Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3715481pxb; Mon, 24 Jan 2022 16:09:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJyoIaqSqG/gy0CrkSQ3U4YG/R7j66Jcy4DUuDPIf4T7UBI3C0UKLztHHlBKeXk4rjwZ6uid X-Received: by 2002:a63:8c06:: with SMTP id m6mr13374198pgd.498.1643069353101; Mon, 24 Jan 2022 16:09:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643069353; cv=none; d=google.com; s=arc-20160816; b=timCcymV3UpsSPCtyOSxM4mc3v56H/d3tjvsnqm3NMHaI8CTdyURfTJUx61LC20hbG GxbsAlzK679Wg5BlIUqbUZNIZqg1xN2+uCueguMXfFuK7DBesgn22x/MtCpUQqe+a/48 //4oT3zG466vYUWfyr/RdL9CfvXKouFjWtxb3ST6ybAwhAyJfHtVKFf/hB8mtRRIPnBI nhJ2ozf0oUBdkjlzq+zhwgEgl4itzDTj4Flr64+ptb19R2ZZBd3XBvTaQMpp3tiwr2lQ sHcsZAOY38JeEHnbf5l5KmuMslcS3KRxTg7a3zM227f18EAqIp368irb+v4kr9oFPpJd LQfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fq8dl+A0GNGv6Rb1NERFKWoDEDcz89E+krhs22Q07o4=; b=ocHKxG7mR3M7MzVKxq/DkFbLUDLc8B4asy4VhGQHfjjwU0V5IITqPl89BWBmFdEjkK yELv/h2sq8KhuYh8Egr/aZznK+CNMdmbODDlzM27MyjeMi6Szq/JYeWbaxaemwtnuT3r RWW4Yor0CSyRbAohM1LwIrBMtaI8DP0Htw2xHhx+BwUJVA2D/oMyWLm5Zzb14TNxw/HX fKCUntV18iY9TOQBGqWIhdU5Eh7Jv747ekz35EGw38q6CvmmS+STldB8CwFzwwk8dL/+ LfQ6PLG9mGcFqxpUYZp0ghJ6HKa6ISSmIg3L2D432n0YaSH8uEUbnqwD3uiXUh3ECPN8 0UKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TlTs+cbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f4si7662035pgc.600.2022.01.24.16.09.00; Mon, 24 Jan 2022 16:09:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TlTs+cbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2369369AbiAYABh (ORCPT + 99 others); Mon, 24 Jan 2022 19:01:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50088 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1582577AbiAXXSL (ORCPT ); Mon, 24 Jan 2022 18:18:11 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F57DC07E2B6; Mon, 24 Jan 2022 11:47:49 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 2921AB811FB; Mon, 24 Jan 2022 19:47:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DB6CCC340E5; Mon, 24 Jan 2022 19:47:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643053666; bh=NIojz0mwTHuakUmqbFqSQLDvgevWrG2IYU8Sb4U4LNI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TlTs+cbkx0l4wm+GjDh3NlYKU/RiGbYxErmGbmAiIify5E8oTrJXNSuUvPFgJJpkp EPlTYYUI2XiOKxPuuG6pVDOmT2gOjJB27WzSxvIhFVGWSpSez5xIxMxWOUagjXjN2i HZ1uPpSIj0JuIGrRM+rj+yuGQwOvh5lpW6uwp9Fg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hou Tao , Alexei Starovoitov , Yonghong Song , Martin KaFai Lau , Sasha Levin Subject: [PATCH 5.10 137/563] bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) Date: Mon, 24 Jan 2022 19:38:22 +0100 Message-Id: <20220124184029.137867989@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hou Tao [ Upstream commit 866de407444398bc8140ea70de1dba5f91cc34ac ] BPF_LOG_KERNEL is only used internally, so disallow bpf_btf_load() to set log level as BPF_LOG_KERNEL. The same checking has already been done in bpf_check(), so factor out a helper to check the validity of log attributes and use it in both places. Fixes: 8580ac9404f6 ("bpf: Process in-kernel BTF") Signed-off-by: Hou Tao Signed-off-by: Alexei Starovoitov Acked-by: Yonghong Song Acked-by: Martin KaFai Lau Link: https://lore.kernel.org/bpf/20211203053001.740945-1-houtao1@huawei.com Signed-off-by: Sasha Levin --- include/linux/bpf_verifier.h | 7 +++++++ kernel/bpf/btf.c | 3 +-- kernel/bpf/verifier.c | 6 +++--- 3 files changed, 11 insertions(+), 5 deletions(-) diff --git a/include/linux/bpf_verifier.h b/include/linux/bpf_verifier.h index 6e330ff2f28df..391bc1480dfb1 100644 --- a/include/linux/bpf_verifier.h +++ b/include/linux/bpf_verifier.h @@ -367,6 +367,13 @@ static inline bool bpf_verifier_log_needed(const struct bpf_verifier_log *log) log->level == BPF_LOG_KERNEL); } +static inline bool +bpf_verifier_log_attr_valid(const struct bpf_verifier_log *log) +{ + return log->len_total >= 128 && log->len_total <= UINT_MAX >> 2 && + log->level && log->ubuf && !(log->level & ~BPF_LOG_MASK); +} + #define BPF_MAX_SUBPROGS 256 struct bpf_subprog_info { diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 72534a6f4b96e..dc497eaf22663 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -4135,8 +4135,7 @@ static struct btf *btf_parse(void __user *btf_data, u32 btf_data_size, log->len_total = log_size; /* log attributes have to be sane */ - if (log->len_total < 128 || log->len_total > UINT_MAX >> 2 || - !log->level || !log->ubuf) { + if (!bpf_verifier_log_attr_valid(log)) { err = -EINVAL; goto errout; } diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index b43c9de34a2c2..c623c3e549210 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -12349,11 +12349,11 @@ int bpf_check(struct bpf_prog **prog, union bpf_attr *attr, log->ubuf = (char __user *) (unsigned long) attr->log_buf; log->len_total = attr->log_size; - ret = -EINVAL; /* log attributes have to be sane */ - if (log->len_total < 128 || log->len_total > UINT_MAX >> 2 || - !log->level || !log->ubuf || log->level & ~BPF_LOG_MASK) + if (!bpf_verifier_log_attr_valid(log)) { + ret = -EINVAL; goto err_unlock; + } } if (IS_ERR(btf_vmlinux)) { -- 2.34.1