-
Notifications
You must be signed in to change notification settings - Fork 127
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security: Propagate universal pointer data in bpf hooks #8560
base: bpf-next_base
Are you sure you want to change the base?
Conversation
Upstream branch: 1ffe30e |
9819511
to
2f4a9ca
Compare
Upstream branch: 4e4136c |
0e346ad
to
d359c79
Compare
2f4a9ca
to
f03230d
Compare
Upstream branch: 9138048 |
d359c79
to
94ed99a
Compare
f03230d
to
a3b8426
Compare
Upstream branch: b123480 |
94ed99a
to
73f12b2
Compare
a3b8426
to
f5d8880
Compare
Upstream branch: 4580f4e |
73f12b2
to
004220d
Compare
f5d8880
to
03b9bd3
Compare
Upstream branch: 0ba0ef0 |
004220d
to
888b355
Compare
03b9bd3
to
df10b88
Compare
Upstream branch: fc3ab17 |
888b355
to
56d58ad
Compare
df10b88
to
16566af
Compare
Certain bpf syscall subcommands are available for usage from both userspace and the kernel. LSM modules or eBPF gatekeeper programs may need to take a different course of action depending on whether or not a BPF syscall originated from the kernel or userspace. Additionally, some of the bpf_attr struct fields contain pointers to arbitrary memory. Currently the functionality to determine whether or not a pointer refers to kernel memory or userspace memory is exposed to the bpf verifier, but that information is missing from various LSM hooks. Here we augment the LSM hooks to provide this data, by simply passing the corresponding universal pointer in any hook that contains already contains a bpf_attr struct that corresponds to a subcommand that may be called from the kernel. Signed-off-by: Blaise Boscaccy <bboscaccy@linux.microsoft.com>
Upstream branch: 43d9d43 |
56d58ad
to
c7e6d13
Compare
Pull request for series with
subject: security: Propagate universal pointer data in bpf hooks
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=937779