* [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
@ 2023-08-29 10:42 Sergey Bronnikov via Tarantool-patches
2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
` (2 more replies)
0 siblings, 3 replies; 8+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-08-29 10:42 UTC (permalink / raw)
To: tarantool-patches, Sergey Kaplun, max.kokryashkin
From: sergeyb@tarantool.org
Reported by Sergey Bronnikov. #1054
(cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
The following Lua snippet triggers an out of boundary access to a stack:
```lua
a, b, c = 1, 2, 3
local d
for _ in nil do end
```
With execution snippet by LuaJIT instrumented by ASAN it leads to
a heap-buffer-overflow.
In a function `predict_next` variable `exprpc` looks forward and expects
extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
and there is no new bytecode to add, so `exprpc == fs->bclim` and it
leads to out of boundary access.
Sergey Bronnikov:
* added the description and the test for the problem
Part of tarantool/tarantool#8825
---
PR: https://github.com/tarantool/tarantool/pull/9054
Branch: https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
Related issue:
* https://github.com/LuaJIT/LuaJIT/issues/1054
src/lj_parse.c | 4 +++-
...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
2 files changed, 21 insertions(+), 1 deletion(-)
create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
diff --git a/src/lj_parse.c b/src/lj_parse.c
index 343fa797..f1015960 100644
--- a/src/lj_parse.c
+++ b/src/lj_parse.c
@@ -2511,9 +2511,11 @@ static void parse_for_num(LexState *ls, GCstr *varname, BCLine line)
*/
static int predict_next(LexState *ls, FuncState *fs, BCPos pc)
{
- BCIns ins = fs->bcbase[pc].ins;
+ BCIns ins;
GCstr *name;
cTValue *o;
+ if (pc >= fs->bclim) return 0;
+ ins = fs->bcbase[pc].ins;
switch (bc_op(ins)) {
case BC_MOV:
name = gco2str(gcref(var_get(ls, fs, bc_d(ins)).name));
diff --git a/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
new file mode 100644
index 00000000..17f1b994
--- /dev/null
+++ b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
@@ -0,0 +1,18 @@
+local tap = require('tap')
+local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
+test:plan(1)
+
+
+-- The test demonstrates a problem with out of boundary access to a stack.
+-- Sample executed in LuaJIT instrumented by ASAN leads to
+-- a heap-buffer-overflow.
+-- See also https://github.com/LuaJIT/LuaJIT/issues/528
+local lua_code = [[
+a, b, c = 1, 2, 3
+local d
+for _ in nil do end
+]]
+
+test:ok(loadstring(lua_code), 'parsing is correct')
+
+test:done(true)
--
2.34.1
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 10:42 [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again) Sergey Bronnikov via Tarantool-patches
@ 2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
2023-08-29 14:38 ` Sergey Bronnikov via Tarantool-patches
2023-08-30 10:53 ` Maxim Kokryashkin via Tarantool-patches
2023-09-27 12:33 ` Igor Munkin via Tarantool-patches
2 siblings, 1 reply; 8+ messages in thread
From: Sergey Kaplun via Tarantool-patches @ 2023-08-29 13:38 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: max.kokryashkin, tarantool-patches
Hi, Sergey!
Thanks for the patch!
Please consider my comments below.
On 29.08.23, Sergey Bronnikov wrote:
> From: sergeyb@tarantool.org
>
> Reported by Sergey Bronnikov. #1054
I suggest to remove the ticket number, to avoid trouble trouble until
trouble troubles you. :)
>
> (cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
>
> The following Lua snippet triggers an out of boundary access to a stack:
Typo: s/an out of boundary/out-of-boundary/
>
> ```lua
> a, b, c = 1, 2, 3
> local d
> for _ in nil do end
> ```
>
> With execution snippet by LuaJIT instrumented by ASAN it leads to
> a heap-buffer-overflow.
I suppose that it leads ever without ASAN, but the issue is
observable only with ASAN, isn't it?
