]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
nfp: bpf: prevent integer overflow in nfp_bpf_event_output()
authorDan Carpenter <dan.carpenter@linaro.org>
Mon, 13 Jan 2025 06:18:39 +0000 (09:18 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 23 Jan 2025 16:15:58 +0000 (17:15 +0100)
commitfdfe7ef525ad34c29ab26513d331ef236e44f50a
tree9cb44a1eec8d5d49778ee2257bbf5d4b5bbc34f5
parent036f8d814a2cd11ee8ef62b8f3e7ce5dec0ee4f3
nfp: bpf: prevent integer overflow in nfp_bpf_event_output()

[ Upstream commit 16ebb6f5b6295c9688749862a39a4889c56227f8 ]

The "sizeof(struct cmsg_bpf_event) + pkt_size + data_size" math could
potentially have an integer wrapping bug on 32bit systems.  Check for
this and return an error.

Fixes: 9816dd35ecec ("nfp: bpf: perf event output helpers support")
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://patch.msgid.link/6074805b-e78d-4b8a-bf05-e929b5377c28@stanley.mountain
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/net/ethernet/netronome/nfp/bpf/offload.c