From: Roberto Sassu <roberto.sassu@huaweicloud.com>
To: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
Martin KaFai Lau <martin.lau@linux.dev>,
Song Liu <song@kernel.org>, Yonghong Song <yhs@fb.com>,
John Fastabend <john.fastabend@gmail.com>,
KP Singh <kpsingh@kernel.org>,
Stanislav Fomichev <sdf@google.com>, Hao Luo <haoluo@google.com>,
Jiri Olsa <jolsa@kernel.org>,
Florent Revest <revest@chromium.org>,
Brendan Jackman <jackmanb@chromium.org>,
Paul Moore <paul@paul-moore.com>,
James Morris <jmorris@namei.org>,
"Serge E . Hallyn" <serge@hallyn.com>, bpf <bpf@vger.kernel.org>,
LSM List <linux-security-module@vger.kernel.org>,
LKML <linux-kernel@vger.kernel.org>,
Roberto Sassu <roberto.sassu@huawei.com>
Subject: Re: [PoC][PATCH] bpf: Call return value check function in the JITed code
Date: Wed, 30 Nov 2022 14:52:38 +0100 [thread overview]
Message-ID: <30f658418386dd55aef5d109a52b7a32c4678648.camel@huaweicloud.com> (raw)
In-Reply-To: <CAADnVQJu7isDCi4+f8s4LfiwcYJbN4kXkvgJ8+ZnsS+QGDVnMw@mail.gmail.com>
On Wed, 2022-11-16 at 09:55 -0800, Alexei Starovoitov wrote:
> On Wed, Nov 16, 2022 at 8:41 AM Roberto Sassu
> <roberto.sassu@huaweicloud.com> wrote:
> > On Wed, 2022-11-16 at 08:16 -0800, Alexei Starovoitov wrote:
> > > On Wed, Nov 16, 2022 at 7:48 AM Roberto Sassu
> > > <roberto.sassu@huaweicloud.com> wrote:
> > > > +static bool is_ret_value_allowed(int ret, u32 ret_flags)
> > > > +{
> > > > + if ((ret < 0 && !(ret_flags & LSM_RET_NEG)) ||
> > > > + (ret == 0 && !(ret_flags & LSM_RET_ZERO)) ||
> > > > + (ret == 1 && !(ret_flags & LSM_RET_ONE)) ||
> > > > + (ret > 1 && !(ret_flags & LSM_RET_GT_ONE)))
> > > > + return false;
> > > > +
> > > > + return true;
> > > > +}
> > > > +
> > > > /* For every LSM hook that allows attachment of BPF programs, declare a nop
> > > > * function where a BPF program can be attached.
> > > > */
> > > > @@ -30,6 +41,15 @@ noinline RET bpf_lsm_##NAME(__VA_ARGS__) \
> > > > #include <linux/lsm_hook_defs.h>
> > > > #undef LSM_HOOK
> > > >
> > > > +#define LSM_HOOK(RET, DEFAULT, RET_FLAGS, NAME, ...) \
> > > > +noinline RET bpf_lsm_##NAME##_ret(int ret) \
> > > > +{ \
> > > > + return is_ret_value_allowed(ret, RET_FLAGS) ? ret : DEFAULT; \
> > > > +}
> > > > +
> > > > +#include <linux/lsm_hook_defs.h>
> > > > +#undef LSM_HOOK
> > > > +
> > >
> > > because lsm hooks is mess of undocumented return values your
> > > "solution" is to add hundreds of noninline functions
> > > and hack the call into them in JITs ?!
> >
> > I revisited the documentation and checked each LSM hook one by one.
> > Hopefully, I completed it correctly, but I would review again (others
> > are also welcome to do it).
> >
> > Not sure if there is a more efficient way. Do you have any idea?
> > Maybe we find a way to use only one check function (by reusing the
> > address of the attachment point?).
> >
> > Regarding the JIT approach, I didn't find a reliable solution for using
> > just the verifier. As I wrote to you, there could be the case where the
> > range can include positive values, despite the possible return values
> > are zero and -EACCES.
>
> Didn't you find that there are only 12 or so odd return cases.
> Maybe refactor some of them to something that the verifier can enforce
> and denylist the rest ?
Ok, went back to trying to enforce the return value on the verifier
side, assuming that for now we consider hooks that return zero or a
negative value.
I wanted to see if at least we are able to enforce that.
The biggest problem is which value of the register I should use, the 64
bit one or the 32 bit one?
