diff options
author | Benjamin Tissoires <benjamin.tissoires@redhat.com> | 2022-09-06 17:12:59 +0200 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2022-09-07 20:03:44 +0200 |
commit | 15baa55ff5b00b81bcd9874b89cb8e0b0daaa13d (patch) | |
tree | de84b7fd33c63411952073682cdb27bcd3ac9829 /net/bpf | |
parent | bpf: split btf_check_subprog_arg_match in two (diff) | |
download | linux-15baa55ff5b00b81bcd9874b89cb8e0b0daaa13d.tar.xz linux-15baa55ff5b00b81bcd9874b89cb8e0b0daaa13d.zip |
bpf/verifier: allow all functions to read user provided context
When a function was trying to access data from context in a syscall eBPF
program, the verifier was rejecting the call unless it was accessing the
first element.
This is because the syscall context is not known at compile time, and
so we need to check this when actually accessing it.
Check for the valid memory access if there is no convert_ctx callback,
and allow such situation to happen.
Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
Link: https://lore.kernel.org/r/20220906151303.2780789-4-benjamin.tissoires@redhat.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'net/bpf')
0 files changed, 0 insertions, 0 deletions