>
> In a function `predict_next` variable `exprpc` looks forward and expects
Minor: I suggest using of `()` for distinguishing function and variable
names.
Feel free to ignore.
> extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
Typo: s/the `KNIL`/`KNIL`
> and there is no new bytecode to add, so `exprpc == fs->bclim` and it
Typo: /fs->bclim`/fs->bclim`,/
> leads to out of boundary access.
Typo: s/out of boundary/out-of-boundary/
>
Minor: I suppose that we can mention that the patch fixes the issue via
early return.
> Sergey Bronnikov:
> * added the description and the test for the problem
>
> Part of tarantool/tarantool#8825
> ---
>
> PR: https://github.com/tarantool/tarantool/pull/9054
> Branch: https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
> Related issue:
> * https://github.com/LuaJIT/LuaJIT/issues/1054
>
> src/lj_parse.c | 4 +++-
> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
> 2 files changed, 21 insertions(+), 1 deletion(-)
> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>
> diff --git a/src/lj_parse.c b/src/lj_parse.c
> index 343fa797..f1015960 100644
> --- a/src/lj_parse.c
> +++ b/src/lj_parse.c
<snipped>
> diff --git a/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
> new file mode 100644
> index 00000000..17f1b994
> --- /dev/null
> +++ b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
> @@ -0,0 +1,18 @@
> +local tap = require('tap')
> +local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
> +test:plan(1)
> +
> +
Excess empty line.
> +-- The test demonstrates a problem with out of boundary access to a stack.
Typo: s/out of boundary/out-of-boundary/
Comment line width is more than 66 symbols.
> +-- Sample executed in LuaJIT instrumented by ASAN leads to
> +-- a heap-buffer-overflow.
Minor: IDK why, but suggested varian here is "heap buffer overflow".
> +-- See also https://github.com/LuaJIT/LuaJIT/issues/528
I suggest to add an empty line here.
> +local lua_code = [[
> +a, b, c = 1, 2, 3
> +local d
> +for _ in nil do end
> +]]
> +
> +test:ok(loadstring(lua_code), 'parsing is correct')
I suggest also to test that the behaviour of the executed chunk is the
same as in the PUC RIO Lua 5.1 (like it is done for the lj-1033).
> +
> +test:done(true)
> --
> 2.34.1
>
--
Best regards,
Sergey Kaplun
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
@ 2023-08-29 14:38 ` Sergey Bronnikov via Tarantool-patches
2023-08-29 14:43 ` Sergey Kaplun via Tarantool-patches
0 siblings, 1 reply; 8+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-08-29 14:38 UTC (permalink / raw)
To: Sergey Kaplun, Sergey Bronnikov; +Cc: tarantool-patches, max.kokryashkin
[-- Attachment #1: Type: text/plain, Size: 4471 bytes --]
Hi, Sergey
thanks for review! See my comments.
New changes were force-pushed.
On 8/29/23 16:38, Sergey Kaplun wrote:
> Hi, Sergey!
> Thanks for the patch!
> Please consider my comments below.
>
> On 29.08.23, Sergey Bronnikov wrote:
>> From:sergeyb@tarantool.org
>>
>> Reported by Sergey Bronnikov. #1054
> I suggest to remove the ticket number, to avoid trouble trouble until
> trouble troubles you. :)
Agree, removed to avoid troubles.
>
>> (cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
>>
>> The following Lua snippet triggers an out of boundary access to a stack:
> Typo: s/an out of boundary/out-of-boundary/
Fixed.
>
>> ```lua
>> a, b, c = 1, 2, 3
>> local d
>> for _ in nil do end
>> ```
>>
>> With execution snippet by LuaJIT instrumented by ASAN it leads to
>> a heap-buffer-overflow.
> I suppose that it leads ever without ASAN, but the issue is
> observable only with ASAN, isn't it?
Right. Rephrased it:
+-- The test demonstrates a problem with out-of-boundary access
+-- to a stack. The problem can be easily observed on execution
+-- the sample by LuaJIT by ASAN, sanitizer reports a heap-buffer-overflow.
