mirror of
https://github.com/torvalds/linux.git
synced 2026-05-12 16:18:45 +02:00
bpf: Propagate error from visit_tailcall_insn
Commite40f5a6bf8("bpf: correct stack liveness for tail calls") added visit_tailcall_insn() but did not check its return value. Fixes:e40f5a6bf8("bpf: correct stack liveness for tail calls") Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/r/20260408191242.526279-1-daniel@iogearbox.net Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
c7cab53f9d
commit
6bd96e40f3
|
|
@ -19355,8 +19355,11 @@ static int visit_insn(int t, struct bpf_verifier_env *env)
|
|||
mark_subprog_might_sleep(env, t);
|
||||
if (bpf_helper_changes_pkt_data(insn->imm))
|
||||
mark_subprog_changes_pkt_data(env, t);
|
||||
if (insn->imm == BPF_FUNC_tail_call)
|
||||
visit_tailcall_insn(env, t);
|
||||
if (insn->imm == BPF_FUNC_tail_call) {
|
||||
ret = visit_tailcall_insn(env, t);
|
||||
if (ret)
|
||||
return ret;
|
||||
}
|
||||
} else if (insn->src_reg == BPF_PSEUDO_KFUNC_CALL) {
|
||||
struct bpf_kfunc_call_arg_meta meta;
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user