[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250218133145.265313-1-jiayuan.chen@linux.dev>
Date: Tue, 18 Feb 2025 21:31:43 +0800
From: Jiayuan Chen <jiayuan.chen@...ux.dev>
To: bpf@...r.kernel.org,
netdev@...r.kernel.org
Cc: andrew+netdev@...n.ch,
davem@...emloft.ne,
edumazet@...gle.com,
kuba@...nel.org,
pabeni@...hat.com,
horms@...nel.org,
ricardo@...liere.net,
jiayuan.chen@...ux.dev,
viro@...iv.linux.org.uk,
dmantipov@...dex.ru,
aleksander.lobakin@...el.com,
linux-ppp@...r.kernel.org,
linux-kernel@...r.kernel.org,
mrpre@....com
Subject: [PATCH net-next v1 0/1] ppp: Fix KMSAN uninit-value warning
Syzbot caught an "KMSAN: uninit-value" warning [1], which is caused by the
ppp driver not initializing a 2-byte header when using socket filters.
Here's a detailed explanation:
1. PPP protocol format
The PPP protocol format looks like this:
|<-------------------------- 7 - 1508 bytes --------------------------->|
+---0x7E---+---0xFF---+---0x03---+----------+---------------+----------+---0x7E----
| Flag | Address | Control | Protocol | Information | FCS | Flag |
| 01111110 | 11111111 | 00000011 | 8/16bits | * | 16 bits | 01111110 |
+----------+----------+----------+----------+---------------+----------+-----------
2. Normal BPF program
For example, when filtering IP over PPP, libpcap generates BPF
instructions like this:
(000) ldh [2]
(001) jeq #0x21 jt 2 jf 3
(002) ret #65535
(003) ret #0
2 bytes data are skipped by bpf program and then bpf program reads the
'Protocol' field to determine if it's an IP packet. Clearly, libpcap
assumes the packet starts from the Address field, just like the comment in
'drivers/net/ppp/ppp_generic.c':
/* the filter instructions are constructed assuming
a four-byte PPP header on each packet */
Corresponding libpcap code is here:
https://github.com/the-tcpdump-group/libpcap/blob/master/gencode.c#L1421
3. Current problem
The problem is that the skb->data generated by ppp_write() starts from the
'Protocol' field.
To correctly use the BPF filter program, a 2-byte header is added to
simulate the presence of Address and Control fields. And then, after
running the socket filter, it's restored:
1768 *(u8 *)skb_push(skb, 2) = 1;
1770 bpf_prog_run()
1782 skb_pull(skb, 2);
The thing is, only one byte of the new 2-byte header is initialized. For
normal BPF programs generated by libpcap, uninitialized data won't be
used, so it's not a problem.
However, for carefully crafted BPF programs, such as those generated by
syzkaller [2], which start reading from offset 0, the uninitialized data
will be used and caught by KMSAN.
4. Fix
The fix is simple: initialize the entire 2-byte header.
[1] https://syzkaller.appspot.com/bug?extid=853242d9c9917165d791
[2] https://syzkaller.appspot.com/text?tag=ReproC&x=11994913980000
Jiayuan Chen (1):
ppp: Fix KMSAN warning by initializing 2-byte header
drivers/net/ppp/ppp_generic.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--
2.47.1
Powered by blists - more mailing lists