>
>> In a function `predict_next` variable `exprpc` looks forward and expects
> Minor: I suggest using of `()` for distinguishing function and variable
> names.
> Feel free to ignore.
Fixed. However "function" was before "predict_next".
>
>> extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
> Typo: s/the `KNIL`/`KNIL`
Fixed.
>
>> and there is no new bytecode to add, so `exprpc == fs->bclim` and it
> Typo: /fs->bclim`/fs->bclim`,/
Fixed.
>
>> leads to out of boundary access.
> Typo: s/out of boundary/out-of-boundary/
Fixed.
>
> Minor: I suppose that we can mention that the patch fixes the issue via
> early return.
Added.
>> Sergey Bronnikov:
>> * added the description and the test for the problem
>>
>> Part of tarantool/tarantool#8825
>> ---
>>
>> PR:https://github.com/tarantool/tarantool/pull/9054
>> Branch:https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
>> Related issue:
>> *https://github.com/LuaJIT/LuaJIT/issues/1054
>>
>> src/lj_parse.c | 4 +++-
>> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
>> 2 files changed, 21 insertions(+), 1 deletion(-)
>> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>>
>> diff --git a/src/lj_parse.c b/src/lj_parse.c
>> index 343fa797..f1015960 100644
>> --- a/src/lj_parse.c
>> +++ b/src/lj_parse.c
> <snipped>
>
>> diff --git a/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>> new file mode 100644
>> index 00000000..17f1b994
>> --- /dev/null
>> +++ b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>> @@ -0,0 +1,18 @@
>> +local tap = require('tap')
>> +local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
>> +test:plan(1)
>> +
>> +
> Excess empty line.
Fixed.
>
>> +-- The test demonstrates a problem with out of boundary access to a stack.
> Typo: s/out of boundary/out-of-boundary/
> Comment line width is more than 66 symbols.
Fixed.
>
>> +-- Sample executed in LuaJIT instrumented by ASAN leads to
>> +-- a heap-buffer-overflow.
> Minor: IDK why, but suggested varian here is "heap buffer overflow".
ASAN reports error with hyphens, like this:
|==90673==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x6020000000fb at pc 0x000108868a95 bp 0x7fff573979a0 sp 0x7fff57397998
READ of size 1 at 0x6020000000fb thread T0|
If you don't like variant "heap-buffer-overflow" then we can use variant
used in CWE list: "heap-based buffer overflow", see [1].
What variant should
1. https://cwe.mitre.org/data/definitions/122.html
>
>> +-- See alsohttps://github.com/LuaJIT/LuaJIT/issues/528
> I suggest to add an empty line here.
Added.
>
>> +local lua_code = [[
>> +a, b, c = 1, 2, 3
>> +local d
>> +for _ in nil do end
>> +]]
>> +
>> +test:ok(loadstring(lua_code), 'parsing is correct')
> I suggest also to test that the behaviour of the executed chunk is the
> same as in the PUC RIO Lua 5.1 (like it is done for the lj-1033).
Updated:
TAP version 13
1..3
ok - chunk loaded successfully
ok - loaded function is failed (expected)
ok - correct error message
>
>> +
>> +test:done(true)
>> --
>> 2.34.1
>>
[-- Attachment #2: Type: text/html, Size: 14567 bytes --]
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 14:38 ` Sergey Bronnikov via Tarantool-patches
@ 2023-08-29 14:43 ` Sergey Kaplun via Tarantool-patches
2023-08-29 15:11 ` Sergey Bronnikov via Tarantool-patches
0 siblings, 1 reply; 8+ messages in thread
From: Sergey Kaplun via Tarantool-patches @ 2023-08-29 14:43 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: Sergey Bronnikov, tarantool-patches, max.kokryashkin
Hi, Sergey!
Thanks for the updates!
LGTM, after fixing several minor comments below.
