Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3727153pxk; Tue, 29 Sep 2020 04:56:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyuHnRy/MIVRnZa5Xo8B+TSl6XAGCABGrrgZXkHgZcS3Hu8c9AzalxV+fSfQj4O0yVUalIz X-Received: by 2002:a05:6402:17da:: with SMTP id s26mr2814729edy.221.1601380585370; Tue, 29 Sep 2020 04:56:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601380585; cv=none; d=google.com; s=arc-20160816; b=hbcTdGCSEZlM8pV1Y4oDgV2PERjawcSsd10Gov9UPMmpn6WP0ku0Oi6mPvTvzXTjtS 7fpq4CCtE+vC96x0f3ACnxmdAcpp5/BgrO3DRMqLIDB5nDA8neczpt1J42KtIHTR1EHK X8GuwdsYLuXUDQM0Is3YWqz9VbL12KOudNK2Hhz/5M1N2rjwUTZrUlb0Fxyoxp03xEZr feOr5WOnmFAe71e1dIKOlf8kT2o9X7GdIwz8wNwoUXtc8Rz4FZdk6F8nyhNTOHAuld4e 9VkAM+TRUaZFXjKTecfBR/a3wblZ/YEdgMCMLvkstNUyJ+wlrKIEVKxh9icCBER1KC/a /E5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9M5h+UOM4yAAaHAwTpn/048SuboqkaNo4AXWc1LUdsM=; b=JfywOMj5+ktz7SyxKnvf0kl3aymuGSlvnnoLVUJpbhsYZEe0vNeJTZjRYeLxWL6aXa +Lof/Wfbh1TBCixCMH7PjapGAHLECzlH51AI1y4COsQ8jpeMyvYyW6PUr3QaUxjN1xUi I6iROvGjEGv48BqwON3vK/DDQSC0BEfL6lh7A6eWdCF57p5ygalr19/64PVqhUc9uIGg /h4cDVvvAS97gfXZw3qmB38xiqh9nxUXH189YCwD1E1+56klM6XAAPdiJ7s8WYPAKyi5 N9DBU5Ax01qx8rm1Vau8wEx7cGi6qFWku4VzWoLYhnInm6CELp07k00AVKJSKMwQ6ydG /1eg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tf5pU0w5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 39si2716065edr.435.2020.09.29.04.56.02; Tue, 29 Sep 2020 04:56:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tf5pU0w5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731402AbgI2LxG (ORCPT + 99 others); Tue, 29 Sep 2020 07:53:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:48374 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729752AbgI2LrF (ORCPT ); Tue, 29 Sep 2020 07:47:05 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 53FE12075F; Tue, 29 Sep 2020 11:47:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601380024; bh=PjuISOa82blkMWfP52o6yU3VYHCNd9RDj3ZnzSlk5H4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tf5pU0w5//Bt/5EUQSqgHXN/GaY3Il4JLHBEu8ntxYHqIyF+HwuNecek9EuhH89q6 hRaTihmuXG3UbooCbTYBqjoNVkgpHZC6N0RXWfqDzbeWtR/IsEvphIr6oKsL9aNYKB Q5ga7XHF4mD201PU/exQtxa7Uoc4CZApSCXDBhoE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bryce Kahle , Daniel Borkmann , Alexei Starovoitov , Sasha Levin Subject: [PATCH 5.8 34/99] bpf: Fix clobbering of r2 in bpf_gen_ld_abs Date: Tue, 29 Sep 2020 13:01:17 +0200 Message-Id: <20200929105931.408544866@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105929.719230296@linuxfoundation.org> References: <20200929105929.719230296@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Borkmann [ Upstream commit e6a18d36118bea3bf497c9df4d9988b6df120689 ] Bryce reported that he saw the following with: 0: r6 = r1 1: r1 = 12 2: r0 = *(u16 *)skb[r1] The xlated sequence was incorrectly clobbering r2 with pointer value of r6 ... 0: (bf) r6 = r1 1: (b7) r1 = 12 2: (bf) r1 = r6 3: (bf) r2 = r1 4: (85) call bpf_skb_load_helper_16_no_cache#7692160 ... and hence call to the load helper never succeeded given the offset was too high. Fix it by reordering the load of r6 to r1. Other than that the insn has similar calling convention than BPF helpers, that is, r0 - r5 are scratch regs, so nothing else affected after the insn. Fixes: e0cea7ce988c ("bpf: implement ld_abs/ld_ind in native bpf") Reported-by: Bryce Kahle Signed-off-by: Daniel Borkmann Signed-off-by: Alexei Starovoitov Link: https://lore.kernel.org/bpf/cace836e4d07bb63b1a53e49c5dfb238a040c298.1599512096.git.daniel@iogearbox.net Signed-off-by: Sasha Levin --- net/core/filter.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/net/core/filter.c b/net/core/filter.c index d13ea1642b974..0261531d4fda6 100644 --- a/net/core/filter.c +++ b/net/core/filter.c @@ -6998,8 +6998,6 @@ static int bpf_gen_ld_abs(const struct bpf_insn *orig, bool indirect = BPF_MODE(orig->code) == BPF_IND; struct bpf_insn *insn = insn_buf; - /* We're guaranteed here that CTX is in R6. */ - *insn++ = BPF_MOV64_REG(BPF_REG_1, BPF_REG_CTX); if (!indirect) { *insn++ = BPF_MOV64_IMM(BPF_REG_2, orig->imm); } else { @@ -7007,6 +7005,8 @@ static int bpf_gen_ld_abs(const struct bpf_insn *orig, if (orig->imm) *insn++ = BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, orig->imm); } + /* We're guaranteed here that CTX is in R6. */ + *insn++ = BPF_MOV64_REG(BPF_REG_1, BPF_REG_CTX); switch (BPF_SIZE(orig->code)) { case BPF_B: -- 2.25.1