From: Jakub Kicinski <jakub.kicinski@netronome.com>
Date: Mon, 16 Oct 2017 16:40:56 -0700
Subject: bpf: allow access to skb->len from offloads
Patch-mainline: v4.15-rc1
Git-commit: 29d1b33a2e0a3288374102b004a15cb278a2303e
References: bsc#1109837
Since we are now doing strict checking of what offloads
may access, make sure skb->len is on that list.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Acked-by: Thomas Bogendoerfer <tbogendoerfer@suse.de>
---
net/core/filter.c | 2 ++
1 file changed, 2 insertions(+)
--- a/net/core/filter.c
+++ b/net/core/filter.c
@@ -3610,6 +3610,8 @@ tc_cls_act_is_valid_access_analyzer(int
struct bpf_insn_access_aux *info)
{
switch (off) {
+ case offsetof(struct sk_buff, len):
+ return true;
case offsetof(struct sk_buff, data):
info->reg_type = PTR_TO_PACKET;
return true;