diff options
| author | Alexei Starovoitov <ast@kernel.org> | 2026-03-24 14:59:36 -0700 |
|---|---|---|
| committer | Alexei Starovoitov <ast@kernel.org> | 2026-03-24 17:00:11 -0700 |
| commit | 4639eb9e30ab10c7935c7c19e872facf9a94713f (patch) | |
| tree | a97df9dcc8e8154433a9dad92f5a4351a175def0 /tools/perf/scripts/python/bin | |
| parent | 8ed82f807bb09d2c8455aaa665f2c6cb17bc6a19 (diff) | |
bpf: Fix variable length stack write over spilled pointers
Scrub slots if variable-offset stack write goes over spilled pointers.
Otherwise is_spilled_reg() may == true && spilled_ptr.type == NOT_INIT
and valid program is rejected by check_stack_read_fixed_off()
with obscure "invalid size of register fill" message.
Fixes: 01f810ace9ed ("bpf: Allow variable-offset stack access")
Acked-by: Eduard Zingerman <eddyz87@gmail.com>
Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20260324215938.81733-1-alexei.starovoitov@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/bin')
0 files changed, 0 insertions, 0 deletions
