Received: by 10.213.65.68 with SMTP id h4csp1781885imn; Mon, 19 Mar 2018 13:06:44 -0700 (PDT) X-Google-Smtp-Source: AG47ELsYyIFLkCWwrfkoHmahdeN5FdHbW+en/LKhxGmNHnfNPv8elhpAb1Pg8xF1WXPHK9fLytm4 X-Received: by 10.99.7.138 with SMTP id 132mr6564276pgh.45.1521490004382; Mon, 19 Mar 2018 13:06:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521490004; cv=none; d=google.com; s=arc-20160816; b=BDBW/YQFpQykdV25bF1Qhwdsucsud9cNvQuiwAHrVWuIwd7nQsrAbD/JZ7GNmqcJk5 oZRBHLl+IKIcMqHZDwJ7jtTbT21LyDp5El3Y5ym94T/AAozuT9uK2rx22UbUp4awrh6j HpTzYlGJhBCdwPK0buU9oJQjXm78iuDSO1q5w1p54VxyXAfXH7rw5Vbz221dY8SzgwQm lff0IEP20R6vpksS3urW1WxJZa0G/TKPfSqcQ6L++58U4itn/AcC8zCae3Sqnryr9EcN mE4N+Xu1u336RLQseSyuoC2GFm1Xmb/KmossKfK2MJLyruW6Uy1rCapBZioQQHnT/0Td g/KA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=LFUMWEpjhi9szBLCWJos4GQcziqM0QuG5cXCQzQeVgY=; b=IScELVuDCmFN969dB7K/X+103mElsRuXwh1DIpSGthUucA2wCp9Hdkc+oKw+R/Ij0b TmcHIkndEc7QtAmhKWH6fNnlmj29GUPeWb9IsSYyolhzdEdHwr4QvrdD1rBrQSiWLWjm qHYs9vkFdVIiA0g8UosGJgSEzS5Tk/IZsK2oJjtluDfmN3zG6P+0jRgtm6UwCkX3Z82Y AIsExUM8lP9iY8QZw+Ugj45zFWsQHTwOcZQjdkQ02jSqO2fVjsGaXsYuMh56z+AGoO0z Fp/LsNqctZ2rIuJOSLh5X3FyyeeludJpGncEfvP5O0xzMYOjvwgqibX0RTU7XHWoQ7Mg 3eTA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g126si1262pgc.184.2018.03.19.13.06.29; Mon, 19 Mar 2018 13:06:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S971026AbeCSUEw (ORCPT + 99 others); Mon, 19 Mar 2018 16:04:52 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45672 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934862AbeCSSRq (ORCPT ); Mon, 19 Mar 2018 14:17:46 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 2A09C124E; Mon, 19 Mar 2018 18:17:46 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , Jann Horn , Daniel Borkmann Subject: [PATCH 4.4 134/134] bpf: fix incorrect sign extension in check_alu_op() Date: Mon, 19 Mar 2018 19:06:57 +0100 Message-Id: <20180319171908.560879519@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180319171849.024066323@linuxfoundation.org> References: <20180319171849.024066323@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jann Horn commit 95a762e2c8c942780948091f8f2a4f32fce1ac6f upstream. Distinguish between BPF_ALU64|BPF_MOV|BPF_K (load 32-bit immediate, sign-extended to 64-bit) and BPF_ALU|BPF_MOV|BPF_K (load 32-bit immediate, zero-padded to 64-bit); only perform sign extension in the first case. This patch differs from the mainline one because the verifier's internals have changed in the meantime. Mainline tracks register values as 64-bit values; however, 4.4 still stores tracked register values as 32-bit values with sign extension. Therefore, in the case of a 32-bit op with negative immediate, the value can't be tracked; leave the register as UNKNOWN_VALUE (set by the preceding check_reg_arg() call). I have manually tested this patch on top of 4.4.122. For the following BPF bytecode: BPF_MOV64_IMM(BPF_REG_1, 1), BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 1), BPF_EXIT_INSN(), BPF_MOV32_IMM(BPF_REG_1, 1), BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 1), BPF_EXIT_INSN(), BPF_MOV64_IMM(BPF_REG_1, -1), BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, -1, 1), BPF_EXIT_INSN(), BPF_MOV32_IMM(BPF_REG_1, -1), BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, -1, 2), BPF_MOV32_IMM(BPF_REG_0, 42), BPF_EXIT_INSN(), BPF_MOV32_IMM(BPF_REG_0, 43), BPF_EXIT_INSN() Verifier output on 4.4.122 without this patch: 0: (b7) r1 = 1 1: (15) if r1 == 0x1 goto pc+1 3: (b4) (u32) r1 = (u32) 1 4: (15) if r1 == 0x1 goto pc+1 6: (b7) r1 = -1 7: (15) if r1 == 0xffffffff goto pc+1 9: (b4) (u32) r1 = (u32) -1 10: (15) if r1 == 0xffffffff goto pc+2 13: (b4) (u32) r0 = (u32) 43 14: (95) exit Verifier output on 4.4.122+ with this patch: 0: (b7) r1 = 1 1: (15) if r1 == 0x1 goto pc+1 3: (b4) (u32) r1 = (u32) 1 4: (15) if r1 == 0x1 goto pc+1 6: (b7) r1 = -1 7: (15) if r1 == 0xffffffff goto pc+1 9: (b4) (u32) r1 = (u32) -1 10: (15) if r1 == 0xffffffff goto pc+2 R1=inv R10=fp 11: (b4) (u32) r0 = (u32) 42 12: (95) exit from 10 to 13: R1=imm-1 R10=fp 13: (b4) (u32) r0 = (u32) 43 14: (95) exit Signed-off-by: Jann Horn Acked-by: Daniel Borkmann Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/verifier.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -1135,7 +1135,8 @@ static int check_alu_op(struct verifier_ regs[insn->dst_reg].type = UNKNOWN_VALUE; regs[insn->dst_reg].map_ptr = NULL; } - } else { + } else if (BPF_CLASS(insn->code) == BPF_ALU64 || + insn->imm >= 0) { /* case: R = imm * remember the value we stored into this reg */