Skip to content

Commit

Permalink
bpf: Take return from set_memory_ro() into account with bpf_prog_lock…
Browse files Browse the repository at this point in the history
…_ro()

BugLink: https://bugs.launchpad.net/bugs/2076435

[ Upstream commit 7d2cc63 ]

set_memory_ro() can fail, leaving memory unprotected.

Check its return and take it into account as an error.

Link: KSPP/linux#7
Signed-off-by: Christophe Leroy <[email protected]>
Cc: [email protected] <[email protected]>
Reviewed-by: Kees Cook <[email protected]>
Message-ID: <286def78955e04382b227cb3e4b6ba272a7442e3.1709850515.git.christophe.leroy@csgroup.eu>
Signed-off-by: Alexei Starovoitov <[email protected]>
Signed-off-by: Sasha Levin <[email protected]>
Signed-off-by: Portia Stephens <[email protected]>
Signed-off-by: Roxana Nicolescu <[email protected]>
  • Loading branch information
chleroy authored and smb49 committed Sep 27, 2024
1 parent 8722ad2 commit 904bc09
Show file tree
Hide file tree
Showing 3 changed files with 12 additions and 5 deletions.
5 changes: 3 additions & 2 deletions include/linux/filter.h
Original file line number Diff line number Diff line change
Expand Up @@ -884,14 +884,15 @@ bpf_ctx_narrow_access_offset(u32 off, u32 size, u32 size_default)

#define bpf_classic_proglen(fprog) (fprog->len * sizeof(fprog->filter[0]))

static inline void bpf_prog_lock_ro(struct bpf_prog *fp)
static inline int __must_check bpf_prog_lock_ro(struct bpf_prog *fp)
{
#ifndef CONFIG_BPF_JIT_ALWAYS_ON
if (!fp->jited) {
set_vm_flush_reset_perms(fp);
set_memory_ro((unsigned long)fp, fp->pages);
return set_memory_ro((unsigned long)fp, fp->pages);
}
#endif
return 0;
}

static inline void bpf_jit_binary_lock_ro(struct bpf_binary_header *hdr)
Expand Down
4 changes: 3 additions & 1 deletion kernel/bpf/core.c
Original file line number Diff line number Diff line change
Expand Up @@ -2399,7 +2399,9 @@ struct bpf_prog *bpf_prog_select_runtime(struct bpf_prog *fp, int *err)
}

finalize:
bpf_prog_lock_ro(fp);
*err = bpf_prog_lock_ro(fp);
if (*err)
return fp;

/* The tail call compatibility check can only be done at
* this late stage as we need to determine, if we deal
Expand Down
8 changes: 6 additions & 2 deletions kernel/bpf/verifier.c
Original file line number Diff line number Diff line change
Expand Up @@ -19020,10 +19020,14 @@ static int jit_subprogs(struct bpf_verifier_env *env)
* bpf_prog_load will add the kallsyms for the main program.
*/
for (i = 1; i < env->subprog_cnt; i++) {
bpf_prog_lock_ro(func[i]);
bpf_prog_kallsyms_add(func[i]);
err = bpf_prog_lock_ro(func[i]);
if (err)
goto out_free;
}

for (i = 1; i < env->subprog_cnt; i++)
bpf_prog_kallsyms_add(func[i]);

/* Last step: make now unused interpreter insns from main
* prog consistent for later dump requests, so they can
* later look the same as if they were interpreted only.
Expand Down

0 comments on commit 904bc09

Please sign in to comment.