summaryrefslogtreecommitdiff
path: root/kernel
diff options
context:
space:
mode:
authorAnay Wadhera <awadhera@berkeley.edu>2021-05-20 21:58:02 -0700
committerMichael Bestas <mkbestas@lineageos.org>2022-04-19 00:49:47 +0300
commit327e59d570a31b02088a5f7f04f683b751136c17 (patch)
tree43c7073f3ecd090535092bacd7665f8f78c579b3 /kernel
parentefb21a8bffd374ec1f743316ac3da3de63c37645 (diff)
Revert "bpf: prevent leaking pointer via xadd on unpriviledged"
This reverts commit 1a4f13e0a99a85c455ff2f6dc117f6f049c039fa. Signed-off-by: Chatur27 <jasonbright2709@gmail.com>
Diffstat (limited to 'kernel')
-rw-r--r--kernel/bpf/verifier.c5
1 files changed, 0 insertions, 5 deletions
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 863e24f1e62e..2cbfba78d3db 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -754,11 +754,6 @@ static int check_xadd(struct verifier_env *env, struct bpf_insn *insn)
if (err)
return err;
- if (is_pointer_value(env, insn->src_reg)) {
- verbose("R%d leaks addr into mem\n", insn->src_reg);
- return -EACCES;
- }
-
/* check whether atomic_add can read the memory */
err = check_mem_access(env, insn->dst_reg, insn->off,
BPF_SIZE(insn->code), BPF_READ, -1);