On 29.08.23, Sergey Bronnikov wrote:
> Hi, Sergey
>
> thanks for review! See my comments.
>
> New changes were force-pushed.
>
>
> On 8/29/23 16:38, Sergey Kaplun wrote:
> > Hi, Sergey!
> > Thanks for the patch!
> > Please consider my comments below.
> >
> > On 29.08.23, Sergey Bronnikov wrote:
> >> From:sergeyb@tarantool.org
> >>
<snipped>
> >> In a function `predict_next` variable `exprpc` looks forward and expects
> > Minor: I suggest using of `()` for distinguishing function and variable
> > names.
> > Feel free to ignore.
>
> Fixed. However "function" was before "predict_next".
>
Yes, I understand, its just matter of taste :).
<snipped>
> >> Sergey Bronnikov:
> >> * added the description and the test for the problem
> >>
> >> Part of tarantool/tarantool#8825
> >> ---
> >>
> >> PR:https://github.com/tarantool/tarantool/pull/9054
> >> Branch:https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
> >> Related issue:
> >> *https://github.com/LuaJIT/LuaJIT/issues/1054
> >>
> >> src/lj_parse.c | 4 +++-
> >> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
I suggest to use predict-next instead in filename and testname to be
consistent with other tests.
> >> 2 files changed, 21 insertions(+), 1 deletion(-)
> >> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
> >>
<snipped>
> >
> >> +-- Sample executed in LuaJIT instrumented by ASAN leads to
> >> +-- a heap-buffer-overflow.
> > Minor: IDK why, but suggested varian here is "heap buffer overflow".
>
>
> ASAN reports error with hyphens, like this:
>
> |==90673==ERROR: AddressSanitizer: heap-buffer-overflow on address
> 0x6020000000fb at pc 0x000108868a95 bp 0x7fff573979a0 sp 0x7fff57397998
> READ of size 1 at 0x6020000000fb thread T0|
>
> If you don't like variant "heap-buffer-overflow" then we can use variant
> used in CWE list: "heap-based buffer overflow", see [1].
>
> What variant should
>
> 1. https://cwe.mitre.org/data/definitions/122.html
Yes, lets used it.
>
> >
> >> +-- See alsohttps://github.com/LuaJIT/LuaJIT/issues/528
Nit: Missed dot at the end of the sentence.
Typo: s/528/1054./
<snipped>
--
Best regards,
Sergey Kaplun
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 14:43 ` Sergey Kaplun via Tarantool-patches
@ 2023-08-29 15:11 ` Sergey Bronnikov via Tarantool-patches
0 siblings, 0 replies; 8+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-08-29 15:11 UTC (permalink / raw)
To: Sergey Kaplun; +Cc: Sergey Bronnikov, tarantool-patches, max.kokryashkin
Hi,
On 8/29/23 17:43, Sergey Kaplun wrote:
> Hi, Sergey!
> Thanks for the updates!
> LGTM, after fixing several minor comments below.
>
> On 29.08.23, Sergey Bronnikov wrote:
<snipped>
> Part of tarantool/tarantool#8825
> ---
>
> PR:https://github.com/tarantool/tarantool/pull/9054
> Branch:https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
> Related issue:
> *https://github.com/LuaJIT/LuaJIT/issues/1054
>
> src/lj_parse.c | 4 +++-
> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
> I suggest to use predict-next instead in filename and testname to be
> consistent with other tests.
Fixed:
---
a/test/tarantool-tests/lj-1054-fix-incorrect-pc-value-in-predict_next.test.lua
+++
b/test/tarantool-tests/lj-1054-fix-incorrect-pc-value-in-predict_next.test.lua
@@ -1,12 +1,12 @@
local tap = require('tap')
-local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
+local test = tap.test('lj-1054-fix-incorrect-pc-value-in-predict_next')
test:plan(3)
<snipped>
>>>> +-- See alsohttps://github.com/LuaJIT/LuaJIT/issues/528
> Nit: Missed dot at the end of the sentence.
