bpf: require CAP_NET_ADMIN when using sockmap maps
Restrict sockmap to CAP_NET_ADMIN. Signed-off-by: John Fastabend <john.fastabend@gmail.com> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
f7e9cb1ecb
commit
fb50df8d32
@ -486,6 +486,9 @@ static struct bpf_map *sock_map_alloc(union bpf_attr *attr)
|
|||||||
int err = -EINVAL;
|
int err = -EINVAL;
|
||||||
u64 cost;
|
u64 cost;
|
||||||
|
|
||||||
|
if (!capable(CAP_NET_ADMIN))
|
||||||
|
return ERR_PTR(-EPERM);
|
||||||
|
|
||||||
/* check sanity of attributes */
|
/* check sanity of attributes */
|
||||||
if (attr->max_entries == 0 || attr->key_size != 4 ||
|
if (attr->max_entries == 0 || attr->key_size != 4 ||
|
||||||
attr->value_size != 4 || attr->map_flags & ~BPF_F_NUMA_NODE)
|
attr->value_size != 4 || attr->map_flags & ~BPF_F_NUMA_NODE)
|
||||||
|
Loading…
Reference in New Issue
Block a user