diff options
author | Andrii Nakryiko <andrii@kernel.org> | 2020-11-20 23:08:29 -0800 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2020-11-25 00:05:21 +0100 |
commit | 607c543f939d8ca6fed7afe90b3a8d6f6684dd17 (patch) | |
tree | 68d4e048d6674a4f926e9b53166e53e5063919ab /mm | |
parent | e732b538f4557cd0a856bbce3cde55d2dfef3b03 (diff) |
bpf: Sanitize BTF data pointer after module is loaded
Given .BTF section is not allocatable, it will get trimmed after module is
loaded. BPF system handles that properly by creating an independent copy of
data. But prevent any accidental misused by resetting the pointer to BTF data.
Fixes: 36e68442d1af ("bpf: Load and verify kernel module BTFs")
Suggested-by: Jessica Yu <jeyu@kernel.org>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Jessica Yu <jeyu@kernel.org>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Link: https://lore.kernel.org/bpf/20201121070829.2612884-2-andrii@kernel.org
Diffstat (limited to 'mm')
0 files changed, 0 insertions, 0 deletions