android_kernel_oneplus_msm8998/kernel/bpf
Rabin Vincent 35987ff2ea net: bpf: reject invalid shifts
[ Upstream commit 229394e8e62a4191d592842cf67e80c62a492937 ]

On ARM64, a BUG() is triggered in the eBPF JIT if a filter with a
constant shift that can't be encoded in the immediate field of the
UBFM/SBFM instructions is passed to the JIT.  Since these shifts
amounts, which are negative or >= regsize, are invalid, reject them in
the eBPF verifier and the classic BPF filter checker, for all
architectures.

Signed-off-by: Rabin Vincent <rabin@rab.in>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2016-01-31 11:29:01 -08:00
..
arraymap.c bpf: fix allocation warnings in bpf maps and integer overflow 2015-12-02 23:36:00 -05:00
core.c bpf: consolidate bpf_prog_put{, _rcu} dismantle paths 2015-11-02 22:48:39 -05:00
hashtab.c bpf: fix allocation warnings in bpf maps and integer overflow 2015-12-02 23:36:00 -05:00
helpers.c bpf: split state from prandom_u32() and consolidate {c, e}BPF prngs 2015-10-08 05:26:39 -07:00
inode.c bpf: fix clearing on persistent program array maps 2015-11-25 12:14:09 -05:00
Makefile bpf: add support for persistent maps/progs 2015-11-02 22:48:39 -05:00
syscall.c bpf: fix allocation warnings in bpf maps and integer overflow 2015-12-02 23:36:00 -05:00
verifier.c net: bpf: reject invalid shifts 2016-01-31 11:29:01 -08:00