From: Kohei Enju <enjuk@amazon.com>
To: <enjuk@amazon.com>
Cc: <andrii@kernel.org>, <ast@kernel.org>, <bpf@vger.kernel.org>,
<daniel@iogearbox.net>, <eddyz87@gmail.com>, <haoluo@google.com>,
<iii@linux.ibm.com>, <john.fastabend@gmail.com>,
<jolsa@kernel.org>, <kohei.enju@gmail.com>, <kpsingh@kernel.org>,
<kuniyu@amazon.com>, <linux-kernel@vger.kernel.org>,
<martin.lau@linux.dev>, <sdf@fomichev.me>, <song@kernel.org>,
<syzbot+a5964227adc0f904549c@syzkaller.appspotmail.com>,
<yepeilin@google.com>, <yonghong.song@linux.dev>
Subject: Re: [PATCH bpf-next v1] bpf: Fix out-of-bounds read in check_atomic_load/store()
Date: Sat, 15 Mar 2025 21:59:39 +0900 [thread overview]
Message-ID: <20250315130028.92105-1-enjuk@amazon.com> (raw)
In-Reply-To: <20250315082251.32679-1-enjuk@amazon.com>
>> ...
>>> kernel/bpf/verifier.c | 12 ++++++++++++
>>> 1 file changed, 12 insertions(+)
>>>
>>> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
>>> index 3303a3605ee8..6481604ab612 100644
>>> --- a/kernel/bpf/verifier.c
>>> +++ b/kernel/bpf/verifier.c
>>> @@ -7788,6 +7788,12 @@ static int check_atomic_rmw(struct bpf_verifier_env *env,
>>> static int check_atomic_load(struct bpf_verifier_env *env,
>>> struct bpf_insn *insn)
>>> {
>>> + int err;
>>> +
>>> + err = check_reg_arg(env, insn->src_reg, SRC_OP);
>>> + if (err)
>>> + return err;
>>> +
>>
>>I agree with these changes, however, both check_load_mem() and
>>check_store_reg() already do check_reg_arg() first thing.
>>Maybe just swap the atomic_ptr_type_ok() and check_load_mem()?
>
>You're absolutely right. The additional check_reg_arg() introduces some
>redundancy since check_load_mem() and check_store_reg() do that.
IMHO, in this specific case, I believe OOB is caused by invalid register
number in reg_state(), so check_reg_arg() is too much and instead just
checking register number before atomic_ptr_type_ok() is sufficient.
Although it's still somewhat redundant and not a fundamental solution, I
think it would be better than doing whole register checking by
check_reg_arg().
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 3303a3605ee8..48131839ac26 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -7788,6 +7788,11 @@ static int check_atomic_rmw(struct bpf_verifier_env *env,
static int check_atomic_load(struct bpf_verifier_env *env,
struct bpf_insn *insn)
{
+ if (insn->src_reg >= MAX_BPF_REG) {
+ verbose(env, "R%d is invalid\n", insn->src_reg);
+ return -EINVAL;
+ }
+
if (!atomic_ptr_type_ok(env, insn->src_reg, insn)) {
verbose(env, "BPF_ATOMIC loads from R%d %s is not allowed\n",
insn->src_reg,
@@ -7801,6 +7806,11 @@ static int check_atomic_load(struct bpf_verifier_env *env,
static int check_atomic_store(struct bpf_verifier_env *env,
struct bpf_insn *insn)
{
+ if (insn->dst_reg >= MAX_BPF_REG) {
+ verbose(env, "R%d is invalid\n", insn->dst_reg);
+ return -EINVAL;
+ }
+
if (!atomic_ptr_type_ok(env, insn->dst_reg, insn)) {
verbose(env, "BPF_ATOMIC stores into R%d %s is not allowed\n",
insn->dst_reg,
>I've revised the patch to simply swap the order and syzbot didn't trigger
>the issue in this context.
> https://lore.kernel.org/all/20250315055941.10487-2-enjuk@amazon.com/
> ...
Regards,
Kohei
prev parent reply other threads:[~2025-03-15 13:00 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-03-14 19:54 [PATCH bpf-next v1] bpf: Fix out-of-bounds read in check_atomic_load/store() Kohei Enju
2025-03-14 21:08 ` Eduard Zingerman
2025-03-15 8:21 ` Kohei Enju
2025-03-15 12:59 ` Kohei Enju [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250315130028.92105-1-enjuk@amazon.com \
--to=enjuk@amazon.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=eddyz87@gmail.com \
--cc=haoluo@google.com \
--cc=iii@linux.ibm.com \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kohei.enju@gmail.com \
--cc=kpsingh@kernel.org \
--cc=kuniyu@amazon.com \
--cc=linux-kernel@vger.kernel.org \
--cc=martin.lau@linux.dev \
--cc=sdf@fomichev.me \
--cc=song@kernel.org \
--cc=syzbot+a5964227adc0f904549c@syzkaller.appspotmail.com \
--cc=yepeilin@google.com \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox