Commit 29d1b33a authored by Jakub Kicinski's avatar Jakub Kicinski Committed by David S. Miller

bpf: allow access to skb->len from offloads

Since we are now doing strict checking of what offloads
may access, make sure skb->len is on that list.
Signed-off-by: default avatarJakub Kicinski <jakub.kicinski@netronome.com>
Acked-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
Acked-by: default avatarAlexei Starovoitov <ast@kernel.org>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 4f9218aa
...@@ -3738,6 +3738,8 @@ tc_cls_act_is_valid_access_analyzer(int off, int size, ...@@ -3738,6 +3738,8 @@ tc_cls_act_is_valid_access_analyzer(int off, int size,
struct bpf_insn_access_aux *info) struct bpf_insn_access_aux *info)
{ {
switch (off) { switch (off) {
case offsetof(struct sk_buff, len):
return true;
case offsetof(struct sk_buff, data): case offsetof(struct sk_buff, data):
info->reg_type = PTR_TO_PACKET; info->reg_type = PTR_TO_PACKET;
return true; return true;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment