Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3922238imm; Mon, 8 Oct 2018 11:44:14 -0700 (PDT) X-Google-Smtp-Source: ACcGV62taKsT5rhNi7NQ4+aDJCTn2Z/AmIgoZU1QEaJvN0XIv9inPWrxnplNwoagkyj2VPHaWt6Y X-Received: by 2002:a62:1655:: with SMTP id 82-v6mr26103736pfw.11.1539024254498; Mon, 08 Oct 2018 11:44:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539024254; cv=none; d=google.com; s=arc-20160816; b=BQrvFvwWuh2LAt7R5xgyaniAwRT+QFJ9EBDX88KBdMLJVruN2zvFfwoLxrek2aq2us IXSLahHOZ0hrLUpsqKNfT3Amz3hkKQH0QQbLF2Ds7PtTDuFsPlHRXc6jit8Q4aEATrWU yJYY1GOEfP9CWRgMFuB0/RyG0/C0WjaY6AsRENxatDgKBP8pVxZLYbdarqduVjV2xxZt STLK0B/7QQWu+zDZBNzdcnmKJGc99usOIKJOqe1NJG7OGrrFlLED3K9YxXv9BhOir74W ox5ATdij1EPFz3gwp1a+LcD3itr2Xi4F/Sa/8IM2mishyLZtAX2P87ilckYs7VtsS0pU da7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vp6r09N6RnGhXOR70T866egWddoGzYEvWnFd7BpzM+c=; b=KPTsE2o88TTJmG2aPTWlyZx7U8ppMtVcJsovGfbBf1U5yaWuIIxHAtah/aK1HVeSTf wyqbX6T0OPQqzMkjL6hw0FTyvChM2le+s7ONFU8XgQsKr9Sg1F/fxBc58JHBnH8kSL4b CZkdvK/C2iqTpN+XNOwJQOMjcr7FBrmnqm3OlqyYTzFztGyojlne6gfOECw1haHnCr3k 3errmepufOJIT7RDC1Lpw+ykYy/zf5lyQgxwmEQjB+rpU3FIo5jjOhN3mNSH4l4DBcUO dTZ7ODsNDUXA71HRTsDlH07aIA8ZxbD2VFlq0LXxqlQgQMWXJtimpX6d9r6PytbPoBFr K7OQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MQMgKHEZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z11-v6si18015127pgf.66.2018.10.08.11.43.59; Mon, 08 Oct 2018 11:44:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MQMgKHEZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730297AbeJIBzn (ORCPT + 99 others); Mon, 8 Oct 2018 21:55:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:43382 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729556AbeJIBzn (ORCPT ); Mon, 8 Oct 2018 21:55:43 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 333C8214C4; Mon, 8 Oct 2018 18:42:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539024158; bh=1dBZIBCUtDfktUIKqCpmXO819N6eZW3f8PBUFiFuUiI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MQMgKHEZh9fJAEeTIEkJddKkKcGUyQK5Gvg+fwjhCynWHp8dCdRqpm5dCW64bewAr 4V3OtvI4q5FNcXV40Ehk1YDbKqU80dcYEVryp3VkZuzjLIuDCXTZbj5hxkX2+frpsA /mTPRI6eVpRNBOtn1tp8AMuRqkyLIun/2RUjAqEA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Daniel Borkmann , Jann Horn Subject: [PATCH 4.14 41/94] bpf: 32-bit RSH verification must truncate input before the ALU op Date: Mon, 8 Oct 2018 20:31:22 +0200 Message-Id: <20181008175606.946168478@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20181008175605.067676667@linuxfoundation.org> References: <20181008175605.067676667@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jann Horn commit b799207e1e1816b09e7a5920fbb2d5fcf6edd681 upstream. When I wrote commit 468f6eafa6c4 ("bpf: fix 32-bit ALU op verification"), I assumed that, in order to emulate 64-bit arithmetic with 32-bit logic, it is sufficient to just truncate the output to 32 bits; and so I just moved the register size coercion that used to be at the start of the function to the end of the function. That assumption is true for almost every op, but not for 32-bit right shifts, because those can propagate information towards the least significant bit. Fix it by always truncating inputs for 32-bit ops to 32 bits. Also get rid of the coerce_reg_to_size() after the ALU op, since that has no effect. Fixes: 468f6eafa6c4 ("bpf: fix 32-bit ALU op verification") Acked-by: Daniel Borkmann Signed-off-by: Jann Horn Signed-off-by: Daniel Borkmann Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/verifier.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -2076,6 +2076,15 @@ static int adjust_scalar_min_max_vals(st u64 umin_val, umax_val; u64 insn_bitness = (BPF_CLASS(insn->code) == BPF_ALU64) ? 64 : 32; + if (insn_bitness == 32) { + /* Relevant for 32-bit RSH: Information can propagate towards + * LSB, so it isn't sufficient to only truncate the output to + * 32 bits. + */ + coerce_reg_to_size(dst_reg, 4); + coerce_reg_to_size(&src_reg, 4); + } + smin_val = src_reg.smin_value; smax_val = src_reg.smax_value; umin_val = src_reg.umin_value; @@ -2295,7 +2304,6 @@ static int adjust_scalar_min_max_vals(st if (BPF_CLASS(insn->code) != BPF_ALU64) { /* 32-bit ALU ops are (32,32)->32 */ coerce_reg_to_size(dst_reg, 4); - coerce_reg_to_size(&src_reg, 4); } __reg_deduce_bounds(dst_reg);