Received: by 2002:ac8:6214:0:b0:429:955e:b7c6 with SMTP id ks20csp4449314qtb; Tue, 16 Jan 2024 12:44:05 -0800 (PST) X-Google-Smtp-Source: AGHT+IEww+4Lf6JkHiQjmV4ZLTEEHoR7oEXtbPHavc28gPawlHVHByRrYE7kD+d71UDeBzrK+YPQ X-Received: by 2002:a05:6358:5490:b0:175:c18d:d89b with SMTP id v16-20020a056358549000b00175c18dd89bmr4970713rwe.45.1705437845611; Tue, 16 Jan 2024 12:44:05 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705437845; cv=pass; d=google.com; s=arc-20160816; b=05ocffmYQL/cd/0NyS/o3rI4woOmt4MYlZvR1Xlv3RVB5QtdkTwTXOFsm3IkUp20au 580XuZoK+cg+R+6hwF/MrYxYAzk2KoVrIhN2ILzej0XOaSw261T1Fr5jIO4dZ/vtbAxJ CCaiIt8UlRwbotZ+SxXjpnUhhXyWbRD4j0kahoYCnW/yeCRGNqfJHIX4uVmdvFLJWE3/ VGXwfF+jXVq1PAGooSYzQZKh/QJcu24bbZoFZlddHxwDOq/uKdrRyhPeIV/hxy+5OLSY XiM69Ip3Okm3WhxENe6lrSS5xgJHD1s/X5B7APiABaM2wSjlompqOLynQgwi2vfPyuYI +X5Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=NrTn5dZSgMsdipLxslGlvg18ECILvjtiwrB2o+5kKio=; fh=TjZUXfYN9t4A90aiSuop8p0bGTxbHYDJlIY2kbvPjIU=; b=ThpGo06oUNnXD4vBnKRyZtGW+OREC9iQs9zLF6jq0E7FQy/PyJNABv4oMmod0mMlvB k13zPzdHCL9cd+Iyz3hyCzVqSikgePMH1Gi6pYdM1cmrbH5fYaJHHmWhUCrmHOnJr/AX 9mVMJfHIkWGmTSAKDCcv1qh72/rigPn5K3GmaJ+EATkQNn67esA7R6gg10Hg2Xur//zD OBUtDexM/RGC02XIueUvxmVJ+0rSylIFmVfERr3Xgf88f1VV0PZnL9fX2pRPYTiHkYAl r4eecushHRWUL9pDBQwDdGYkPKRKZSBkPvImzze6XeEyXh7vj8VBK3m8MkX2822EAPaX TqBQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=i5aSTlMK; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-27960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27960-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 10-20020a63164a000000b005ce0b38a6dbsi12211563pgw.580.2024.01.16.12.44.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 12:44:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-27960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=i5aSTlMK; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-27960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27960-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 440732887F6 for ; Tue, 16 Jan 2024 20:44:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 12D35131E23; Tue, 16 Jan 2024 19:51:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="i5aSTlMK" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2CF4B13174A; Tue, 16 Jan 2024 19:51:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705434693; cv=none; b=B04o5fZ8NLssGGPbFAxAcQch8x+qWJyYDOHCHqbTrvA2w1SyEJlKXdLQvwQt2H0WbQ/XRfkPQq8DyfMJ2pitXULLjOW3zf/dUhiqsvVvoU21YJx0UItVKAM7eYcbxmKRrtTXqem6++tcWxqt7q2xFF+i8zpwFcdpM9jPKQGRfS4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705434693; c=relaxed/simple; bh=TTk20jZmQR+Qo4f0i1DU4BI8bCHVQUMajW/4Fs2I1cU=; h=Received:DKIM-Signature:From:To:Cc:Subject:Date:Message-ID: X-Mailer:In-Reply-To:References:MIME-Version:X-stable: X-Patchwork-Hint:X-stable-base:Content-Transfer-Encoding; b=noerQ0u259pnlvukpi9oiMhAtlnUSMQPWhGSlJ7qqehrLo3EYer/i1yyJrFL3hvE+hKJZCBt75De68xWa9Rlyl2KKISiUg+n2YoRfYlGQ7zpztfuFJID7GfGK4SmNgcSywBXKVjUr1RVRXhPCAdb//axodapnGs9m+RGEm7wkhU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=i5aSTlMK; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id A0990C43390; Tue, 16 Jan 2024 