bpf: misleading spec_v1 check on variable-offset stack read?

From: Luis Gerhorst
Date: Wed Mar 15 2023 - 12:51:41 EST


Hello,

is there any way to introduce variable-offset (stack) pointers without using pointer arithmetic (BPF_ADD/SUB)? If yes, I believe this is a security issue because these can be used in stack writes. If not, I think the patch sent in reply to this mail should be applied. (I was not able to find any indication that the former is the case.)

Best regards,
Luis

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature