From: Edward Cree <ecree@amd.com>
To: Harishankar Vishwanathan <harishankar.vishwanathan@gmail.com>,
ast@kernel.org
Cc: harishankar.vishwanathan@rutgers.edu, paul@isovalent.com,
Matan Shachnai <m.shachnai@rutgers.edu>,
Srinivas Narayana <srinivas.narayana@rutgers.edu>,
Santosh Nagarakatte <santosh.nagarakatte@rutgers.edu>,
Daniel Borkmann <daniel@iogearbox.net>,
John Fastabend <john.fastabend@gmail.com>,
Andrii Nakryiko <andrii@kernel.org>,
Martin KaFai Lau <martin.lau@linux.dev>,
Eduard Zingerman <eddyz87@gmail.com>, Song Liu <song@kernel.org>,
Yonghong Song <yonghong.song@linux.dev>,
KP Singh <kpsingh@kernel.org>,
Stanislav Fomichev <sdf@google.com>, Hao Luo <haoluo@google.com>,
Jiri Olsa <jolsa@kernel.org>,
"David S. Miller" <davem@davemloft.net>,
bpf@vger.kernel.org, linux-kernel@vger.kernel.org,
Edward Cree <ecree.xilinx@gmail.com>
Subject: Re: [PATCH v2 bpf-next] bpf: Fix latent unsoundness in and/or/xor value tracking
Date: Wed, 3 Apr 2024 14:25:44 +0100 [thread overview]
Message-ID: <77f5c5ed-881e-c9a8-cfdb-200c322fb55d@amd.com> (raw)
In-Reply-To: <20240402212039.51815-1-harishankar.vishwanathan@gmail.com>
On 4/2/24 22:20, Harishankar Vishwanathan wrote:
> Previous works [1, 2] have discovered and reported this issue. Our tool
> Agni [2, 3] consideres it a false positive. This is because, during the
> verification of the abstract operator scalar_min_max_and(), Agni restricts
> its inputs to those passing through reg_bounds_sync(). This mimics
> real-world verifier behavior, as reg_bounds_sync() is invariably executed
> at the tail of every abstract operator. Therefore, such behavior is
> unlikely in an actual verifier execution.
>
> However, it is still unsound for an abstract operator to set signed bounds
> such that smin_value > smax_value. This patch fixes it, making the abstract
> operator sound for all (well-formed) inputs.
Just to check I'm understanding correctly: you're saying that the existing
code has an undocumented precondition, that's currently maintained by the
callers, and your patch removes the precondition in case a future patch
(or cosmic rays?) makes a call without satisfying it?
Or is it in principle possible (just "unlikely") for a program to induce
the current verifier to call scalar_min_max_foo() on a register that
hasn't been through reg_bounds_sync()?
If the former, I think Fixes: is inappropriate here as there is no need to
backport this change to stable kernels, although I agree the change is
worth making in -next.
> It is worth noting that we can update the signed bounds using the unsigned
> bounds whenever the unsigned bounds do not cross the sign boundary (not
> just when the input signed bounds are positive, as was the case
> previously). This patch does exactly that
Commit message could also make clearer that the new code considers whether
the *output* ubounds cross sign, rather than looking at the input bounds
as the previous code did. At first I was confused as to why XOR didn't
need special handling (since -ve xor -ve is +ve).
> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> index fcb62300f407..a7404a7d690f 100644
> --- a/kernel/bpf/verifier.c
> +++ b/kernel/bpf/verifier.c
> @@ -13326,23 +13326,21 @@ static void scalar32_min_max_and(struct bpf_reg_state *dst_reg,
> return;
> }
>
> - /* We get our minimum from the var_off, since that's inherently
> + /* We get our minimum from the var32_off, since that's inherently
> * bitwise. Our maximum is the minimum of the operands' maxima.
> */
This change, adjusting a comment to match the existing code, should probably
be in a separate patch.
> @@ -13395,23 +13391,21 @@ static void scalar32_min_max_or(struct bpf_reg_state *dst_reg,
> return;
> }
>
> - /* We get our maximum from the var_off, and our minimum is the
> - * maximum of the operands' minima
> + /* We get our maximum from the var32_off, and our minimum is the
> + * maximum of the operands' minima.
> */
Same here.
Apart from that,
Acked-by: Edward Cree <ecree.xilinx@gmail.com>
next prev parent reply other threads:[~2024-04-03 13:25 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-02 21:20 [PATCH v2 bpf-next] bpf: Fix latent unsoundness in and/or/xor value tracking Harishankar Vishwanathan
2024-04-03 8:39 ` Daniel Borkmann
2024-04-04 3:05 ` Harishankar Vishwanathan
2024-04-03 13:25 ` Edward Cree [this message]
2024-04-04 2:40 ` Harishankar Vishwanathan
2024-04-09 13:16 ` Shung-Hsi Yu
2024-04-09 17:17 ` Edward Cree
2024-04-10 11:43 ` Shung-Hsi Yu
2024-04-13 0:05 ` Harishankar Vishwanathan
2024-04-15 4:11 ` Shung-Hsi Yu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=77f5c5ed-881e-c9a8-cfdb-200c322fb55d@amd.com \
--to=ecree@amd.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=davem@davemloft.net \
--cc=ecree.xilinx@gmail.com \
--cc=eddyz87@gmail.com \
--cc=haoluo@google.com \
--cc=harishankar.vishwanathan@gmail.com \
--cc=harishankar.vishwanathan@rutgers.edu \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=m.shachnai@rutgers.edu \
--cc=martin.lau@linux.dev \
--cc=paul@isovalent.com \
--cc=santosh.nagarakatte@rutgers.edu \
--cc=sdf@google.com \
--cc=song@kernel.org \
--cc=srinivas.narayana@rutgers.edu \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox