mirror of
https://github.com/systemd/systemd-stable.git
synced 2025-01-03 01:17:45 +03:00
bpf: fix restrict_fs on s390x
Linux kernel's bpf-next contains BPF LSM support for s390x. systemd's test-bpf-lsm currently fails with this kernel. This is an endianness issue: in the restrict_fs bpf program, magic_number has type unsigned long (64 bits on s390x), but magic_map keys are uint32_t (32 bits). Accessing magic_map using 64-bit keys may work by accident on little-endian systems, but fails hard on big-endian ones. Fix by casting magic_number to uint32_t. (cherry picked from commit907046282c
) (cherry picked from commitf62e7b4704
) (cherry picked from commit25cb55890e
)
This commit is contained in:
parent
3dd120c2ea
commit
d8d3106ea8
@ -39,16 +39,20 @@ struct {
|
|||||||
SEC("lsm/file_open")
|
SEC("lsm/file_open")
|
||||||
int BPF_PROG(restrict_filesystems, struct file *file, int ret)
|
int BPF_PROG(restrict_filesystems, struct file *file, int ret)
|
||||||
{
|
{
|
||||||
unsigned long magic_number;
|
unsigned long raw_magic_number;
|
||||||
uint64_t cgroup_id;
|
uint64_t cgroup_id;
|
||||||
uint32_t *value, *magic_map, zero = 0, *is_allow;
|
uint32_t *value, *magic_map, magic_number, zero = 0, *is_allow;
|
||||||
|
|
||||||
/* ret is the return value from the previous BPF program or 0 if it's
|
/* ret is the return value from the previous BPF program or 0 if it's
|
||||||
* the first hook */
|
* the first hook */
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
BPF_CORE_READ_INTO(&magic_number, file, f_inode, i_sb, s_magic);
|
BPF_CORE_READ_INTO(&raw_magic_number, file, f_inode, i_sb, s_magic);
|
||||||
|
/* super_block.s_magic is unsigned long, but magic_map keys are
|
||||||
|
* uint32_t. Using s_magic as-is would fail on big-endian systems,
|
||||||
|
* which have 64-bit unsigned long. So cast it. */
|
||||||
|
magic_number = (uint32_t)raw_magic_number;
|
||||||
|
|
||||||
cgroup_id = bpf_get_current_cgroup_id();
|
cgroup_id = bpf_get_current_cgroup_id();
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user