Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2753656pxj; Sun, 6 Jun 2021 12:51:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxukGmFoWD+X7eemGEX4wBRX7eAL5NiaoJzzjKSlAhAtZFRYCJf+ZuX6ZSAenxnRJmOmyEU X-Received: by 2002:a17:906:3845:: with SMTP id w5mr14531870ejc.466.1623009083569; Sun, 06 Jun 2021 12:51:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623009083; cv=none; d=google.com; s=arc-20160816; b=Sy/6ozeSEKxPHXINeC0QBBovV74ZE0L1b72kNf1EoeBWlRvUEuJtmvDrRn0cCg0CuR DCg5V2RkPjEYCjteXIHRtuvYFH81n1ctJa40fpz/S7t+JoYmveufPqE2bbXxPFZo2CXS DTxS87lbdBpLuSsG4jvxzm3c0vyXo49KhxfVdKEYaAsvBsPBi17VW/wrRp8VaBFeq3HW lka25d7p686jnKRhFGLoEAyxAI5p1AIGtW0bp9ikrfNnRjAfRaKroKptbdMTdCI8N/Bz wteTDFqa554PJk1yM9cgMpUJ8lGb1ZaaFQ+Jqa9Y2jv16ZQhQKdi15SkFU66b/9WXBQ0 YjbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:date:references:in-reply-to:message-id :from:to:cc:dkim-signature; bh=OIpSXB3BhBqM7WG4kTgHsq1B5qQdsWQ0yzQoTr+6Icc=; b=ZE7dUIITaE6jU4B9KRgLpigHxF/VX1AMJ9jOKcafxNgl4qaw1Yir5/2/wi/ol8jK8C Z1n5he455iat/9pXifTdOKhONuUFptqeiwCVqTi1Jx7PFtJUQ7L9x9c8LMx70WhVcbHa 82nzFfwvCNgWCIRBuiJFy2VEWrL93jIs27Tf+njMiMroqrdza4ay/XBMy0+CF0eXe2hL 0wI/Cy4ofr7kEit1K2UIruD0p4GbbWWnWKKcQ1t1cZ1oOVgOFVu9wlzEJL78JZfRz8vR eL2hfCJhMU7/ZqTrBKcMAeJqOnCEDxN+CuzIJSOQ5AgWI11x4teYIqarPHmQ5XFKeMIC QZng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=u1Z0c6gZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a10si10451547ejg.385.2021.06.06.12.51.00; Sun, 06 Jun 2021 12:51:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=u1Z0c6gZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230081AbhFFTur (ORCPT + 99 others); Sun, 6 Jun 2021 15:50:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34140 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229573AbhFFTuo (ORCPT ); Sun, 6 Jun 2021 15:50:44 -0400 Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0C5FFC061766; Sun, 6 Jun 2021 12:48:04 -0700 (PDT) Received: by mail-wm1-x32a.google.com with SMTP id 3-20020a05600c0243b029019f2f9b2b8aso8734550wmj.2; Sun, 06 Jun 2021 12:48:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:to:from:message-id:in-reply-to:references:date:subject; bh=OIpSXB3BhBqM7WG4kTgHsq1B5qQdsWQ0yzQoTr+6Icc=; b=u1Z0c6gZnxM0mXRr2jatp7zUminq/g73Z87QEkezM8GZIEeXrVscLVTx5jfuQzgmNN 3Li1uZebQVTMAleal6lxq8ORPrqj091DFJiP2TgEF08Kk4efHc573ng7cP+PYGBPsorJ ZIJjRfDVHoc3VVToVsIV5rRc4/SfjpBNFDLHO21IBTwL9UZIZwF+GJcfL+WG93cj2VJa QxHpqWCWtTCCZnLUMMHYM5+s3HBNof3EJZG7dTfDrkad2gzUJzGE9OEf8oSE0xjFuMnu w3/gatfleH5VmNZ02BP8Pq4EJBRuA5T6yzbSrKm6QGpMqqm7xrjIIbGmGOH1KpRbpTAT Tpsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:to:from:message-id:in-reply-to:references :date:subject; bh=OIpSXB3BhBqM7WG4kTgHsq1B5qQdsWQ0yzQoTr+6Icc=; b=hTETlIMo5XdsT2R7Z4exNeEF6i5UroudaI+cj8lZ72z3DKWfQMOnLW+UUj8WQ2a3pd VNk+ot6usmgDIowI2mrzUh99zM9qAnFC3kaW5r06OIjxky5I4EcW7EoSaPOGULUEV1CB NULVzfF2lp6We4AKnF2TSm2C/Nixv1m5JLv6od/Fo2ypvQc6ca23w0FnHOcctc9lkUz4 cv/yjOwwGn1N5ByvXH0WCzj6uV3fZpj3WFNQGsT1mN7bJG7G2UDFZ8HaCUix/ijxnMFP AYKksjQ0cioDIKakBAPW+6ncztiW2USUEv59pWO+q1v0O/vBEs3yTYad7/nnRMS/BJ39 76JQ== X-Gm-Message-State: AOAM5339P1dkFCeQeWDOl9fDl+IntTymb8J7Mfsgjxi1sjmli1Kmql0M s5zhjc/8gwffAY/OphVRlpY= X-Received: by 2002:a05:600c:3789:: with SMTP id o9mr13854219wmr.78.1623008882702; Sun, 06 Jun 2021 12:48:02 -0700 (PDT) Received: from localhost ([185.199.80.151]) by smtp.gmail.com with ESMTPSA id n8sm11662286wmi.16.2021.06.06.12.48.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 06 Jun 2021 12:48:02 -0700 (PDT) Cc: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com, andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, davem@davemloft.net, hawk@kernel.org, john.fastabend@gmail.com, kafai@fb.com, kpsingh@kernel.org, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, songliubraving@fb.com, syzkaller-bugs@googlegroups.com, nathan@kernel.org, ndesaulniers@google.com, clang-built-linux@googlegroups.com, linux-kernel-mentees@lists.linuxfoundation.org, skhan@linuxfoundation.org, gregkh@linuxfoundation.org To: yhs@fb.com, alexei.starovoitov@gmail.com From: "Kurt Manucredo" Message-ID: <10175-15986-curtm@phaethon> In-Reply-To: References: <000000000000c2987605be907e41@google.com> <20210602212726.7-1-fuzzybritches0@gmail.com> <87609-531187-curtm@phaethon> <6a392b66-6f26-4532-d25f-6b09770ce366@fb.com> Date: Sun, 06 Jun 2021 21:44:32 +0200 Subject: Re: [PATCH v4] bpf: core: fix shift-out-of-bounds in ___bpf_prog_run Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 5 Jun 2021 14:39:57 -0700, Yonghong Song wrote: > > > > On 6/5/21 12:10 PM, Alexei Starovoitov wrote: > > On Sat, Jun 5, 2021 at 10:55 AM Yonghong Song wrote: > >> > >> > >> > >> On 6/5/21 8:01 AM, Kurt Manucredo wrote: > >>> Syzbot detects a shift-out-of-bounds in ___bpf_prog_run() > >>> kernel/bpf/core.c:1414:2. > >> > >> This is not enough. We need more information on why this happens > >> so we can judge whether the patch indeed fixed the issue. > >> > >>> > >>> I propose: In adjust_scalar_min_max_vals() move boundary check up to avoid > >>> missing them and return with error when detected. > >>> > >>> Reported-and-tested-by: syzbot+bed360704c521841c85d@syzkaller.appspotmail.com > >>> Signed-off-by: Kurt Manucredo > >>> --- > >>> > >>> https://syzkaller.appspot.com/bug?id=edb51be4c9a320186328893287bb30d5eed09231 > >>> > >>> Changelog: > >>> ---------- > >>> v4 - Fix shift-out-of-bounds in adjust_scalar_min_max_vals. > >>> Fix commit message. > >>> v3 - Make it clearer what the fix is for. > >>> v2 - Fix shift-out-of-bounds in ___bpf_prog_run() by adding boundary > >>> check in check_alu_op() in verifier.c. > >>> v1 - Fix shift-out-of-bounds in ___bpf_prog_run() by adding boundary > >>> check in ___bpf_prog_run(). > >>> > >>> thanks > >>> > >>> kind regards > >>> > >>> Kurt > >>> > >>> kernel/bpf/verifier.c | 30 +++++++++--------------------- > >>> 1 file changed, 9 insertions(+), 21 deletions(-) > >>> > >>> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c > >>> index 94ba5163d4c5..ed0eecf20de5 100644 > >>> --- a/kernel/bpf/verifier.c > >>> +++ b/kernel/bpf/verifier.c > >>> @@ -7510,6 +7510,15 @@ static int adjust_scalar_min_max_vals(struct bpf_verifier_env *env, > >>> u32_min_val = src_reg.u32_min_value; > >>> u32_max_val = src_reg.u32_max_value; > >>> > >>> + if ((opcode == BPF_LSH || opcode == BPF_RSH || opcode == BPF_ARSH) && > >>> + umax_val >= insn_bitness) { > >>> + /* Shifts greater than 31 or 63 are undefined. > >>> + * This includes shifts by a negative number. > >>> + */ > >>> + verbose(env, "invalid shift %lldn", umax_val); > >>> + return -EINVAL; > >>> + } > >> > >> I think your fix is good. I would like to move after > > > > I suspect such change will break valid programs that do shift by register. > > Oh yes, you are correct. We should guard it with src_known. > But this should be extremely rare with explicit shifting amount being > greater than 31/64 and if it is the case, the compiler will has a > warning. > > > > >> the following code though: > >> > >> if (!src_known && > >> opcode != BPF_ADD && opcode != BPF_SUB && opcode != BPF_AND) { > >> __mark_reg_unknown(env, dst_reg); > >> return 0; > >> } > >> > >>> + > >>> if (alu32) { > >>> src_known = tnum_subreg_is_const(src_reg.var_off); > >>> if ((src_known && > >>> @@ -7592,39 +7601,18 @@ static int adjust_scalar_min_max_vals(struct bpf_verifier_env *env, > >>> scalar_min_max_xor(dst_reg, &src_reg); > >>> break; > >>> case BPF_LSH: > >>> - if (umax_val >= insn_bitness) { > >>> - /* Shifts greater than 31 or 63 are undefined. > >>> - * This includes shifts by a negative number. > >>> - */ > >>> - mark_reg_unknown(env, regs, insn->dst_reg); > >>> - break; > >>> - } > >> > >> I think this is what happens. For the above case, we simply > >> marks the dst reg as unknown and didn't fail verification. > >> So later on at runtime, the shift optimization will have wrong > >> shift value (> 31/64). Please correct me if this is not right > >> analysis. As I mentioned in the early please write detailed > >> analysis in commit log. > > > > The large shift is not wrong. It's just undefined. > > syzbot has to ignore such cases. > > Agree. This makes sense. Thanks for your input. If you find I should look closer into this bug just let me know. I'd love to help. If not it's fine, too. :-) kind regards, Kurt Manucredo