lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <X+opI92rzCNZ151F@google.com>
Date:   Mon, 28 Dec 2020 10:51:15 -0800
From:   Sean Christopherson <seanjc@...gle.com>
To:     Borislav Petkov <bp@...en8.de>
Cc:     Andy Lutomirski <luto@...capital.net>,
        Masami Hiramatsu <mhiramat@...nel.org>,
        X86 ML <x86@...nel.org>, LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v1 04/19] x86/insn-eval: Handle return values from the
 decoder

On Wed, Dec 23, 2020, Borislav Petkov wrote:
> From: Borislav Petkov <bp@...e.de>
> 
> Now that the different instruction-inspecting functions return a value,
> test that and return early from callers if error has been encountered.
>
> While at it, do not call insn_get_modrm() when calling
> insn_get_displacement() because latter will make sure to call
> insn_get_modrm() if ModRM hasn't been parsed yet.
> 
> Signed-off-by: Borislav Petkov <bp@...e.de>
> ---
>  arch/x86/lib/insn-eval.c | 19 +++++++++++++------
>  1 file changed, 13 insertions(+), 6 deletions(-)
> 
> diff --git a/arch/x86/lib/insn-eval.c b/arch/x86/lib/insn-eval.c
> index 265d23a0c334..7e49aaf5454c 100644
> --- a/arch/x86/lib/insn-eval.c
> +++ b/arch/x86/lib/insn-eval.c
> @@ -1106,18 +1106,21 @@ static int get_eff_addr_modrm_16(struct insn *insn, struct pt_regs *regs,
>   * @base_offset will have a register, as an offset from the base of pt_regs,
>   * that can be used to resolve the associated segment.
>   *
> - * -EINVAL on error.
> + * Negative value on error.
>   */
>  static int get_eff_addr_sib(struct insn *insn, struct pt_regs *regs,
>  			    int *base_offset, long *eff_addr)
>  {
>  	long base, indx;
>  	int indx_offset;
> +	int ret;
>  
>  	if (insn->addr_bytes != 8 && insn->addr_bytes != 4)
>  		return -EINVAL;
>  
> -	insn_get_modrm(insn);
> +	ret = insn_get_modrm(insn);

This patch is incomplete/inconsistent, and arguably wrong.

  - get_eff_addr_reg() and get_eff_addr_modrm() still ignore the return of
    insn_get_modrm() after this patch.

  - Calling insn_get_modrm() from get_eff_addr_sib() is unnecessary (unless the
    caller passed uninitialized garbage in @insn) as get_eff_addr_sib() is
    called if and only if sib.nbytes!=0, and sib.nbytes can be non-zero if and
    only if the modrm and sib have been got.

  - get_addr_ref_16() does insn_get_displacement, i.e. guarantees the modrm is
    parsed, while the 32/64 variants do not.

What about adding a prereq patch (or three) to call insn_get_displacement() in
insn_get_addr_ref() prior to switching on insn->addr_bytes?  Then the various
internal helpers could be changed to either omit the sanity checks entirely or
WARN on invalid calls?  Or better yet, add an INSN_WARN_ON() macro that compiles
out the checks by default?  E.g. something like:

diff --git a/arch/x86/lib/insn-eval.c b/arch/x86/lib/insn-eval.c
index 7e49aaf5454c..348969146e0f 100644
--- a/arch/x86/lib/insn-eval.c
+++ b/arch/x86/lib/insn-eval.c
@@ -928,12 +928,8 @@ static int get_seg_base_limit(struct insn *insn, struct pt_regs *regs,
diff --git a/arch/x86/lib/insn-eval.c b/arch/x86/lib/insn-eval.c
index 7e49aaf5454c..348969146e0f 100644
--- a/arch/x86/lib/insn-eval.c
+++ b/arch/x86/lib/insn-eval.c
@@ -928,12 +928,8 @@ static int get_seg_base_limit(struct insn *insn, struct pt_regs *regs,
 static int get_eff_addr_reg(struct insn *insn, struct pt_regs *regs,
                            int *regoff, long *eff_addr)
 {
-       insn_get_modrm(insn);
-
-       if (!insn->modrm.nbytes)
-               return -EINVAL;
-
-       if (X86_MODRM_MOD(insn->modrm.value) != 3)
+       if (INSN_WARN_ON(!insn->modrm.got || !insn->modrm.nbytes ||
+                        X86_MODRM_MOD(insn->modrm.value) != 3)
                return -EINVAL;

