead968fb8ab47e59d6c55e3bc087a68736c8a8 /tools/lib | |
parent | Merge branch 'allocate-bpf-trampoline-on-bpf_prog_pack' (diff) | |
parent | bpf: Guard stack limits against 32bit overflow (diff) | |
download | linux-483af466e4ee3326d150877ea0626e95c67a395e.tar.gz linux-483af466e4ee3326d150877ea0626e95c67a395e.tar.bz2 linux-483af466e4ee3326d150877ea0626e95c67a395e.zip |
Merge branch 'bpf-fix-verification-of-indirect-var-off-stack-access'
Andrei Matei says:
====================
bpf: fix verification of indirect var-off stack access
V4 to V5:
- split the test into a separate patch
V3 to V4:
- include a test per Eduard's request
- target bpf-next per Alexei's request (patches didn't change)
V2 to V3:
- simplify checks for max_off (don't call
check_stack_slot_within_bounds for it)
- append a commit to protect against overflow in the addition of the
register and the offset
V1 to V2:
- fix max_off calculation for access size = 0
====================
Link: https://lore.kernel.org/r/20231207041150.229139-1-andreimatei1@gmail.com
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Diffstat (limited to 'tools/lib')
0 files changed, 0 insertions, 0 deletions