> Typo: s/528/1054./
>
> <snipped>
>
-- The test demonstrates a problem with out-of-boundary
-- access to a stack. The problem can be easily observed
-- on execution the sample by LuaJIT by ASAN, sanitizer
-- reports a heap-based buffer overflow.
--- See also https://github.com/LuaJIT/LuaJIT/issues/528
+-- See also https://github.com/LuaJIT/LuaJIT/issues/1054.
local res_f = loadstring([[
a, b, c = 1, 2, 3
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 10:42 [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again) Sergey Bronnikov via Tarantool-patches
2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
@ 2023-08-30 10:53 ` Maxim Kokryashkin via Tarantool-patches
2023-08-31 11:48 ` Sergey Bronnikov via Tarantool-patches
2023-09-27 12:33 ` Igor Munkin via Tarantool-patches
2 siblings, 1 reply; 8+ messages in thread
From: Maxim Kokryashkin via Tarantool-patches @ 2023-08-30 10:53 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: max.kokryashkin, tarantool-patches
Hi, Sergey!
Thanks for the patch!
LGTM, except for a few nits below.
On Tue, Aug 29, 2023 at 01:42:40PM +0300, Sergey Bronnikov via Tarantool-patches wrote:
> From: sergeyb@tarantool.org
>
> Reported by Sergey Bronnikov. #1054
>
> (cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
>
> The following Lua snippet triggers an out of boundary access to a stack:
>
> ```lua
> a, b, c = 1, 2, 3
> local d
> for _ in nil do end
> ```
>
> With execution snippet by LuaJIT instrumented by ASAN it leads to
> a heap-buffer-overflow.
I suggest the following rephrasing with grammar fixes:
| During the execution of this snippet with LuaJIT instrumented by ASAN,
| it leads to a heap buffer overflow.
>
> In a function `predict_next` variable `exprpc` looks forward and expects
Typo: s/In a/In/
> extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
Typo: s/to the/to/
> and there is no new bytecode to add, so `exprpc == fs->bclim` and it
> leads to out of boundary access.
The last sentence that you don't have here, but have on GitHub should look like
the following:
| The issue has been fixed by an early return when `pc >= fs->bclim`.
>
> Sergey Bronnikov:
> * added the description and the test for the problem
>
> Part of tarantool/tarantool#8825
> ---
>
> PR: https://github.com/tarantool/tarantool/pull/9054
> Branch: https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
> Related issue:
> * https://github.com/LuaJIT/LuaJIT/issues/1054
>
> src/lj_parse.c | 4 +++-
> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
> 2 files changed, 21 insertions(+), 1 deletion(-)
> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>
> diff --git a/src/lj_parse.c b/src/lj_parse.c
> index 343fa797..f1015960 100644
> --- a/src/lj_parse.c
> +++ b/src/lj_parse.c
> @@ -2511,9 +2511,11 @@ static void parse_for_num(LexState *ls, GCstr *varname, BCLine line)
> */
> static int predict_next(LexState *ls, FuncState *fs, BCPos pc)
> {
> - BCIns ins = fs->bcbase[pc].ins;
> + BCIns ins;
> GCstr *name;
> cTValue *o;
> + if (pc >= fs->bclim) return 0;
> + ins = fs->bcbase[pc].ins;
> switch (bc_op(ins)) {
> case BC_MOV:
> name = gco2str(gcref(var_get(ls, fs, bc_d(ins)).name));
> diff --git a/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
> new file mode 100644
> index 00000000..17f1b994
> --- /dev/null
> +++ b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
> @@ -0,0 +1,18 @@
> +local tap = require('tap')
> +local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
> +test:plan(1)
> +
> +
> +-- The test demonstrates a problem with out of boundary access to a stack.
> +-- Sample executed in LuaJIT instrumented by ASAN leads to
> +-- a heap-buffer-overflow.
> +-- See also https://github.com/LuaJIT/LuaJIT/issues/528
This chunk is a bit dated and I don't really want to bother with
going through a bunch of emails and sequential diffs, so I'll just
bring the actual one here by myself.
