diff options
author | KP Singh <kpsingh@google.com> | 2020-03-04 20:18:50 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2020-03-04 13:41:05 -0800 |
commit | 6ba43b761c41349140662e223401bec0e48950e7 (patch) | |
tree | 7967b279148889ace27e59721f4300fa5ee8f268 /tools/testing/selftests/bpf/prog_tests/fexit_test.c | |
parent | ae24082331d9bbaae283aafbe930a8f0eb85605a (diff) | |
download | linux-6ba43b761c41349140662e223401bec0e48950e7.tar.gz linux-6ba43b761c41349140662e223401bec0e48950e7.tar.bz2 linux-6ba43b761c41349140662e223401bec0e48950e7.zip |
bpf: Attachment verification for BPF_MODIFY_RETURN
- Allow BPF_MODIFY_RETURN attachment only to functions that are:
* Whitelisted for error injection by checking
within_error_injection_list. Similar discussions happened for the
bpf_override_return helper.
* security hooks, this is expected to be cleaned up with the LSM
changes after the KRSI patches introduce the LSM_HOOK macro:
https://lore.kernel.org/bpf/20200220175250.10795-1-kpsingh@chromium.org/
- The attachment is currently limited to functions that return an int.
This can be extended later other types (e.g. PTR).
Signed-off-by: KP Singh <kpsingh@google.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20200304191853.1529-5-kpsingh@chromium.org
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/fexit_test.c')
0 files changed, 0 insertions, 0 deletions