summaryrefslogtreecommitdiff
path: root/kernel/kexec_core.c
diff options
context:
space:
mode:
authorAlexei Starovoitov <ast@kernel.org>2018-12-03 22:46:04 -0800
committerDaniel Borkmann <daniel@iogearbox.net>2018-12-04 17:22:02 +0100
commitc3494801cd1785e2c25f1a5735fa19ddcf9665da (patch)
treef3bedbb2deb12948d7765aaac8f4a2e8000fdd73 /kernel/kexec_core.c
parent025dceb0fab31c912c41b8f32577432231d83e6b (diff)
bpf: check pending signals while verifying programs
Malicious user space may try to force the verifier to use as much cpu time and memory as possible. Hence check for pending signals while verifying the program. Note that suspend of sys_bpf(PROG_LOAD) syscall will lead to EAGAIN, since the kernel has to release the resources used for program verification. Reported-by: Anatoly Trosinenko <anatoly.trosinenko@gmail.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Edward Cree <ecree@solarflare.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'kernel/kexec_core.c')
0 files changed, 0 insertions, 0 deletions