diff options
author | Bui Quang Minh <minhquangbui99@gmail.com> | 2021-01-27 07:36:53 +0100 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2021-02-03 21:45:33 +0100 |
commit | 6183f4d3a0a2ad230511987c6c362ca43ec0055f (patch) | |
tree | d30766fb02fcac1ed22476c75727435978cdee76 /kernel/bpf/verifier.c | |
parent | bpf: Unbreak BPF_PROG_TYPE_KPROBE when kprobe is called via do_int3 (diff) | |
download | linux-6183f4d3a0a2ad230511987c6c362ca43ec0055f.tar.xz linux-6183f4d3a0a2ad230511987c6c362ca43ec0055f.zip |
bpf: Check for integer overflow when using roundup_pow_of_two()
On 32-bit architecture, roundup_pow_of_two() can return 0 when the argument
has upper most bit set due to resulting 1UL << 32. Add a check for this case.
Fixes: d5a3b1f69186 ("bpf: introduce BPF_MAP_TYPE_STACK_TRACE")
Signed-off-by: Bui Quang Minh <minhquangbui99@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20210127063653.3576-1-minhquangbui99@gmail.com
Diffstat (limited to 'kernel/bpf/verifier.c')
0 files changed, 0 insertions, 0 deletions