19:51:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705434691; bh=TTk20jZmQR+Qo4f0i1DU4BI8bCHVQUMajW/4Fs2I1cU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=i5aSTlMKX3gpT3dVp3bXpxZ9og+o2kkXYslKB+qSfIPueu3ao1yJixtqLTBKbarhV 7gMN3mW0kYwmcps8neFmqA564q/BIHsl9j1HE5ls4Bt7GKcdr3lh+eNTYN4Zjcwv0C U++x+itvxbIogl8NFmakOsnN620gJE62D7zQ42lZEROF38qWSxuEshT4UqsejuqZFp QIXhXUjppVDgx1MvuciO54GadNofXv9lcF1KexODn7Dcrqm1RrUGZLwdrmirP7jbzZ gLK7ruD/iVb49KuyuVE90NsudYyLKg6ANcZsJH/Iv0jpZoqItK9H370d3EO+hUBfaF D36gbn9y3emAw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Andrei Matei , Andrii Nakryiko , Andrii Nakryiko , Sasha Levin , ast@kernel.org, daniel@iogearbox.net, bpf@vger.kernel.org Subject: [PATCH AUTOSEL 6.6 050/104] bpf: Guard stack limits against 32bit overflow Date: Tue, 16 Jan 2024 14:46:16 -0500 Message-ID: <20240116194908.253437-50-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240116194908.253437-1-sashal@kernel.org> References: <20240116194908.253437-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.6.12 Content-Transfer-Encoding: 8bit From: Andrei Matei [ Upstream commit 1d38a9ee81570c4bd61f557832dead4d6f816760 ] This patch promotes the arithmetic around checking stack bounds to be done in the 64-bit domain, instead of the current 32bit. The arithmetic implies adding together a 64-bit register with a int offset. The register was checked to be below 1<<29 when it was variable, but not when it was fixed. The offset either comes from an instruction (in which case it is 16 bit), from another register (in which case the caller checked it to be below 1<<29 [1]), or from the size of an argument to a kfunc (in which case it can be a u32 [2]). Between the register being inconsistently checked to be below 1<<29, and the offset being up to an u32, it appears that we were open to overflowing the `int`s which were currently used for arithmetic. [1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498 [2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904 Reported-by: Andrii Nakryiko Signed-off-by: Andrei Matei Signed-off-by: Andrii Nakryiko Acked-by: Andrii Nakryiko Link: https://lore.kernel.org/bpf/20231207041150.229139-4-andreimatei1@gmail.com Signed-off-by: Sasha Levin --- kernel/bpf/verifier.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 824531d4c262..43e952eb8374 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -6371,7 +6371,7 @@ static int check_ptr_to_map_access(struct bpf_verifier_env *env, * The minimum valid offset is -MAX_BPF_STACK for writes, and * -state->allocated_stack for reads. */ -static int check_stack_slot_within_bounds(int off, +static int check_stack_slot_within_bounds(s64 off, struct bpf_func_state *state, enum bpf_access_type t) { @@ -6400,7 +6400,7 @@ static int check_stack_access_within_bounds( struct bpf_reg_state *regs = cur_regs(env); struct bpf_reg_state *reg = regs + regno; struct bpf_func_state *state = func(env, reg); - int min_off, max_off; + s64 min_off, max_off; int err; char *err_extra; @@ -6413,7 +6413,7 @@ static int check_stack_access_within_bounds( err_extra = " write to"; if (tnum_is_const(reg->var_off)) { - min_off = reg->var_off.value + off; + min_off = (s64)reg->var_off.value + off; if (access_size > 0) max_off = min_off + access_size - 1; else -- 2.43.0