Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754166AbbK3N6D (ORCPT ); Mon, 30 Nov 2015 08:58:03 -0500 Received: from mail-wm0-f49.google.com ([74.125.82.49]:36331 "EHLO mail-wm0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752067AbbK3N6B (ORCPT ); Mon, 30 Nov 2015 08:58:01 -0500 MIME-Version: 1.0 In-Reply-To: <565C549C.5080408@iogearbox.net> References: <20151130005934.GA95228@ast-mbp.thefacebook.com> <565C549C.5080408@iogearbox.net> From: Dmitry Vyukov Date: Mon, 30 Nov 2015 14:57:40 +0100 Message-ID: Subject: Re: [PATCH net] bpf: fix allocation warnings in bpf maps and integer overflow To: syzkaller Cc: Alexei Starovoitov , David Miller , Alexei Starovoitov , netdev , LKML , Kostya Serebryany , Alexander Potapenko , Eric Dumazet , Sasha Levin Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2413 Lines: 74 On Mon, Nov 30, 2015 at 2:52 PM, Daniel Borkmann wrote: > On 11/30/2015 01:59 AM, Alexei Starovoitov wrote: > [...] >> >> For large map->value_size the user space can trigger memory allocation >> warnings like: > > [...] > >> To avoid never succeeding kmalloc with order >= MAX_ORDER check that >> elem->value_size and computed elem_size are within limits for both hash >> and >> array type maps. > > [...] > >> Large value_size can cause integer overflows in elem_size and map.pages >> formulas, so check for that as well. > > [...] > >> diff --git a/kernel/bpf/arraymap.c b/kernel/bpf/arraymap.c >> index 3f4c99e06c6b..b1e53b79c586 100644 >> --- a/kernel/bpf/arraymap.c >> +++ b/kernel/bpf/arraymap.c >> @@ -28,11 +28,17 @@ static struct bpf_map *array_map_alloc(union bpf_attr >> *attr) >> attr->value_size == 0) >> return ERR_PTR(-EINVAL); >> >> + if (attr->value_size >= 1 << (KMALLOC_SHIFT_MAX - 1)) >> + /* if value_size is bigger, the user space won't be able >> to >> + * access the elements. >> + */ >> + return ERR_PTR(-E2BIG); >> + > > > Bit confused, given that in array map, we try kzalloc() with __GFP_NOWARN > already > and if that fails, we fall back to vzalloc(), it shouldn't trigger memory > allocation > warnings here ... > > Then, integer overflow in elem_size with round_up(attr->value_size, 8) could > only > result in 0, which is already tested below. > >> elem_size = round_up(attr->value_size, 8); >> >> /* check round_up into zero and u32 overflow */ >> if (elem_size == 0 || >> - attr->max_entries > (U32_MAX - sizeof(*array)) / elem_size) >> + attr->max_entries > (U32_MAX - PAGE_SIZE - sizeof(*array)) / >> elem_size) >> return ERR_PTR(-ENOMEM); > > > ... and this change seems to be needed for the integer overflow in > map.pages? > > So if the first check above intends to check for some size overflow (?), how > is it > then related to KMALLOC_SHIFT_MAX? kamlloc produces a WARNING if you try to allocate more than it ever possibly can (KMALLOC_SHIFT_MAX). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/