summaryrefslogtreecommitdiffstats
path: root/tools
diff options
context:
space:
mode:
authorAndrii Nakryiko <andrii@kernel.org>2023-12-08 17:09:57 -0800
committerAlexei Starovoitov <ast@kernel.org>2023-12-09 18:43:20 -0800
commit482d548d40b0af9af730e4869903d4433e44f014 (patch)
treec557d70945c6e3c8c9478df6b4ebc0639090c5bf /tools
parent8477fe1de9a631d634ccfda7fe147eba90f55732 (diff)
downloadlinux-stable-482d548d40b0af9af730e4869903d4433e44f014.tar.gz
linux-stable-482d548d40b0af9af730e4869903d4433e44f014.tar.bz2
linux-stable-482d548d40b0af9af730e4869903d4433e44f014.zip
bpf: handle fake register spill to stack with BPF_ST_MEM instruction
When verifier validates BPF_ST_MEM instruction that stores known constant to stack (e.g., *(u64 *)(r10 - 8) = 123), it effectively spills a fake register with a constant (but initially imprecise) value to a stack slot. Because read-side logic treats it as a proper register fill from stack slot, we need to mark such stack slot initialization as INSN_F_STACK_ACCESS instruction to stop precision backtracking from missing it. Fixes: 41f6f64e6999 ("bpf: support non-r10 register spill/fill to/from stack in precision tracking") Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: Eduard Zingerman <eddyz87@gmail.com> Link: https://lore.kernel.org/r/20231209010958.66758-1-andrii@kernel.org Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools')
0 files changed, 0 insertions, 0 deletions