        *regoff = get_reg_offset(insn, regs, REG_TYPE_RM);
@@ -978,15 +974,9 @@ static int get_eff_addr_modrm(struct insn *insn, struct pt_regs *regs,
 {
        long tmp;

-       if (insn->addr_bytes != 8 && insn->addr_bytes != 4)
-               return -EINVAL;
-
-       insn_get_modrm(insn);
-
-       if (!insn->modrm.nbytes)
-               return -EINVAL;
-
-       if (X86_MODRM_MOD(insn->modrm.value) > 2)
+       if (INSN_WARN_ON((insn->addr_bytes != 8 && insn->addr_bytes != 4) ||
+                        !insn->modrm.got || !insn->modrm.nbytes ||
+                        X86_MODRM_MOD(insn->modrm.value) > 2)
                return -EINVAL;

        *regoff = get_reg_offset(insn, regs, REG_TYPE_RM);
@@ -1046,15 +1036,8 @@ static int get_eff_addr_modrm_16(struct insn *insn, struct pt_regs *regs,
        int addr_offset1, addr_offset2, ret;
        short addr1 = 0, addr2 = 0, displacement;

-       if (insn->addr_bytes != 2)
-               return -EINVAL;
-
-       insn_get_modrm(insn);
-
-       if (!insn->modrm.nbytes)
-               return -EINVAL;
-
-       if (X86_MODRM_MOD(insn->modrm.value) > 2)
+       if (WARN_ON_ONCE(insn->addr_bytes != 2 || !insn->modrm.got ||
+                        !insn->modrm.nbytes || insn->modrm.value > 2))
                return -EINVAL;

        ret = get_reg_offset_16(insn, regs, &addr_offset1, &addr_offset2);
@@ -1199,10 +1182,7 @@ static void __user *get_addr_ref_16(struct insn *insn, struct pt_regs *regs)
        short eff_addr;
        long tmp;

-       if (insn_get_displacement(insn))
-               goto out;
-
-       if (insn->addr_bytes != 2)
+       if (INSN_WARN_ON(insn->addr_bytes != 2))
                goto out;

        if (X86_MODRM_MOD(insn->modrm.value) == 3) {
@@ -1263,7 +1243,7 @@ static void __user *get_addr_ref_32(struct insn *insn, struct pt_regs *regs)
        long tmp;
        int ret;

-       if (insn->addr_bytes != 4)
+       if (INSN_WARN_ON(insn->addr_bytes != 4))
                goto out;

        if (X86_MODRM_MOD(insn->modrm.value) == 3) {
@@ -1356,7 +1336,7 @@ static void __user *get_addr_ref_64(struct insn *insn, struct pt_regs *regs)
        int regoff, ret;
        long eff_addr;

-       if (insn->addr_bytes != 8)
+       if (INSN_WARN_ON(insn->addr_bytes != 8))
                goto out;

        if (X86_MODRM_MOD(insn->modrm.value) == 3) {
@@ -1408,6 +1388,9 @@ void __user *insn_get_addr_ref(struct insn *insn, struct pt_regs *regs)
        if (!insn || !regs)
                return (void __user *)-1L;

+       if (insn_get_displacement(insn))
+               return (void __user *)-1L;
+
        switch (insn->addr_bytes) {
        case 2:
                return get_addr_ref_16(insn, regs);

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