-
Notifications
You must be signed in to change notification settings - Fork 5
bpf: Make sure all tail call callers use cgroup storage if the owner does #6456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: bpf_base
Are you sure you want to change the base?
Conversation
|
Upstream branch: 30f0920 |
ad17a83 to
db65bfd
Compare
|
Upstream branch: 30f0920 |
25a9f3e to
c642296
Compare
db65bfd to
b55f0a6
Compare
|
Upstream branch: 8f7aa3d |
c642296 to
345490f
Compare
b55f0a6 to
0d4aada
Compare
|
Upstream branch: 835a507 |
345490f to
c8f5b2c
Compare
0d4aada to
619639b
Compare
|
Upstream branch: 861111b |
c8f5b2c to
84c1c1e
Compare
619639b to
f0cd774
Compare
|
Upstream branch: 861111b |
84c1c1e to
49f344d
Compare
f0cd774 to
cb6e082
Compare
…does Mitigate a possible NULL pointer dereference in bpf_get_local_storage() by requiring all callers to use cgroup storage if the owner does. Cgroup storage is allocated lazily when attaching a cgroup bpf program. With tail call, it is possible for a callee BPF program to see a NULL storage pointer if the caller prorgam does not use cgroup storage. Reported-by: Yinhao Hu <[email protected]> Reported-by: Kaiyan Mei <[email protected]> Reported-by: Dongliang Mu <[email protected]> Closes: https://lore.kernel.org/bpf/[email protected]/ Signed-off-by: Amery Hung <[email protected]>
Make sure that if the owner of a program array map uses cgroup storage, (1) all callers must use cgroup storage and (2) the cgroup storage map used by all callers and callees must be the owner's cgroup storage map. Signed-off-by: Amery Hung <[email protected]>
|
Upstream branch: 861111b |
49f344d to
acfffb8
Compare
Pull request for series with
subject: bpf: Make sure all tail call callers use cgroup storage if the owner does
version: 3
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1030226