diff options
| author | Anay Wadhera <awadhera@berkeley.edu> | 2021-05-20 21:58:02 -0700 |
|---|---|---|
| committer | Michael Bestas <mkbestas@lineageos.org> | 2022-04-19 00:49:47 +0300 |
| commit | 327e59d570a31b02088a5f7f04f683b751136c17 (patch) | |
| tree | 43c7073f3ecd090535092bacd7665f8f78c579b3 /kernel | |
| parent | efb21a8bffd374ec1f743316ac3da3de63c37645 (diff) | |
Revert "bpf: prevent leaking pointer via xadd on unpriviledged"
This reverts commit 1a4f13e0a99a85c455ff2f6dc117f6f049c039fa.
Signed-off-by: Chatur27 <jasonbright2709@gmail.com>
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/bpf/verifier.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 863e24f1e62e..2cbfba78d3db 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -754,11 +754,6 @@ static int check_xadd(struct verifier_env *env, struct bpf_insn *insn) if (err) return err; - if (is_pointer_value(env, insn->src_reg)) { - verbose("R%d leaks addr into mem\n", insn->src_reg); - return -EACCES; - } - /* check whether atomic_add can read the memory */ err = check_mem_access(env, insn->dst_reg, insn->off, BPF_SIZE(insn->code), BPF_READ, -1); |
