Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp3742647iob; Tue, 17 May 2022 06:29:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzxZgLuBLV0auuHvH13SrXgJxM8YxrRBYcJqZ5qdd+PNMbMTnxjqad5wczxRnF9S8dTmvjH X-Received: by 2002:a17:906:44b:b0:6f8:d325:bb84 with SMTP id e11-20020a170906044b00b006f8d325bb84mr20200254eja.174.1652794146551; Tue, 17 May 2022 06:29:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652794146; cv=none; d=google.com; s=arc-20160816; b=W5JZ1u85sUZ6L+R11u0BIQlNs7eer/CE+p+hvnoi7e1EKyzm8sGObknddpZBVqI7KJ j0tDlgmPBElsRZrP2pNF+7ruRQTUrJyWcEUeJezyuVACu/8y//JdW82j1nSpgP19gJGS xYi6LB6m5q+vwq8ZCiCh3hGF4AK/FMGGZx1tOOIyX+u68gnmQuHNKT/e6LLUXhjFNLAT HyAwJDrHegTcGwFBxmyFZtiNb09Rzb2QJSl4kiXOUSiYeVj9Jik9LIV3W+QQklOnTxQU BYl6h6ZYVtCGa+D1ee8FiRImBff7p+PKfUzdX5kDYhYJVVIaVuRTxl3Cko+HSLVkGSEm bKOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=yvfLNgzj0LlML7YO1Uk64PllzBEDEnVgEw1ErIJEf1c=; b=cfTuynwz512kytffPb8K2LFLzZ2ibzGpI0FNuznrYg/sejSSqbkEbgtnTQoZViiKNp S4Jtux6RdrwSLvcm3WPCL1SbohPQCE74vjYnBhQdY729ikDK7qGPGROej2uvP+2GFEM1 wv9dYNQg+mmd1IQVHOatuTBmI3jGNNwFSqy3spYVnmyDkA3zt9SPtb4SiU26dSYTkXlE /7rcPMmmXlauPpn2H2J1fUnBO4GoPNFV1FdhC8WgQ/8dDBJgcPRKNQ4wP/A/g0o1mOVe Pyh/XTahOIc5hzsGld3OkxcXvBh/nx8W0GzlNDVLkGluScJUyHaW2jDOYNpGtFU7/bIV llJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=fNItWEes; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id do4-20020a170906c10400b006e8618a4c75si306127ejc.97.2022.05.17.06.28.38; Tue, 17 May 2022 06:29:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=fNItWEes; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233600AbiEQBOa (ORCPT + 99 others); Mon, 16 May 2022 21:14:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236359AbiEQBOP (ORCPT ); Mon, 16 May 2022 21:14:15 -0400 Received: from mail-pg1-x52f.google.com (mail-pg1-x52f.google.com [IPv6:2607:f8b0:4864:20::52f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 62EB741984; Mon, 16 May 2022 18:14:14 -0700 (PDT) Received: by mail-pg1-x52f.google.com with SMTP id 202so15624060pgc.9; Mon, 16 May 2022 18:14:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=yvfLNgzj0LlML7YO1Uk64PllzBEDEnVgEw1ErIJEf1c=; b=fNItWEesTtzgODmxS5UzL83e0LdGMRcZUHKoHxfdsqWlRDPMw4VjeO7/83Q6yA+AjJ xfogqJxIzSLw/84O91UkEZGLrMFafY6nqi31d+06pn8t367x1pg4yt9jWbutGlUrk8s5 UvjE/W0kEXSZsKM4KW07CPKGjPu1cZA02MJ12uMppQKHNF7DCAPtXBss2Y+OzaoLVPHE uwvr/6+FHE2ttqKrv7PhiirbSCKa8HaVPqbDbWFQzssUbW3juphOV71pChMR4JGxxKQf xWvy5SBA3Jvt6LR/tQ2cFvWjS9blMa97lAB5Zs8Z/apyTbzb0s8sVYV7HWN+WYj5ix13 WdpQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=yvfLNgzj0LlML7YO1Uk64PllzBEDEnVgEw1ErIJEf1c=; b=JOd3uMUxKoB8qOWj0Jm/eYx/1nG6egLKZZz0myVNWk4W6wSN+KTmCNvURZj6I8JLg5 ppozharNJ6xXetks+A19hbV+XPRXM76cQXFK0NGemJNYrVoZBlDhGGeQLGYPJ6YqZDJy NtWjskK/WOVp/3/jGojB+JVN9kSxi4Ewetra0XNCjMCUWqrfqAeb0He7pXVZrHnR+23p K8u0hp/CG6K+3j+H4yw7OOXlF3AKs8MACjWPpxFKBFaRB2BgUWWaF2bqtNWu1Lkxqdm9 Dib0Hpi2L21v2ryr5COCXgGLcdP+kwJ/zGw7S5EdI/uSgD/21m1cgaGtjVbVAREgKOBu FiYQ== X-Gm-Message-State: AOAM530cjjg9pQQ35C6yLpSTqCFCcYoEhZQAdSPR5utqBkYI3lHAvsek 2z9M0Ja4+BCmyVd1Dd1lkiA= X-Received: by 2002:a63:9553:0:b0:3c6:25b2:9525 with SMTP id t19-20020a639553000000b003c625b29525mr17669892pgn.294.1652750053728; Mon, 16 May 2022 18:14:13 -0700 (PDT) Received: from MBP-98dd607d3435.dhcp.thefacebook.com ([2620:10d:c090:400::4:3651]) by smtp.gmail.com with ESMTPSA id z11-20020a1709027e8b00b0016144a84c31sm5556207pla.119.2022.05.16.18.14.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 May 2022 18:14:13 -0700 (PDT) Date: Mon, 16 May 2022 18:14:09 -0700 From: Alexei Starovoitov To: Eugene Syromiatnikov Cc: Jiri Olsa , Masami Hiramatsu , Steven Rostedt , Ingo Molnar , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, Shuah Khan , linux-kselftest@vger.kernel.org Subject: Re: [PATCH bpf 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach Message-ID: <20220517011409.qexxrowf6b2ticid@MBP-98dd607d3435.dhcp.thefacebook.com> References: <20220516182708.GA29437@asgard.redhat.com> <20220516224934.GA5013@asgard.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220516224934.GA5013@asgard.redhat.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 17, 2022 at 12:49:34AM +0200, Eugene Syromiatnikov wrote: > On Mon, May 16, 2022 at 11:34:45PM +0200, Jiri Olsa wrote: > > On Mon, May 16, 2022 at 08:27:08PM +0200, Eugene Syromiatnikov wrote: > > > + if (check_mul_overflow(cnt, sizeof(*syms), &size)) > > > + return -EOVERFLOW; > > > > there was an update already: > > > > 0236fec57a15 bpf: Resolve symbols with ftrace_lookup_symbols for kprobe multi link > > > > so this won't apply anymore, could you please rebase on top of the latest bpf-next/master? > > The issue that this specific check has to go in 4.18, as it covers > possible out-of-bounds write, I'm not sure how to handle it, have > a branch where it is merged manually? As Jiri said, please use bpf-next.