projects
/
platform
/
kernel
/
linux-rpi.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
03ca12e
)
bpf: Check the validity of max_rdwr_access for sock local storage map iterator
author
Hou Tao
<houtao1@huawei.com>
Wed, 10 Aug 2022 08:05:34 +0000
(16:05 +0800)
committer
Greg Kroah-Hartman
<gregkh@linuxfoundation.org>
Thu, 25 Aug 2022 09:40:04 +0000
(11:40 +0200)
commit
52bd05eb7c88e1ad8541a48873188ccebca9da26
upstream.
The value of sock local storage map is writable in map iterator, so check
max_rdwr_access instead of max_rdonly_access.
Fixes:
5ce6e77c7edf
("bpf: Implement bpf iterator for sock local storage map")
Signed-off-by: Hou Tao <houtao1@huawei.com>
Acked-by: Yonghong Song <yhs@fb.com>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Link:
https://lore.kernel.org/r/20220810080538.1845898-6-houtao@huaweicloud.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/core/bpf_sk_storage.c
patch
|
blob
|
history
diff --git
a/net/core/bpf_sk_storage.c
b/net/core/bpf_sk_storage.c
index
85db9bc
..
d2745c5
100644
(file)
--- a/
net/core/bpf_sk_storage.c
+++ b/
net/core/bpf_sk_storage.c
@@
-894,7
+894,7
@@
static int bpf_iter_attach_map(struct bpf_prog *prog,
if (map->map_type != BPF_MAP_TYPE_SK_STORAGE)
goto put_map;
- if (prog->aux->max_rd
only
_access > map->value_size) {
+ if (prog->aux->max_rd
wr
_access > map->value_size) {
err = -EACCES;
goto put_map;
}