Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp883646yba; Thu, 18 Apr 2019 11:09:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqxo9xHot5op/3SbPT+iAXC2sKc22rTd2+L4GCtvSSckLdOy9oi7lS9hje/Nhxs8iL39PKjr X-Received: by 2002:a62:5206:: with SMTP id g6mr96958169pfb.227.1555610993088; Thu, 18 Apr 2019 11:09:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555610993; cv=none; d=google.com; s=arc-20160816; b=o0st4rcyp0tAXwaQAyckclOlwJ+Y3xlgRrs524Glh7/VftdIvm+KE52UkWiHm2s/bi D/5/X0HKiMoWBm1zI5unFmSFjEVc6CdCYzhfnLOMq/XWBD4GZlUUtC1bmF0XxAO1tFnO T9wjayTv6Hoe5AinXcDRXq5/N2orFOyzSQAZVPWsqVNEiyyWvY/LR0RuhP9p5QxyQVrv uX49g7GTPUU222gBK7pHsaO23/pM2w6HnOqp3c5orZJDsDXUYJve64f0YTCuyVYLU3fG ll3Ec24dYjQsntpMsPLsjZR8wTw45dPIqBZKHJBLK8vXvSp7DA0VByZt+smhW7ZkgADK Y9iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KEDtwv7opjZ1ETvYmSKtfSPxbBj06BGyS97q8MJVaYo=; b=ceWZpEZDNv2nTmws/CsRTqrf8D1yIA2t1694nbaCW3sc1olQXFPARQ8eWRFAbuPV1r 1jX5+HVvs95SWI5YexaIh7EHg1+yQ3a1f2h0i+ZLQKFwcmeCzrTqQzi9t/VYsN2wYWpl hTpysoKcmWOahCvqM7GJIyPpzcFi0aeb2EaADc2o6LybUuzlLYrjFvEfAXvRJcpWtjv5 ixNNtt5kmwOEONIJPui6Yzhu6IVfC5C/6taNgkHLzAg6jm0YhVrSFQtbq43p9FWbldt6 QgrAzw1ssdn2sJGtUAnv4q2LZXq16NYwLDv475XqZcCfQbfDwBY0v0+fAxFemS/IgdRJ fSDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OZwPWsNB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y29si2579012pgk.120.2019.04.18.11.09.38; Thu, 18 Apr 2019 11:09:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OZwPWsNB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391516AbfDRSGk (ORCPT + 99 others); Thu, 18 Apr 2019 14:06:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:36520 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390497AbfDRSGi (ORCPT ); Thu, 18 Apr 2019 14:06:38 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D4F921871; Thu, 18 Apr 2019 18:06:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610797; bh=6qOpnHsiRkmL3nLfNpnfsuFeCLOVZE817/PeFrqSulE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OZwPWsNBRhU9K/bzKCC3lwqIcPRrlrGgPLvJeXT1ND5NKGkRk6mT99+YgJqWa4Dc4 VTgPAJJDcFePgfSyd8UhkIUGfGWCk1ls4y8PPl5VeAa00/JCF/SOd9sA61dWaVi8Mc Gv1DMegpCJs8icR6H0hu810wwIdssU5lGdCRsOcU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marek Majkowski , Arthur Fabre , Daniel Borkmann , Song Liu , Alexei Starovoitov , Balbir Singh Subject: [PATCH 4.14 88/92] bpf: fix sanitation rewrite in case of non-pointers Date: Thu, 18 Apr 2019 19:57:46 +0200 Message-Id: <20190418160438.189578126@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160430.325165109@linuxfoundation.org> References: <20190418160430.325165109@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Borkmann commit 3612af783cf52c74a031a2f11b82247b2599d3cd upstream. Marek reported that he saw an issue with the below snippet in that timing measurements where off when loaded as unpriv while results were reasonable when loaded as privileged: [...] uint64_t a = bpf_ktime_get_ns(); uint64_t b = bpf_ktime_get_ns(); uint64_t delta = b - a; if ((int64_t)delta > 0) { [...] Turns out there is a bug where a corner case is missing in the fix d3bd7413e0ca ("bpf: fix sanitation of alu op with pointer / scalar type from different paths"), namely fixup_bpf_calls() only checks whether aux has a non-zero alu_state, but it also needs to test for the case of BPF_ALU_NON_POINTER since in both occasions we need to skip the masking rewrite (as there is nothing to mask). Fixes: d3bd7413e0ca ("bpf: fix sanitation of alu op with pointer / scalar type from different paths") Reported-by: Marek Majkowski Reported-by: Arthur Fabre Signed-off-by: Daniel Borkmann Link: https://lore.kernel.org/netdev/CAJPywTJqP34cK20iLM5YmUMz9KXQOdu1-+BZrGMAGgLuBWz7fg@mail.gmail.com/T/ Acked-by: Song Liu Signed-off-by: Alexei Starovoitov Signed-off-by: Balbir Singh Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/verifier.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -4771,7 +4771,8 @@ static int fixup_bpf_calls(struct bpf_ve u32 off_reg; aux = &env->insn_aux_data[i + delta]; - if (!aux->alu_state) + if (!aux->alu_state || + aux->alu_state == BPF_ALU_NON_POINTER) continue; isneg = aux->alu_state & BPF_ALU_NEG_VALUE;