diff options
author | Alexei Starovoitov <ast@fb.com> | 2016-03-08 08:57:16 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2016-03-08 23:28:31 +0300 |
commit | 823707b68d6e6c4b1be619b039c7045fef1740e6 (patch) | |
tree | 32149b0605061d1559c51e29a817a48a84ddcf6d /kernel/bpf/stackmap.c | |
parent | 6c90598174322b8888029e40dd84a4eb01f56afe (diff) | |
download | linux-823707b68d6e6c4b1be619b039c7045fef1740e6.tar.xz |
bpf: check for reserved flag bits in array and stack maps
Suggested-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'kernel/bpf/stackmap.c')
-rw-r--r-- | kernel/bpf/stackmap.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/kernel/bpf/stackmap.c b/kernel/bpf/stackmap.c index 8a60ee14a977..f0a02c344358 100644 --- a/kernel/bpf/stackmap.c +++ b/kernel/bpf/stackmap.c @@ -35,6 +35,9 @@ static struct bpf_map *stack_map_alloc(union bpf_attr *attr) if (!capable(CAP_SYS_ADMIN)) return ERR_PTR(-EPERM); + if (attr->map_flags) + return ERR_PTR(-EINVAL); + /* check sanity of attributes */ if (attr->max_entries == 0 || attr->key_size != 4 || value_size < 8 || value_size % 8 || |