* [PATCH net-next 0/1] ppp: Fix KMSAN uninit-value warning with bpf
@ 2025-02-25 14:40 Jiayuan Chen
2025-02-25 14:40 ` [PATCH net-next 1/1] ppp: Fix KMSAN warning by initializing 2-byte header Jiayuan Chen
0 siblings, 1 reply; 3+ messages in thread
From: Jiayuan Chen @ 2025-02-25 14:40 UTC (permalink / raw)
To: horms, kuba
Cc: bpf, netdev, andrew+netdev, davem, edumazet, pabeni, ricardo,
viro, dmantipov, aleksander.lobakin, linux-ppp, linux-kernel,
mrpre, Jiayuan Chen, Paul Mackerras
Syzbot caught an "KMSAN: uninit-value" warning [1], which is caused by the
ppp driver not initializing a 2-byte header when using socket filters.
Here's a detailed explanation:
The following code can generate a PPP filter BPF program:
'''
struct bpf_program fp;
pcap_t *handle;
handle = pcap_open_dead(DLT_PPP_PPPD, 65535);
pcap_compile(handle, &fp, "ip and outbound", 0, 0);
bpf_dump(&fp, 1);
'''
Its output is:
'''
(000) ldh [2]
(001) jeq #0x21 jt 2 jf 5
(002) ldb [0]
(003) jeq #0x1 jt 4 jf 5
(004) ret #65535
(005) ret #0
'''
wen can find similar code at the following link:
https://github.com/ppp-project/ppp/blob/master/pppd/options.c#L1680
The maintainer of this code repository is also the original maintainer
of the ppp driver.
3. Current problem
The problem is that the skb->data generated by ppp_write() starts from the
'Protocol' field.
But the BPF program skips 2 bytes of data and then reads the 'Protocol'
field to determine if it's an IP packet just like the comment in
'drivers/net/ppp/ppp_generic.c':
/* the filter instructions are constructed assuming
a four-byte PPP header on each packet */
In the current PPP driver implementation, to correctly use the BPF filter
program, a 2-byte header is added, after running the socket filter, it's
restored:
'''
1768 *(u8 *)skb_push(skb, 2) = 1;
1770 bpf_prog_run()
1782 skb_pull(skb, 2);
'''
The issue is that only the first byte indicating direction is initialized,
while the second byte is not initialized. For normal BPF programs
generated by libpcap, uninitialized data won't be used, so it's not a
problem.
However, for carefully crafted BPF programs, such as those generated by
syzkaller [2], which start reading from offset 0, the uninitialized data
will be used and caught by KMSAN.
4. Fix
The fix is simple: initialize the entire 2-byte header.
Cc: Paul Mackerras <paulus@samba.org>
[1] https://syzkaller.appspot.com/bug?extid=853242d9c9917165d791
[2] https://syzkaller.appspot.com/text?tag=ReproC&x=11994913980000
---
v3 -> v4: Use macro instead.
Jiayuan Chen (1):
ppp: Fix KMSAN warning by initializing 2-byte header
drivers/net/ppp/ppp_generic.c | 17 +++++++++++++----
1 file changed, 13 insertions(+), 4 deletions(-)
--
2.47.1
^ permalink raw reply [flat|nested] 3+ messages in thread
* [PATCH net-next 1/1] ppp: Fix KMSAN warning by initializing 2-byte header
2025-02-25 14:40 [PATCH net-next 0/1] ppp: Fix KMSAN uninit-value warning with bpf Jiayuan Chen
@ 2025-02-25 14:40 ` Jiayuan Chen
2025-02-26 2:05 ` Jiayuan Chen
0 siblings, 1 reply; 3+ messages in thread
From: Jiayuan Chen @ 2025-02-25 14:40 UTC (permalink / raw)
To: horms, kuba
Cc: bpf, netdev, andrew+netdev, davem, edumazet, pabeni, ricardo,
viro, dmantipov, aleksander.lobakin, linux-ppp, linux-kernel,
mrpre, Jiayuan Chen, syzbot+853242d9c9917165d791
The PPP driver adds an extra 2-byte header to enable socket filters to run
correctly. However, the driver only initializes the first byte, which
indicates the direction. For normal BPF programs, this is not a problem
since they only read the first byte.
Nevertheless, for carefully crafted BPF programs, if they read the second
byte, this will trigger a KMSAN warning for reading uninitialized data.
Reported-by: syzbot+853242d9c9917165d791@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/bpf/000000000000dea025060d6bc3bc@google.com/
Signed-off-by: Jiayuan Chen <jiayuan.chen@linux.dev>
---
drivers/net/ppp/ppp_generic.c | 17 +++++++++++++----
1 file changed, 13 insertions(+), 4 deletions(-)
diff --git a/drivers/net/ppp/ppp_generic.c b/drivers/net/ppp/ppp_generic.c
index 4583e15ad03a..4019bc959a2a 100644
--- a/drivers/net/ppp/ppp_generic.c
+++ b/drivers/net/ppp/ppp_generic.c
@@ -72,6 +72,10 @@
#define PPP_PROTO_LEN 2
#define PPP_LCP_HDRLEN 4
+/* These are fields recognized by libpcap */
+#define PPP_FILTER_OUTBOUND_TAG 0x0100
+#define PPP_FILTER_INBOUND_TAG 0x0000
+
/*
* An instance of /dev/ppp can be associated with either a ppp
* interface unit or a ppp channel. In both cases, file->private_data
@@ -1762,10 +1766,15 @@ ppp_send_frame(struct ppp *ppp, struct sk_buff *skb)
if (proto < 0x8000) {
#ifdef CONFIG_PPP_FILTER
- /* check if we should pass this packet */
- /* the filter instructions are constructed assuming
- a four-byte PPP header on each packet */
- *(u8 *)skb_push(skb, 2) = 1;
+ /* Check if we should pass this packet.
+ * The filter instructions are constructed assuming
+ * a four-byte PPP header on each packet. The first byte
+ * indicates the direction, and the second byte is meaningless,
+ * but we still need to initialize it to prevent crafted BPF
+ * programs from reading them which would cause reading of
+ * uninitialized data.
+ */
+ *(u16 *)skb_push(skb, 2) = htons(PPP_FILTER_OUTBOUND_TAG);
if (ppp->pass_filter &&
bpf_prog_run(ppp->pass_filter, skb) == 0) {
if (ppp->debug & 1)
--
2.47.1
^ permalink raw reply related [flat|nested] 3+ messages in thread* Re: [PATCH net-next 1/1] ppp: Fix KMSAN warning by initializing 2-byte header
2025-02-25 14:40 ` [PATCH net-next 1/1] ppp: Fix KMSAN warning by initializing 2-byte header Jiayuan Chen
@ 2025-02-26 2:05 ` Jiayuan Chen
0 siblings, 0 replies; 3+ messages in thread
From: Jiayuan Chen @ 2025-02-26 2:05 UTC (permalink / raw)
To: horms, kuba
Cc: bpf, netdev, andrew+netdev, davem, edumazet, pabeni, ricardo,
viro, dmantipov, aleksander.lobakin, linux-ppp, linux-kernel,
mrpre, syzbot+853242d9c9917165d791
On Tue, Feb 25, 2025 at 10:40:04PM +0800, Jiayuan Chen wrote:
> * An instance of /dev/ppp can be associated with either a ppp
> * interface unit or a ppp channel. In both cases, file->private_data
> @@ -1762,10 +1766,15 @@ ppp_send_frame(struct ppp *ppp, struct sk_buff *skb)
>
> if (proto < 0x8000) {
> #ifdef CONFIG_PPP_FILTER
> - /* check if we should pass this packet */
> - /* the filter instructions are constructed assuming
> - a four-byte PPP header on each packet */
> - *(u8 *)skb_push(skb, 2) = 1;
> + /* Check if we should pass this packet.
> + * The filter instructions are constructed assuming
> + * a four-byte PPP header on each packet. The first byte
> + * indicates the direction, and the second byte is meaningless,
> + * but we still need to initialize it to prevent crafted BPF
> + * programs from reading them which would cause reading of
> + * uninitialized data.
> + */
> + *(u16 *)skb_push(skb, 2) = htons(PPP_FILTER_OUTBOUND_TAG);
> if (ppp->pass_filter &&
> bpf_prog_run(ppp->pass_filter, skb) == 0) {
> if (ppp->debug & 1)
> --
> 2.47.1
>
My apologize, it will raise Sparse check WARNING:
drivers/net/ppp/ppp_generic.c:1777:42: warning: incorrect type in assignment (different base types)
drivers/net/ppp/ppp_generic.c:1777:42: expected unsigned short [usertype]
drivers/net/ppp/ppp_generic.c:1777:42: got restricted __be16 [usertype]
A new revision is here, all check passed:
https://lore.kernel.org/all/20250226013658.891214-1-jiayuan.chen@linux.dev/
pw-bot: cr
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2025-02-26 2:05 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-25 14:40 [PATCH net-next 0/1] ppp: Fix KMSAN uninit-value warning with bpf Jiayuan Chen
2025-02-25 14:40 ` [PATCH net-next 1/1] ppp: Fix KMSAN warning by initializing 2-byte header Jiayuan Chen
2025-02-26 2:05 ` Jiayuan Chen
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox