Description
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Enable exception fixup for specific ADE subcode This patch allows the LoongArch BPF JIT to handle recoverable memory access errors generated by BPF_PROBE_MEM* instructions. When a BPF program performs memory access operations, the instructions it executes may trigger ADEM exceptions. The kernel’s built-in BPF exception table mechanism (EX_TYPE_BPF) will generate corresponding exception fixup entries in the JIT compilation phase; however, the architecture-specific trap handling function needs to proactively call the common fixup routine to achieve exception recovery. do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs, ensure safe execution. Relevant test cases: illegal address access tests in module_attach and subprogs_extable of selftests/bpf.
Product status
dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c (git) before 73ede654d9daa2ee41bdd17bc62946fc5a0258cb
dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c (git) before c49a28068363f3dca439aa5fe4d3b1f8159809fe
dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c (git) before c2ed4f71e9288f21d5c53ff790270758e60fa5f9
dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c (git) before 9bdc1ab5e4ce6f066119018d8f69631a46f9c5a0
6.2
Any version before 6.2
6.6.124 (semver)
6.12.70 (semver)
6.18.10 (semver)
6.19 (original_commit_for_fix)
References
git.kernel.org/...c/73ede654d9daa2ee41bdd17bc62946fc5a0258cb
git.kernel.org/...c/c49a28068363f3dca439aa5fe4d3b1f8159809fe
git.kernel.org/...c/c2ed4f71e9288f21d5c53ff790270758e60fa5f9
git.kernel.org/...c/9bdc1ab5e4ce6f066119018d8f69631a46f9c5a0