Skip to content

Commit e5ad9ec

Browse files
andreimateigregkh
authored andcommitted
bpf: Guard stack limits against 32bit overflow
[ Upstream commit 1d38a9e ] This patch promotes the arithmetic around checking stack bounds to be done in the 64-bit domain, instead of the current 32bit. The arithmetic implies adding together a 64-bit register with a int offset. The register was checked to be below 1<<29 when it was variable, but not when it was fixed. The offset either comes from an instruction (in which case it is 16 bit), from another register (in which case the caller checked it to be below 1<<29 [1]), or from the size of an argument to a kfunc (in which case it can be a u32 [2]). Between the register being inconsistently checked to be below 1<<29, and the offset being up to an u32, it appears that we were open to overflowing the `int`s which were currently used for arithmetic. [1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498 [2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904 Reported-by: Andrii Nakryiko <[email protected]> Signed-off-by: Andrei Matei <[email protected]> Signed-off-by: Andrii Nakryiko <[email protected]> Acked-by: Andrii Nakryiko <[email protected]> Link: https://lore.kernel.org/bpf/[email protected] Stable-dep-of: 6b4a64b ("bpf: Fix accesses to uninit stack slots") Signed-off-by: Sasha Levin <[email protected]>
1 parent 0a70d0c commit e5ad9ec

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

kernel/bpf/verifier.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6761,7 +6761,7 @@ static int check_ptr_to_map_access(struct bpf_verifier_env *env,
67616761
* The minimum valid offset is -MAX_BPF_STACK for writes, and
67626762
* -state->allocated_stack for reads.
67636763
*/
6764-
static int check_stack_slot_within_bounds(int off,
6764+
static int check_stack_slot_within_bounds(s64 off,
67656765
struct bpf_func_state *state,
67666766
enum bpf_access_type t)
67676767
{
@@ -6790,7 +6790,7 @@ static int check_stack_access_within_bounds(
67906790
struct bpf_reg_state *regs = cur_regs(env);
67916791
struct bpf_reg_state *reg = regs + regno;
67926792
struct bpf_func_state *state = func(env, reg);
6793-
int min_off, max_off;
6793+
s64 min_off, max_off;
67946794
int err;
67956795
char *err_extra;
67966796

@@ -6803,7 +6803,7 @@ static int check_stack_access_within_bounds(
68036803
err_extra = " write to";
68046804

68056805
if (tnum_is_const(reg->var_off)) {
6806-
min_off = reg->var_off.value + off;
6806+
min_off = (s64)reg->var_off.value + off;
68076807
max_off = min_off + access_size;
68086808
} else {
68096809
if (reg->smax_value >= BPF_MAX_VAR_OFF ||

0 commit comments

Comments
 (0)