Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4524001pxv; Tue, 6 Jul 2021 03:05:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxw0BF29yF7re0/TQde3dyqqM4ijSSQ6uS/EAaw0TIsFe6wHAPiWVnIquywWElvBM+Vjvne X-Received: by 2002:a17:907:3e09:: with SMTP id hp9mr17920299ejc.37.1625565900802; Tue, 06 Jul 2021 03:05:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625565900; cv=none; d=google.com; s=arc-20160816; b=y4oMe4sZFKDmb/CYdIhCkRRa38l0WAAdXSETTcP+0WNfsLRmaNJp9DKlXUCynb+sul tgrTbw/gPfnbmK6phTlI4pjfKE1dpgCnQKx417CaSlvL28o7vyJetkKbwnENza7hRVxe x8CClcoIMOgVdtHRYBCxI+7qFHRg35iFKoFjKpiwbDU7P6plYy77TkWBVoSH4tRwKENy i76iwplObcE1d7QLSZPRv5Du9NmHrmP5mIlYotQ0qmSDQRah5jIM2onaCswJqseXwrDC nhAYYmtDUp+iw87iUAjCEOKsD38jD6u2WrhCEhfBRK6ArWyAfil0OWycRSBpND4nNMZN QRww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=mmT9/Plt3KpRcE4WuequCwl7b2MN5HYYyX0hmzN/2Xk=; b=MwG7KrsqXE1w15NHz1apZnKM874h7p0Q/q1cOwRaHmaE4IgpO83RX6T0r67j8XnUP8 PpB2f6c+8pr3rWeQpzIr8OQjXUmlliX/W1sCM+iB4pMYyCi8Tp6SDoDO4VxaOFBpiNCb S8nrd6bMUbkk6dlPNNgJWG7xFqBa5GlXnejiN9z0PdkXvk8PcdF4N4KgA/oFsWOJV+nf NqkIwMkoIlf3IN/X9Il2n+LvnZIRD2qmIsfapZdY+JKOJUwZm6xaMTfurXS3pvBoj1zc VnP9REhlGrij2CVKeTWqb4kvHwXpkM351mvzsjv9mo2PTfEnAgslDMA95cPl6lBVKrr2 nE5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h19si14326608edr.540.2021.07.06.03.04.37; Tue, 06 Jul 2021 03:05:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231218AbhGFKDi (ORCPT + 99 others); Tue, 6 Jul 2021 06:03:38 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:37218 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231181AbhGFKDh (ORCPT ); Tue, 6 Jul 2021 06:03:37 -0400 Received: from localhost (mailhub3.si.c-s.fr [192.168.12.233]) by localhost (Postfix) with ESMTP id 4GJyk209BMzBBw2; Tue, 6 Jul 2021 12:00:58 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qHKQQz_Am4dH; Tue, 6 Jul 2021 12:00:57 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 4GJyk16G08zBBv0; Tue, 6 Jul 2021 12:00:57 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 76A2E8B79C; Tue, 6 Jul 2021 12:00:56 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id JB5RtjTJp_qu; Tue, 6 Jul 2021 12:00:56 +0200 (CEST) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 48C198B794; Tue, 6 Jul 2021 12:00:51 +0200 (CEST) Subject: Re: [PATCH 4/4] bpf powerpc: Add addr > TASK_SIZE_MAX explicit check To: Ravi Bangoria , naveen.n.rao@linux.ibm.com, mpe@ellerman.id.au, ast@kernel.org, daniel@iogearbox.net Cc: songliubraving@fb.com, netdev@vger.kernel.org, john.fastabend@gmail.com, andrii@kernel.org, kpsingh@kernel.org, paulus@samba.org, sandipan@linux.ibm.com, yhs@fb.com, bpf@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kafai@fb.com, linux-kernel@vger.kernel.org References: <20210706073211.349889-1-ravi.bangoria@linux.ibm.com> <20210706073211.349889-5-ravi.bangoria@linux.ibm.com> From: Christophe Leroy Message-ID: <74f55f12-c7da-a06d-c3a5-6869b907e3f6@csgroup.eu> Date: Tue, 6 Jul 2021 12:00:50 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210706073211.349889-5-ravi.bangoria@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 06/07/2021 à 09:32, Ravi Bangoria a écrit : > On PowerPC with KUAP enabled, any kernel code which wants to > access userspace needs to be surrounded by disable-enable KUAP. > But that is not happening for BPF_PROBE_MEM load instruction. > So, when BPF program tries to access invalid userspace address, > page-fault handler considers it as bad KUAP fault: > > Kernel attempted to read user page (d0000000) - exploit attempt? (uid: 0) > > Considering the fact that PTR_TO_BTF_ID (which uses BPF_PROBE_MEM > mode) could either be a valid kernel pointer or NULL but should > never be a pointer to userspace address, execute BPF_PROBE_MEM load > only if addr > TASK_SIZE_MAX, otherwise set dst_reg=0 and move on. > > This will catch NULL, valid or invalid userspace pointers. Only bad > kernel pointer will be handled by BPF exception table. > > [Alexei suggested for x86] > Suggested-by: Alexei Starovoitov > Signed-off-by: Ravi Bangoria > --- > arch/powerpc/net/bpf_jit_comp64.c | 38 +++++++++++++++++++++++++++++++ > 1 file changed, 38 insertions(+) > > diff --git a/arch/powerpc/net/bpf_jit_comp64.c b/arch/powerpc/net/bpf_jit_comp64.c > index 1884c6dca89a..46becae76210 100644 > --- a/arch/powerpc/net/bpf_jit_comp64.c > +++ b/arch/powerpc/net/bpf_jit_comp64.c > @@ -753,6 +753,14 @@ int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, struct codegen_context * > /* dst = *(u8 *)(ul) (src + off) */ > case BPF_LDX | BPF_MEM | BPF_B: > case BPF_LDX | BPF_PROBE_MEM | BPF_B: > + if (BPF_MODE(code) == BPF_PROBE_MEM) { > + EMIT(PPC_RAW_ADDI(b2p[TMP_REG_1], src_reg, off)); > + PPC_LI64(b2p[TMP_REG_2], TASK_SIZE_MAX); > + EMIT(PPC_RAW_CMPLD(b2p[TMP_REG_1], b2p[TMP_REG_2])); > + PPC_BCC(COND_GT, (ctx->idx + 4) * 4); > + EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); Prefered way to clear a register is to do 'li reg, 0' > + PPC_JMP((ctx->idx + 2) * 4); > + } > EMIT(PPC_RAW_LBZ(dst_reg, src_reg, off)); > if (insn_is_zext(&insn[i + 1])) > addrs[++i] = ctx->idx * 4; > @@ -763,6 +771,14 @@ int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, struct codegen_context * > /* dst = *(u16 *)(ul) (src + off) */ > case BPF_LDX | BPF_MEM | BPF_H: > case BPF_LDX | BPF_PROBE_MEM | BPF_H: > + if (BPF_MODE(code) == BPF_PROBE_MEM) { > + EMIT(PPC_RAW_ADDI(b2p[TMP_REG_1], src_reg, off)); > + PPC_LI64(b2p[TMP_REG_2], TASK_SIZE_MAX); > + EMIT(PPC_RAW_CMPLD(b2p[TMP_REG_1], b2p[TMP_REG_2])); > + PPC_BCC(COND_GT, (ctx->idx + 4) * 4); > + EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); > + PPC_JMP((ctx->idx + 2) * 4); > + } That code seems strictly identical to the previous one and the next one. Can you refactor in a function ? > EMIT(PPC_RAW_LHZ(dst_reg, src_reg, off)); > if (insn_is_zext(&insn[i + 1])) > addrs[++i] = ctx->idx * 4; > @@ -773,6 +789,14 @@ int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, struct codegen_context * > /* dst = *(u32 *)(ul) (src + off) */ > case BPF_LDX | BPF_MEM | BPF_W: > case BPF_LDX | BPF_PROBE_MEM | BPF_W: > + if (BPF_MODE(code) == BPF_PROBE_MEM) { > + EMIT(PPC_RAW_ADDI(b2p[TMP_REG_1], src_reg, off)); > + PPC_LI64(b2p[TMP_REG_2], TASK_SIZE_MAX); > + EMIT(PPC_RAW_CMPLD(b2p[TMP_REG_1], b2p[TMP_REG_2])); > + PPC_BCC(COND_GT, (ctx->idx + 4) * 4); > + EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); > + PPC_JMP((ctx->idx + 2) * 4); > + } > EMIT(PPC_RAW_LWZ(dst_reg, src_reg, off)); > if (insn_is_zext(&insn[i + 1])) > addrs[++i] = ctx->idx * 4; > @@ -783,6 +807,20 @@ int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, struct codegen_context * > /* dst = *(u64 *)(ul) (src + off) */ > case BPF_LDX | BPF_MEM | BPF_DW: > case BPF_LDX | BPF_PROBE_MEM | BPF_DW: > + if (BPF_MODE(code) == BPF_PROBE_MEM) { > + EMIT(PPC_RAW_ADDI(b2p[TMP_REG_1], src_reg, off)); > + PPC_LI64(b2p[TMP_REG_2], TASK_SIZE_MAX); > + EMIT(PPC_RAW_CMPLD(b2p[TMP_REG_1], b2p[TMP_REG_2])); > + if (off % 4) That test is worth a comment. And I'd prefer if (off & 3) { PPC_BCC(COND_GT, (ctx->idx + 5) * 4); EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); PPC_JMP((ctx->idx + 3) * 4); } else { PPC_BCC(COND_GT, (ctx->idx + 4) * 4); EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); PPC_JMP((ctx->idx + 2) * 4); } > + PPC_BCC(COND_GT, (ctx->idx + 5) * 4); > + else > + PPC_BCC(COND_GT, (ctx->idx + 4) * 4); > + EMIT(PPC_RAW_XOR(dst_reg, dst_reg, dst_reg)); Use PPC_RAW_LI(dst_reg, 0); > + if (off % 4) > + PPC_JMP((ctx->idx + 3) * 4); > + else > + PPC_JMP((ctx->idx + 2) * 4); > + } > PPC_BPF_LL(dst_reg, src_reg, off); > ret = add_extable_entry(fp, image, pass, code, ctx, dst_reg); > if (ret) >