hulk inclusion category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IAYPJF CVE: CVE-2024-47703
--------------------------------
After backport commit f7d4945550ef ("bpf, lsm: Add check for BPF LSM return value"), `is_retval` field was added to the struct `bpf_insn_access_aux`, resulting in a kabi breakage.
Fix this breakage by KABI_FILL_HOLE.
Fixes: f7d4945550ef ("bpf, lsm: Add check for BPF LSM return value") Signed-off-by: Tengda Wu wutengda2@huawei.com --- include/linux/bpf.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/linux/bpf.h b/include/linux/bpf.h index 017401c80102..1f0a44a59fe1 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -912,7 +912,7 @@ static_assert(__BPF_REG_TYPE_MAX <= BPF_BASE_TYPE_LIMIT); */ struct bpf_insn_access_aux { enum bpf_reg_type reg_type; - bool is_retval; /* is accessing function return value ? */ + KABI_FILL_HOLE(bool is_retval) /* is accessing function return value ? */ union { int ctx_field_size; struct {