Re: [Bug Report] bpf: zero access_size of stack causes array indix oob in check_stack_range_initialized()
From:
Andrei Matei
Date:
Mon Nov 27 2023 - 21:38:57 EST
Next message:
Jakub Kicinski: "Re: [PATCH net] octeontx2-af: Fix possible buffer overflow"
Previous message:
Stephen Rothwell: "linux-next: build warning after merge of the mm tree"
In reply to:
Hao Sun: "[Bug Report] bpf: zero access_size of stack causes array indix oob in check_stack_range_initialized()"
Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Thanks for another great report, Hao! Will investigate.
Next message:
Jakub Kicinski: "Re: [PATCH net] octeontx2-af: Fix possible buffer overflow"
Previous message:
Stephen Rothwell: "linux-next: build warning after merge of the mm tree"
In reply to:
Hao Sun: "[Bug Report] bpf: zero access_size of stack causes array indix oob in check_stack_range_initialized()"
Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]