summaryrefslogtreecommitdiffstats
path: root/kernel/crash_dump.c
diff options
context:
space:
mode:
authorAndrii Nakryiko <andrii@kernel.org>2023-09-18 23:01:10 +0200
committerAlexei Starovoitov <ast@kernel.org>2023-09-20 12:26:25 +0200
commit81335f90e8a88b81932df011105c46e708744f44 (patch)
tree0a13b2a8d05d69f718ca73660e6431db866d2f0e /kernel/crash_dump.c
parentbpf: Fix tr dereferencing (diff)
downloadlinux-81335f90e8a88b81932df011105c46e708744f44.tar.xz
linux-81335f90e8a88b81932df011105c46e708744f44.zip
bpf: unconditionally reset backtrack_state masks on global func exit
In mark_chain_precision() logic, when we reach the entry to a global func, it is expected that R1-R5 might be still requested to be marked precise. This would correspond to some integer input arguments being tracked as precise. This is all expected and handled as a special case. What's not expected is that we'll leave backtrack_state structure with some register bits set. This is because for subsequent precision propagations backtrack_state is reused without clearing masks, as all code paths are carefully written in a way to leave empty backtrack_state with zeroed out masks, for speed. The fix is trivial, we always clear register bit in the register mask, and then, optionally, set reg->precise if register is SCALAR_VALUE type. Reported-by: Chris Mason <clm@meta.com> Fixes: be2ef8161572 ("bpf: allow precision tracking for programs with subprogs") Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/r/20230918210110.2241458-1-andrii@kernel.org Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'kernel/crash_dump.c')
0 files changed, 0 insertions, 0 deletions