We can have a look at test_libbpf_get_fd_by_id_opts. The default flavor
gives:
0000000000000000 <check_access>:
0: b4 00 00 00 00 00 00 00 w0 = 0
1: 79 12 00 00 00 00 00 00 r2 = *(u64 *)(r1 + 0)
2: 18 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 r3 = 0 ll
4: 5d 32 05 00 00 00 00 00 if r2 != r3 goto +5 <LBB0_3>
5: 79 11 08 00 00 00 00 00 r1 = *(u64 *)(r1 + 8)
6: 57 01 00 00 02 00 00 00 r1 &= 2
7: b4 00 00 00 00 00 00 00 w0 = 0
8: 15 01 01 00 00 00 00 00 if r1 == 0 goto +1 <LBB0_3>
9: b4 00 00 00 f3 ff ff ff w0 = -13
smin_value = 0xfffffff3, smax_value = 0xfffffff3,
s32_min_value = 0xfffffff3, s32_max_value = 0xfffffff3,
I think it is because of this, in check_alu_op():
if (BPF_CLASS(insn->code) == BPF_ALU64) {
__mark_reg_known(regs + insn->dst_reg,
insn->imm);
} else {
__mark_reg_known(regs + insn->dst_reg,
(u32)insn->imm);
}
}
So, here you have to use the 32 bit values. But, if you use the
no_alu32 flavor:
0000000000000000 <check_access>:
0: b7 00 00 00 00 00 00 00 r0 = 0
1: 79 12 00 00 00 00 00 00 r2 = *(u64 *)(r1 + 0)
2: 18 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 r3 = 0 ll
4: 5d 32 04 00 00 00 00 00 if r2 != r3 goto +4 <LBB0_2>
5: 79 10 08 00 00 00 00 00 r0 = *(u64 *)(r1 + 8)
6: 67 00 00 00 3e 00 00 00 r0 <<= 62
7: c7 00 00 00 3f 00 00 00 r0 s>>= 63
smin_value = 0xffffffffffffffff, smax_value = 0x0,
s32_min_value = 0x80000000, s32_max_value = 0x7fffffff,
8: 57 00 00 00 f3 ff ff ff r0 &= -13
smin_value = 0xfffffffffffffff3, smax_value = 0x7fffffffffffffff,
s32_min_value = 0x80000000, s32_max_value = 0x7ffffff3,
I would have hoped to see:
smin_value = 0xfffffffffffffff3, smax_value = 0x0,
but it doesn't because of this, in scalar_min_max_and():
if (dst_reg->smin_value < 0 || smin_val < 0) {
/* Lose signed bounds when ANDing negative numbers,
* ain't nobody got time for that.
*/
dst_reg->smin_value = S64_MIN;
dst_reg->smax_value = S64_MAX;
Could we do an AND, if src_reg is known?
And what would be the right register value to use?
Thanks
Roberto
next prev parent reply other threads:[~2022-11-30 13:53 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-15 17:56 [RFC][PATCH 0/4] security: Ensure LSMs return expected values Roberto Sassu
2022-11-15 17:56 ` [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook Roberto Sassu
2022-11-16 2:11 ` Paul Moore
2022-11-16 8:06 ` Roberto Sassu
2022-11-16 19:17 ` KP Singh
2022-11-16 19:27 ` Paul Moore
2022-11-15 17:56 ` [RFC][PATCH 2/4] lsm: Add missing return values doc in lsm_hooks.h and fix formatting Roberto Sassu
2022-11-16 2:23 ` Paul Moore
2022-11-16 8:06 ` Roberto Sassu
2022-11-16 19:26 ` Paul Moore
2022-11-15 17:56 ` [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument Roberto Sassu
2022-11-16 2:27 ` Paul Moore
2022-11-16 8:11 ` Roberto Sassu
2022-11-16 22:04 ` Paul Moore
2022-11-17 5:49 ` Greg KH
2022-11-17 15:31 ` Paul Moore
2022-11-15 17:56 ` [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs Roberto Sassu
2022-11-16 2:35 ` Paul Moore
2022-11-16 14:36 ` Roberto Sassu
2022-11-16 15:47 ` [PoC][PATCH] bpf: Call return value check function in the JITed code Roberto Sassu
2022-11-16 16:16 ` Alexei Starovoitov
2022-11-16 16:41 ` Roberto Sassu
2022-11-16 17:55 ` Alexei Starovoitov
2022-11-16 18:29 ` Casey Schaufler
2022-11-16 19:04 ` KP Singh
2022-11-16 22:40 ` Paul Moore
2022-11-30 13:52 ` Roberto Sassu [this message]
2022-11-16 17:12 ` Casey Schaufler
2022-11-16 19:02 ` KP Singh
2022-11-18 8:44 ` Roberto Sassu
2022-11-21 15:31 ` Roberto Sassu
2022-11-16 22:06 ` [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs Paul Moore
2022-11-15 18:41 ` [RFC][PATCH 0/4] security: Ensure LSMs return expected values Casey Schaufler
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=30f658418386dd55aef5d109a52b7a32c4678648.camel@huaweicloud.com \
--to=roberto.sassu@huaweicloud.com \
--cc=alexei.starovoitov@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=haoluo@google.com \
--cc=jackmanb@chromium.org \
--cc=jmorris@namei.org \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=martin.lau@linux.dev \
--cc=paul@paul-moore.com \
--cc=revest@chromium.org \
--cc=roberto.sassu@huawei.com \
--cc=sdf@google.com \
--cc=serge@hallyn.com \
--cc=song@kernel.org \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).