From: Anne Macedo <annemacedo@linux.microsoft.com>
To: Andrii Nakryiko <andrii.nakryiko@gmail.com>,
Paul Moore <paul@paul-moore.com>
Cc: John Fastabend <john.fastabend@gmail.com>,
bpf@vger.kernel.org, Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
Martin KaFai Lau <martin.lau@linux.dev>,
Song Liu <song@kernel.org>, Yonghong Song <yhs@fb.com>,
KP Singh <kpsingh@kernel.org>,
Stanislav Fomichev <sdf@google.com>, Hao Luo <haoluo@google.com>,
Jiri Olsa <jolsa@kernel.org>,
Isabella Basso <isabbasso@riseup.net>
Subject: Re: [PATCH] libbpf: add validation to BTF's variable type ID
Date: Thu, 6 Oct 2022 14:01:56 -0300 [thread overview]
Message-ID: <658ad9b2-9ee6-39ac-782d-23a1d7be8aba@linux.microsoft.com> (raw)
In-Reply-To: <CAEf4BzZnLFgzaPWeaH2h3dqxS4thEHQUv6FtZbpffxs6iGcWKw@mail.gmail.com>
On 05/10/22 19:42, Andrii Nakryiko wrote:
> On Mon, Oct 3, 2022 at 2:26 PM Paul Moore <paul@paul-moore.com> wrote:
>>
>> On Fri, Sep 30, 2022 at 6:39 PM Andrii Nakryiko
>> <andrii.nakryiko@gmail.com> wrote:
>>> On Fri, Sep 30, 2022 at 6:00 AM Anne Macedo
>>> <annemacedo@linux.microsoft.com> wrote:
>>>>
>>>> On 29/09/22 23:32, John Fastabend wrote:
>>>>> Anne Macedo wrote:
>>>>>> If BTF is corrupted, a SEGV may occur due to a null pointer dereference on
>>>>>> bpf_object__init_user_btf_map.
>>>>>>
>>>>>> This patch adds a validation that checks whether the DATASEC's variable
>>>>>> type ID is null. If so, it raises a warning.
>>>>>>
>>>>>> Reported by oss-fuzz project [1].
>>>>>>
>>>>>> A similar patch for the same issue exists on [2]. However, the code is
>>>>>> unreachable when using oss-fuzz data.
>>>>>>
>>>>>> [1] https://github.com/libbpf/libbpf/issues/484
>>>>>> [2] https://patchwork.kernel.org/project/netdevbpf/patch/20211103173213.1376990-3-andrii@kernel.org/
>>>>>>
>>>>>> Reviewed-by: Isabella Basso <isabbasso@riseup.net>
>>>>>> Signed-off-by: Anne Macedo <annemacedo@linux.microsoft.com>
>>>>>> ---
>>>>>> tools/lib/bpf/libbpf.c | 4 ++++
>>>>>> 1 file changed, 4 insertions(+)
>>>>>>
>>>>>> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
>>>>>> index 184ce1684dcd..0c88612ab7c4 100644
>>>>>> --- a/tools/lib/bpf/libbpf.c
>>>>>> +++ b/tools/lib/bpf/libbpf.c
>>>>>> @@ -2464,6 +2464,10 @@ static int bpf_object__init_user_btf_map(struct bpf_object *obj,
>>>>>>
>>>>>> vi = btf_var_secinfos(sec) + var_idx;
>>>>>> var = btf__type_by_id(obj->btf, vi->type);
>>>>>> + if (!var || !btf_is_var(var)) {
>>>>>> + pr_warn("map #%d: non-VAR type seen", var_idx);
>>>>>> + return -EINVAL;
>>>>>> + }
>>>>>> var_extra = btf_var(var);
>>>>>> map_name = btf__name_by_offset(obj->btf, var->name_off);
>>>>>>
>>>>>> --
>>>>>> 2.30.2
>>>>>>
>>>>>
>>>>>
>>>>> I don't know abouut this. A quick scan looks like this type_by_id is
>>>>> used lots of places. And seems corrupted BTF could cause faults
>>>>> and confusiuon in other spots as well. I'm not sure its worth making
>>>>> libbpf survive corrupted BTF. OTOH this specific patch looks ok.
>>>>>
>>>>
>>>> I was planning on creating a function to validate BTF for these kinds of
>>>> corruptions, but decided to keep this patch simple. This could be a good
>>>> idea for some future work – moving all of the validations to
>>>> bpf_object__init_btf() or to a helper function.
>>>
>>> This whack-a-mole game of fixing up BTF checks to avoid one specific
>>> corruption case is too burdensome. There is plenty of BTF usage before
>>> the point which you are fixing, so with some other specific corruption
>>> to BTF you can trigger even sooner corruption.
>>>
>>> As I mentioned on Github. I'm not too worried about ossfuzz generating
>>> corrupted BTF because that's not a very realistic scenario. But it
>>> would be nice to add some reasonable validation logic for BTF in
>>> general, so let's better concentrate on that instead of adding these
>>> extra checks.
>>
>> Reading the comments here and on the associated GH issue, it sounds
>> like you would be supportive of this check so long as it was placed in
>> bpf_object__init_btf(), is that correct? Or do you feel this
>> particular check falls outside the scope of "reasonable validation
>> logic"? I'm trying to understand what the best next step would be for
>> this patch ...
>
> I think we should bite the bullet and do BTF validation in libbpf. It
> doesn't have to be as thorough as what kernel does, but validating
> general "structural integrity" of BTF as a first step would make all
> these one-off checks throughout entire libbpf source code unnecessary.
> I.e., we'll need to check things like: no out of range type IDs, no
> out-of-range string offsets, FUNC -> FUNC_PROTO references, DATASEC ->
> VAR | FUNC references, etc, etc. Probably make sure we don't have a
> loop of struct referencing to itself not through pointer, etc. It's a
> bit more upfront work, but it's will make the rest of the code simpler
> and will eliminate a bunch of those fuzzer crashes as well.
>
Thanks for the feedback, I think that sounds like a good plan. I will
work on another patch and I wanted to summarize what I should do.
So basically, I should place the BTF validation on
bpf_object__init_btf(), that should contain validations for:
- out of range type IDs;
- out of range string offsets;
- FUNC -> FUNC_PROTO references;
- DATASEC -> VAR | FUNC references;
- structs referencing themselves;
>>
>> --
>> paul-moore.com
next prev parent reply other threads:[~2022-10-06 17:02 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-29 16:05 [PATCH] libbpf: add validation to BTF's variable type ID Anne Macedo
2022-09-30 2:32 ` John Fastabend
2022-09-30 13:00 ` Anne Macedo
2022-09-30 22:38 ` Andrii Nakryiko
2022-10-03 21:26 ` Paul Moore
2022-10-05 22:42 ` Andrii Nakryiko
2022-10-06 17:01 ` Anne Macedo [this message]
2022-10-06 17:07 ` Andrii Nakryiko
2022-10-06 17:54 ` Anne Macedo
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=658ad9b2-9ee6-39ac-782d-23a1d7be8aba@linux.microsoft.com \
--to=annemacedo@linux.microsoft.com \
--cc=andrii.nakryiko@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=haoluo@google.com \
--cc=isabbasso@riseup.net \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=martin.lau@linux.dev \
--cc=paul@paul-moore.com \
--cc=sdf@google.com \
--cc=song@kernel.org \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox