summaryrefslogtreecommitdiff
path: root/include/net/xsk_buff_pool.h
diff options
context:
space:
mode:
authorAdam Zabrocki <pi3@pi3.com.pl>2022-04-22 18:40:27 +0200
committerDaniel Borkmann <daniel@iogearbox.net>2022-04-26 16:09:36 +0200
commit1d661ed54d8613c97bcff2c7d6181c61e482a1da (patch)
treef126c3bcc98255dfed064c1ac7a95fc58e771613 /include/net/xsk_buff_pool.h
parentb02d196c44ead1a5949729be9ff08fe781c3e48a (diff)
downloadlwn-1d661ed54d8613c97bcff2c7d6181c61e482a1da.tar.gz
lwn-1d661ed54d8613c97bcff2c7d6181c61e482a1da.zip
kprobes: Fix KRETPROBES when CONFIG_KRETPROBE_ON_RETHOOK is set
The recent kernel change in 73f9b911faa7 ("kprobes: Use rethook for kretprobe if possible"), introduced a potential NULL pointer dereference bug in the KRETPROBE mechanism. The official Kprobes documentation defines that "Any or all handlers can be NULL". Unfortunately, there is a missing return handler verification to fulfill these requirements and can result in a NULL pointer dereference bug. This patch adds such verification in kretprobe_rethook_handler() function. Fixes: 73f9b911faa7 ("kprobes: Use rethook for kretprobe if possible") Signed-off-by: Adam Zabrocki <pi3@pi3.com.pl> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Masami Hiramatsu <mhiramat@kernel.org> Cc: Steven Rostedt <rostedt@goodmis.org> Cc: Naveen N. Rao <naveen.n.rao@linux.ibm.com> Cc: Anil S. Keshavamurthy <anil.s.keshavamurthy@intel.com> Link: https://lore.kernel.org/bpf/20220422164027.GA7862@pi3.com.pl
Diffstat (limited to 'include/net/xsk_buff_pool.h')
0 files changed, 0 insertions, 0 deletions