Files
linux-net/include/uapi/linux
Sargun Dhillon 96ae522795 bpf: Add bpf_probe_write_user BPF helper to be called in tracers
This allows user memory to be written to during the course of a kprobe.
It shouldn't be used to implement any kind of security mechanism
because of TOC-TOU attacks, but rather to debug, divert, and
manipulate execution of semi-cooperative processes.

Although it uses probe_kernel_write, we limit the address space
the probe can write into by checking the space with access_ok.
We do this as opposed to calling copy_to_user directly, in order
to avoid sleeping. In addition we ensure the threads's current fs
/ segment is USER_DS and the thread isn't exiting nor a kernel thread.

Given this feature is meant for experiments, and it has a risk of
crashing the system, and running programs, we print a warning on
when a proglet that attempts to use this helper is installed,
along with the pid and process name.

Signed-off-by: Sargun Dhillon <sargun@sargun.me>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-07-25 18:07:48 -07:00
..
2016-04-03 11:14:01 +01:00
2016-04-19 04:33:15 +09:00
2016-03-15 16:55:16 -07:00
2016-06-27 04:10:41 -04:00
2016-01-20 17:09:18 -08:00
2016-06-08 11:36:02 -07:00
2016-06-30 13:10:49 +02:00
2015-12-14 12:19:37 -06:00
2016-03-10 16:02:52 +07:00
2016-06-18 10:32:28 -07:00
2016-07-15 14:54:27 +09:00
2016-03-22 15:36:02 -07:00
2016-04-12 19:54:58 +01:00
2016-05-11 22:37:54 +02:00
2016-04-25 15:09:10 -04:00
2016-01-12 08:21:18 -07:00
2015-11-23 15:06:38 -05:00
2016-05-17 17:14:21 -06:00
2016-05-08 23:46:14 -04:00
2016-04-26 12:00:48 -04:00
2016-04-04 22:11:20 -04:00
2015-12-18 17:48:51 -08:00
2016-05-20 17:58:30 -07:00
2016-03-11 02:18:53 +02:00
2016-04-30 09:26:55 -07:00
2016-04-23 20:13:25 -04:00