Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

src/interpreter.rs: Fix left/right shifts implementation (mask offset) #100

Merged
merged 1 commit into from
Jan 5, 2024

Conversation

qmonnet
Copy link
Owner

@qmonnet qmonnet commented Jan 5, 2024

The current version of the BPF Instruction Set Specification specifies that "Shift operations use a mask of 0x3F (63) for 64-bit operations and 0x1F (31) for 32-bit operations".

The current implementation is not compliant, and Rust complains if we overflow the number of bits we have when trying to shift. Let's fix it, and let's complete the test suite regarding left and right shift operations.

Note: The JITs are not updated at this stage. The standard does no. mention any difference between JIT and interpreter, but the kernel clearly considers the masking for the interpreter only. JIT-compilers are supposed to handle the overflow case in an implementation-defined (architecture-dependant) fashion. Kernel also use masking for shifts with registers only (not immediates) and handles overflows with immediates in the verifier by rejecting the programs.

Fixes: #99

The current version of the BPF Instruction Set Specification specifies
that "Shift operations use a mask of 0x3F (63) for 64-bit operations and
0x1F (31) for 32-bit operations" [0].

The current implementation is not compliant, and Rust complains if we
overflow the number of bits we have when trying to shift. Let's fix it,
and let's complete the test suite regarding left and right shift
operations.

Note: The JITs are not updated at this stage. The standard does not
mention any difference between JIT and interpreter, but the kernel
clearly considers the masking for the interpreter only. JIT-compilers
are supposed to handle the overflow case in an implementation-defined
(architecture-dependant) fashion. Kernel also use masking for shifts
with registers only (not immediates) and handles overflows with
immediates in the verifier by rejecting the programs.

[0]: https://www.ietf.org/archive/id/draft-thaler-bpf-isa-02.html#section-3.1-18

Reported-by: HAPPY <pcy190@126.com>
Signed-off-by: Quentin Monnet <quentin@isovalent.com>
@qmonnet qmonnet linked an issue Jan 5, 2024 that may be closed by this pull request
@qmonnet qmonnet merged commit 7bebff5 into main Jan 5, 2024
6 of 7 checks passed
@qmonnet qmonnet deleted the pr/shifts branch January 5, 2024 14:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Incorrect shift implementation in the interpreter panicked at 'attempt to shift left with overflow
1 participant