All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
@ 2021-05-26 21:40 Kurt Manucredo
  2021-05-27  4:29 ` Greg KH
  0 siblings, 1 reply; 8+ messages in thread
From: Kurt Manucredo @ 2021-05-26 21:40 UTC (permalink / raw)
  To: gregkh; +Cc: linux-kernel-mentees

Fix shift-out-of-bounds in ___bpf_prog_run().

UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
shift exponent 248 is too large for 32-bit type 'unsigned int'
https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231

Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
Signed-off-by: Kurt Manucredo <fuzzybritches0@gmail.com>
---
 kernel/bpf/core.c | 31 +++++++++++++++++++++++++++++--
 1 file changed, 29 insertions(+), 2 deletions(-)

diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c
index 5e31ee9f7512..35cba247c531 100644
--- a/kernel/bpf/core.c
+++ b/kernel/bpf/core.c
@@ -1411,11 +1411,38 @@ static u64 ___bpf_prog_run(u64 *regs, const struct bpf_insn *insn)
 	ALU(SUB,  -)
 	ALU(AND,  &)
 	ALU(OR,   |)
-	ALU(LSH, <<)
-	ALU(RSH, >>)
 	ALU(XOR,  ^)
 	ALU(MUL,  *)
 #undef ALU
+#define ALU(OPCODE, OP)		\
+	ALU64_##OPCODE##_X:		\
+		if (SRC >= 64)		\
+			DST = 0;	\
+		else			\
+			DST = DST OP SRC;	\
+		CONT;			\
+	ALU_##OPCODE##_X:		\
+		if (SRC >= 32)		\
+			DST = 0;	\
+		else			\
+			DST = (u32) DST OP (u32) SRC;	\
+		CONT;			\
+	ALU64_##OPCODE##_K:		\
+		if (IMM >= 64)		\
+			DST = 0;	\
+		else			\
+			DST = DST OP IMM;	\
+		CONT;			\
+	ALU_##OPCODE##_K:		\
+		if (IMM >= 32)		\
+			DST = 0;	\
+		else			\
+			DST = (u32) DST OP (u32) IMM;	\
+		CONT;
+
+	ALU(LSH, <<)
+	ALU(RSH, >>)
+#undef ALU
 	ALU_NEG:
 		DST = (u32) -DST;
 		CONT;
-- 
2.30.2

_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-05-26 21:40 [PATCH] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run Kurt Manucredo
@ 2021-05-27  4:29 ` Greg KH
  2021-06-01 14:33   ` [PATCH v2] " Kurt Manucredo
  0 siblings, 1 reply; 8+ messages in thread
From: Greg KH @ 2021-05-27  4:29 UTC (permalink / raw)
  To: Kurt Manucredo; +Cc: linux-kernel-mentees

On Wed, May 26, 2021 at 11:40:27PM +0200, Kurt Manucredo wrote:
> Fix shift-out-of-bounds in ___bpf_prog_run().
> 
> UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> shift exponent 248 is too large for 32-bit type 'unsigned int'
> https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> 
> Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
> Signed-off-by: Kurt Manucredo <fuzzybritches0@gmail.com>
> ---
>  kernel/bpf/core.c | 31 +++++++++++++++++++++++++++++--
>  1 file changed, 29 insertions(+), 2 deletions(-)
> 
> diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c
> index 5e31ee9f7512..35cba247c531 100644
> --- a/kernel/bpf/core.c
> +++ b/kernel/bpf/core.c
> @@ -1411,11 +1411,38 @@ static u64 ___bpf_prog_run(u64 *regs, const struct bpf_insn *insn)
>  	ALU(SUB,  -)
>  	ALU(AND,  &)
>  	ALU(OR,   |)
> -	ALU(LSH, <<)
> -	ALU(RSH, >>)
>  	ALU(XOR,  ^)
>  	ALU(MUL,  *)
>  #undef ALU
> +#define ALU(OPCODE, OP)		\
> +	ALU64_##OPCODE##_X:		\
> +		if (SRC >= 64)		\
> +			DST = 0;	\
> +		else			\
> +			DST = DST OP SRC;	\
> +		CONT;			\
> +	ALU_##OPCODE##_X:		\
> +		if (SRC >= 32)		\
> +			DST = 0;	\
> +		else			\
> +			DST = (u32) DST OP (u32) SRC;	\
> +		CONT;			\
> +	ALU64_##OPCODE##_K:		\
> +		if (IMM >= 64)		\
> +			DST = 0;	\
> +		else			\
> +			DST = DST OP IMM;	\
> +		CONT;			\
> +	ALU_##OPCODE##_K:		\
> +		if (IMM >= 32)		\
> +			DST = 0;	\
> +		else			\
> +			DST = (u32) DST OP (u32) IMM;	\
> +		CONT;
> +
> +	ALU(LSH, <<)
> +	ALU(RSH, >>)
> +#undef ALU
>  	ALU_NEG:
>  		DST = (u32) -DST;
>  		CONT;
> -- 
> 2.30.2
> 

This looks odd, shouldn't the caller be checked before it gets to this
part of the code?

did syzbot pass its tests with this change?

thanks,

greg k-h
_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-05-27  4:29 ` Greg KH
@ 2021-06-01 14:33   ` Kurt Manucredo
  2021-06-01 15:43     ` Greg KH
  0 siblings, 1 reply; 8+ messages in thread
From: Kurt Manucredo @ 2021-06-01 14:33 UTC (permalink / raw)
  To: gregkh; +Cc: linux-kernel-mentees

Fix shift-out-of-bounds in ___bpf_prog_run().

UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
shift exponent 248 is too large for 32-bit type 'unsigned int'

Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
Signed-off-by: Kurt Manucredo <fuzzybritches0@gmail.com>
---

Changes since last version:
 - fix shift-out-of-bounds in verifier.c check_alu_op()

 kernel/bpf/verifier.c | 22 +++++++++++++++++-----
 1 file changed, 17 insertions(+), 5 deletions(-)

diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 94ba5163d4c5..04e3bf344ecd 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -7880,13 +7880,25 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
 			return -EINVAL;
 		}
 
-		if ((opcode == BPF_LSH || opcode == BPF_RSH ||
-		     opcode == BPF_ARSH) && BPF_SRC(insn->code) == BPF_K) {
+		if (opcode == BPF_LSH || opcode == BPF_RSH ||
+		     opcode == BPF_ARSH) {
 			int size = BPF_CLASS(insn->code) == BPF_ALU64 ? 64 : 32;
 
-			if (insn->imm < 0 || insn->imm >= size) {
-				verbose(env, "invalid shift %d\n", insn->imm);
-				return -EINVAL;
+			if (BPF_SRC(insn->code) == BPF_K) {
+				if (insn->imm < 0 || insn->imm >= size) {
+					verbose(env, "invalid shift %d\n", insn->imm);
+					return -EINVAL;
+				}
+			}
+			if (BPF_SRC(insn->code) == BPF_X) {
+				struct bpf_reg_state *src_reg;
+
+				src_reg = &regs[insn->src_reg];
+				if (src_reg->umax_value >= size) {
+					verbose(env, "invalid shift %lld\n",
+							src_reg->umax_value);
+					return -EINVAL;
+				}
 			}
 		}
 
-- 
2.30.2

_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-06-01 14:33   ` [PATCH v2] " Kurt Manucredo
@ 2021-06-01 15:43     ` Greg KH
  2021-06-01 21:28       ` Kurt Manucredo
  0 siblings, 1 reply; 8+ messages in thread
From: Greg KH @ 2021-06-01 15:43 UTC (permalink / raw)
  To: Kurt Manucredo; +Cc: linux-kernel-mentees

On Tue, Jun 01, 2021 at 04:33:09PM +0200, Kurt Manucredo wrote:
> Fix shift-out-of-bounds in ___bpf_prog_run().

How is this "fixed"?

> 
> UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> shift exponent 248 is too large for 32-bit type 'unsigned int'

What is this from?

Any reason you didn't cc: the bpf maintainers and developers?


> Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com

Does this pass the syzbot testing?

thanks,

greg k-h
_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-06-01 15:43     ` Greg KH
@ 2021-06-01 21:28       ` Kurt Manucredo
  2021-06-02  6:09         ` Greg KH
  0 siblings, 1 reply; 8+ messages in thread
From: Kurt Manucredo @ 2021-06-01 21:28 UTC (permalink / raw)
  To: gregkh; +Cc: linux-kernel-mentees

On Tue, 1 Jun 2021 17:43:24 +0200, Greg KH <gregkh@linuxfoundation.org> wrote:
> 
> On Tue, Jun 01, 2021 at 04:33:09PM +0200, Kurt Manucredo wrote:
> > Fix shift-out-of-bounds in ___bpf_prog_run().
> 
> How is this "fixed"?
> 
Fix shift-out-of-bounds in ___bpf_prog_run() by adding extra boundary
check in check_alu_op() in verifier.c.

> > 
> > UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> > shift exponent 248 is too large for 32-bit type 'unsigned int'
> 
> What is this from?

https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> 
> Any reason you didn't cc: the bpf maintainers and developers?
> 
Yes. I send them to you, the mentees mailing list and Shuah, first, for
review, comment and help. Is this not okay? 

> 
> > Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
> 
> Does this pass the syzbot testing?

Yes, it says 'OK' in the 'Result' column at:
https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
It's the latest from fuzzybritches0@gmail.com.

But at this point I cannot say if this is right. Should I send the next
version to everyone?

thanks and kind regards,

Kurt Manucredo

_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-06-01 21:28       ` Kurt Manucredo
@ 2021-06-02  6:09         ` Greg KH
  2021-06-02  6:36           ` Pavel Skripkin
  0 siblings, 1 reply; 8+ messages in thread
From: Greg KH @ 2021-06-02  6:09 UTC (permalink / raw)
  To: Kurt Manucredo; +Cc: linux-kernel-mentees

On Tue, Jun 01, 2021 at 11:28:00PM +0200, Kurt Manucredo wrote:
> On Tue, 1 Jun 2021 17:43:24 +0200, Greg KH <gregkh@linuxfoundation.org> wrote:
> > 
> > On Tue, Jun 01, 2021 at 04:33:09PM +0200, Kurt Manucredo wrote:
> > > Fix shift-out-of-bounds in ___bpf_prog_run().
> > 
> > How is this "fixed"?
> > 
> Fix shift-out-of-bounds in ___bpf_prog_run() by adding extra boundary
> check in check_alu_op() in verifier.c.

Great, say this in the changelog text.

> > > 
> > > UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> > > shift exponent 248 is too large for 32-bit type 'unsigned int'
> > 
> > What is this from?
> 
> https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231

You should provide this link in the changelog text.

> > Any reason you didn't cc: the bpf maintainers and developers?
> > 
> Yes. I send them to you, the mentees mailing list and Shuah, first, for
> review, comment and help. Is this not okay? 

Ok, didn't know what you were wanting here, you can always ask questions
like this below the --- line of a patch.

> > > Reported-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
> > 
> > Does this pass the syzbot testing?
> 
> Yes, it says 'OK' in the 'Result' column at:
> https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231

You should also say something like "passes the syzbot reproducer test"
in the changelog text as well.

> But at this point I cannot say if this is right. Should I send the next
> version to everyone?

Please do!

thanks,

greg k-h
_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-06-02  6:09         ` Greg KH
@ 2021-06-02  6:36           ` Pavel Skripkin
  2021-06-04 21:15             ` Kurt Manucredo
  0 siblings, 1 reply; 8+ messages in thread
From: Pavel Skripkin @ 2021-06-02  6:36 UTC (permalink / raw)
  To: Greg KH, Kurt Manucredo; +Cc: linux-kernel-mentees

On Wed, 2 Jun 2021 08:09:48 +0200
Greg KH <gregkh@linuxfoundation.org> wrote:

