Files
linux/kernel
Andrii Nakryiko fc3e3c50a0 bpf: fix check for attempt to corrupt spilled pointer
[ Upstream commit ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae ]

When register is spilled onto a stack as a 1/2/4-byte register, we set
slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,
depending on actual spill size). So to check if some stack slot has
spilled register we need to consult slot_type[7], not slot_type[0].

To avoid the need to remember and double-check this in the future, just
use is_spilled_reg() helper.

Fixes: 27113c59b6 ("bpf: Check the other end of slot_type for STACK_SPILL")
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/r/20231205184248.1502704-4-andrii@kernel.org
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-01-25 15:27:26 -08:00
..
2022-09-28 09:02:20 +02:00
2022-12-31 13:33:11 +01:00
2022-08-29 19:47:03 -04:00
2022-09-26 10:13:13 -07:00
2023-12-20 17:00:20 +01:00
2023-11-28 17:06:57 +00:00
2022-12-31 13:33:08 +01:00
2022-06-29 13:07:16 +02:00
2022-02-25 09:36:06 +01:00