You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
bpf: Add MEM_RDONLY for helper args that are pointers to rdonly mem.
jira VULN-140
pre-cve CVE-2022-23222
commit-author Hao Luo <[email protected]>
commit 216e3cd
upstream-diff A merge confict arised because several commits were
introduced since linux-4.18.y untill this commit (216e3cd
("bpf: Add MEM_RDONLY for helper args that are pointers to rdonly
mem.")) was merged upstream. Not listing all commits because there
are 20+ such commits.
Some helper functions may modify its arguments, for example,
bpf_d_path, bpf_get_stack etc. Previously, their argument types
were marked as ARG_PTR_TO_MEM, which is compatible with read-only
mem types, such as PTR_TO_RDONLY_BUF. Therefore it's legitimate,
but technically incorrect, to modify a read-only memory by passing
it into one of such helper functions.
This patch tags the bpf_args compatible with immutable memory with
MEM_RDONLY flag. The arguments that don't have this flag will be
only compatible with mutable memory types, preventing the helper
from modifying a read-only memory. The bpf_args that have
MEM_RDONLY are compatible with both mutable memory and immutable
memory.
Signed-off-by: Hao Luo <[email protected]>
Signed-off-by: Alexei Starovoitov <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
(cherry picked from commit 216e3cd)
Signed-off-by: Pratham Patel <[email protected]>
0 commit comments