> On Tue, Jun 01, 2021 at 11:28:00PM +0200, Kurt Manucredo wrote:
> > On Tue, 1 Jun 2021 17:43:24 +0200, Greg KH
> > <gregkh@linuxfoundation.org> wrote:
> > > 
> > > On Tue, Jun 01, 2021 at 04:33:09PM +0200, Kurt Manucredo wrote:
> > > > Fix shift-out-of-bounds in ___bpf_prog_run().
> > > 
> > > How is this "fixed"?
> > > 
> > Fix shift-out-of-bounds in ___bpf_prog_run() by adding extra
> > boundary check in check_alu_op() in verifier.c.
> 
> Great, say this in the changelog text.
> 
> > > > 
> > > > UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> > > > shift exponent 248 is too large for 32-bit type 'unsigned int'
> > > 
> > > What is this from?
> > 
> > https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> 
> You should provide this link in the changelog text.
> 
> > > Any reason you didn't cc: the bpf maintainers and developers?
> > > 
> > Yes. I send them to you, the mentees mailing list and Shuah, first,
> > for review, comment and help. Is this not okay? 
> 
> Ok, didn't know what you were wanting here, you can always ask
> questions like this below the --- line of a patch.
> 
> > > > Reported-by:
> > > > syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
> > > 
> > > Does this pass the syzbot testing?
> > 
> > Yes, it says 'OK' in the 'Result' column at:
> > https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> 
> You should also say something like "passes the syzbot reproducer test"
> in the changelog text as well.
> 

Other possible way to tell maintainer, that patch was tested
somehow, is to change Reported-by to Reported-and-tested-by tag received
from syzbot. It might be more nicely :)



With regards,
Pavel Skripkin
_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v2] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run
  2021-06-02  6:36           ` Pavel Skripkin
@ 2021-06-04 21:15             ` Kurt Manucredo
  0 siblings, 0 replies; 8+ messages in thread
From: Kurt Manucredo @ 2021-06-04 21:15 UTC (permalink / raw)
  To: Pavel Skripkin; +Cc: linux-kernel-mentees

On Wed, 2 Jun 2021 09:36:45 +0300, Pavel Skripkin <paskripkin@gmail.com> wrote:
> 
> On Wed, 2 Jun 2021 08:09:48 +0200
> Greg KH <gregkh@linuxfoundation.org> wrote:
> 
> > On Tue, Jun 01, 2021 at 11:28:00PM +0200, Kurt Manucredo wrote:
> > > On Tue, 1 Jun 2021 17:43:24 +0200, Greg KH
> > > <gregkh@linuxfoundation.org> wrote:
> > > > 
> > > > On Tue, Jun 01, 2021 at 04:33:09PM +0200, Kurt Manucredo wrote:
> > > > > Fix shift-out-of-bounds in ___bpf_prog_run().
> > > > 
> > > > How is this "fixed"?
> > > > 
> > > Fix shift-out-of-bounds in ___bpf_prog_run() by adding extra
> > > boundary check in check_alu_op() in verifier.c.
> > 
> > Great, say this in the changelog text.
> > 
> > > > > 
> > > > > UBSAN: shift-out-of-bounds in kernel/bpf/core.c:1414:2
> > > > > shift exponent 248 is too large for 32-bit type 'unsigned int'
> > > > 
> > > > What is this from?
> > > 
> > > https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> > 
> > You should provide this link in the changelog text.
> > 
> > > > Any reason you didn't cc: the bpf maintainers and developers?
> > > > 
> > > Yes. I send them to you, the mentees mailing list and Shuah, first,
> > > for review, comment and help. Is this not okay? 
> > 
> > Ok, didn't know what you were wanting here, you can always ask
> > questions like this below the --- line of a patch.
> > 
> > > > > Reported-by:
> > > > > syzbot+bed360704c521841c85d@syzkaller.appspotmail.com
> > > > 
> > > > Does this pass the syzbot testing?
> > > 
> > > Yes, it says 'OK' in the 'Result' column at:
> > > https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231
> > 
> > You should also say something like "passes the syzbot reproducer test"
> > in the changelog text as well.
> > 
> 
> Other possible way to tell maintainer, that patch was tested
> somehow, is to change Reported-by to Reported-and-tested-by tag received
> from syzbot. It might be more nicely :)
> 

thanks Pavel

kind regards

Kurt Manucredo

_______________________________________________
Linux-kernel-mentees mailing list
Linux-kernel-mentees@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/linux-kernel-mentees

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2021-06-04 21:17 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-05-26 21:40 [PATCH] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run Kurt Manucredo
2021-05-27  4:29 ` Greg KH
2021-06-01 14:33   ` [PATCH v2] " Kurt Manucredo
2021-06-01 15:43     ` Greg KH
2021-06-01 21:28       ` Kurt Manucredo
2021-06-02  6:09         ` Greg KH
2021-06-02  6:36           ` Pavel Skripkin
2021-06-04 21:15             ` Kurt Manucredo

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.