Files
kernel_arpi/include/linux
Masami Hiramatsu 16ccd481e3 kprobes: Limit max data_size of the kretprobe instances
commit 6bbfa44116689469267f1a6e3d233b52114139d2 upstream.

The 'kprobe::data_size' is unsigned, thus it can not be negative.  But if
user sets it enough big number (e.g. (size_t)-8), the result of 'data_size
+ sizeof(struct kretprobe_instance)' becomes smaller than sizeof(struct
kretprobe_instance) or zero. In result, the kretprobe_instance are
allocated without enough memory, and kretprobe accesses outside of
allocated memory.

To avoid this issue, introduce a max limitation of the
kretprobe::data_size. 4KB per instance should be OK.

Link: https://lkml.kernel.org/r/163836995040.432120.10322772773821182925.stgit@devnote2

Cc: stable@vger.kernel.org
Fixes: f47cd9b553 ("kprobes: kretprobe user entry-handler")
Reported-by: zhangyue <zhangyue1@kylinos.cn>
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2021-12-08 09:04:41 +01:00
..
2021-09-02 22:49:16 +02:00
2021-09-20 12:43:34 +01:00
2021-10-07 16:51:57 +02:00
2021-09-08 15:32:35 -07:00
2021-11-25 09:48:41 +01:00
2021-09-07 21:17:28 +02:00
2021-09-06 07:20:56 -04:00
2021-11-25 09:49:08 +01:00
2021-09-03 09:58:13 -07:00
2021-09-23 11:01:12 -04:00
2021-11-18 19:15:51 +01:00
2021-11-18 19:17:02 +01:00
2021-09-17 13:52:17 +01:00
2021-09-02 21:38:56 +02:00
2021-10-07 16:51:57 +02:00
2021-11-21 13:44:12 +01:00
2021-09-08 15:32:35 -07:00
2021-09-15 09:22:35 -06:00