From: Alexei Starovoitov <a...@plumgrid.com> Date: Wed, 7 Oct 2015 10:55:41 -0700
> eBPF socket filter programs may see junk in 'u32 cb[5]' area, > since it could have been used by protocol layers earlier. > > For socket filter programs used in af_packet we need to clean > 20 bytes of skb->cb area if it could be used by the program. > For programs attached to TCP/UDP sockets we need to save/restore > these 20 bytes, since it's used by protocol layers. > > Remove SK_RUN_FILTER macro, since it's no longer used. > > Long term we may move this bpf cb area to per-cpu scratch, but that > requires addition of new 'per-cpu load/store' instructions, > so not suitable as a short term fix. > > Fixes: d691f9e8d440 ("bpf: allow programs to write to certain skb fields") > Reported-by: Eric Dumazet <eduma...@google.com> > Signed-off-by: Alexei Starovoitov <a...@plumgrid.com> > --- > v1->v2: > dropped extra conditional for clearing of cb for af_packet. > > Since eBPF is root only, the impact of the bug is low and > the fix can stay in net-next. Applied to net-next, thanks. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html