diff options
author | Christophe Leroy <christophe.leroy@csgroup.eu> | 2024-03-08 06:38:07 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2024-03-14 19:28:52 -0700 |
commit | 7d2cc63eca0c993c99d18893214abf8f85d566d8 (patch) | |
tree | f76363657d57f38f950856a1c399dad1ad31780b /arch/sparc/net/bpf_jit_comp_64.c | |
parent | 4d8926a0407cff0c864b759b59104f4fb6f8efab (diff) |
bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
set_memory_ro() can fail, leaving memory unprotected.
Check its return and take it into account as an error.
Link: https://github.com/KSPP/linux/issues/7
Signed-off-by: Christophe Leroy <christophe.leroy@csgroup.eu>
Cc: linux-hardening@vger.kernel.org <linux-hardening@vger.kernel.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Message-ID: <286def78955e04382b227cb3e4b6ba272a7442e3.1709850515.git.christophe.leroy@csgroup.eu>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'arch/sparc/net/bpf_jit_comp_64.c')
0 files changed, 0 insertions, 0 deletions