Here it is:
-- The test demonstrates a problem with out-of-boundary
-- access to a stack. The problem can be easily observed
-- on execution the sample by LuaJIT by ASAN, sanitizer
Typo: s/execution/execution of/
Typo: s/sanitizer/where the sanitizer/
-- reports a heap-based buffer overflow.
-- See also https://github.com/LuaJIT/LuaJIT/issues/1054.
Otherwise, considering the changes you've already made after
Sergey's comments, this part is ok.
> +local lua_code = [[
> +a, b, c = 1, 2, 3
> +local d
> +for _ in nil do end
> +]]
> +
> +test:ok(loadstring(lua_code), 'parsing is correct')
> +
> +test:done(true)
> --
> 2.34.1
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-30 10:53 ` Maxim Kokryashkin via Tarantool-patches
@ 2023-08-31 11:48 ` Sergey Bronnikov via Tarantool-patches
0 siblings, 0 replies; 8+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-08-31 11:48 UTC (permalink / raw)
To: Maxim Kokryashkin, Sergey Bronnikov; +Cc: max.kokryashkin, tarantool-patches
Hi, Max
thanks for review! See my answers.
Updated branch force-pushed.
Sergey
On 8/30/23 13:53, Maxim Kokryashkin via Tarantool-patches wrote:
> Hi, Sergey!
> Thanks for the patch!
> LGTM, except for a few nits below.
> On Tue, Aug 29, 2023 at 01:42:40PM +0300, Sergey Bronnikov via Tarantool-patches wrote:
>> From: sergeyb@tarantool.org
>>
>> Reported by Sergey Bronnikov. #1054
>>
>> (cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
>>
>> The following Lua snippet triggers an out of boundary access to a stack:
>>
>> ```lua
>> a, b, c = 1, 2, 3
>> local d
>> for _ in nil do end
>> ```
>>
>> With execution snippet by LuaJIT instrumented by ASAN it leads to
>> a heap-buffer-overflow.
> I suggest the following rephrasing with grammar fixes:
> | During the execution of this snippet with LuaJIT instrumented by ASAN,
> | it leads to a heap buffer overflow.
Updated, but replaced "heap buffer overflow" with "heap buffer overflow"
(same wording is used in CWE [1]).
1. https://cwe.mitre.org/data/definitions/122.html
>> In a function `predict_next` variable `exprpc` looks forward and expects
> Typo: s/In a/In/
Fixed.
>> extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
> Typo: s/to the/to/
Fixed.
>> and there is no new bytecode to add, so `exprpc == fs->bclim` and it
>> leads to out of boundary access.
> The last sentence that you don't have here, but have on GitHub should look like
> the following:
> | The issue has been fixed by an early return when `pc >= fs->bclim`.
Fixed.
>> Sergey Bronnikov:
>> * added the description and the test for the problem
>>
>> Part of tarantool/tarantool#8825
>> ---
>>
>> PR: https://github.com/tarantool/tarantool/pull/9054
>> Branch: https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
>> Related issue:
>> * https://github.com/LuaJIT/LuaJIT/issues/1054
>>
>> src/lj_parse.c | 4 +++-
>> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
>> 2 files changed, 21 insertions(+), 1 deletion(-)
>> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>>
>> diff --git a/src/lj_parse.c b/src/lj_parse.c
>> index 343fa797..f1015960 100644
>> --- a/src/lj_parse.c
>> +++ b/src/lj_parse.c
>> @@ -2511,9 +2511,11 @@ static void parse_for_num(LexState *ls, GCstr *varname, BCLine line)
>> */
>> static int predict_next(LexState *ls, FuncState *fs, BCPos pc)
>> {
>> - BCIns ins = fs->bcbase[pc].ins;
>> + BCIns ins;
>> GCstr *name;
>> cTValue *o;
>> + if (pc >= fs->bclim) return 0;
>> + ins = fs->bcbase[pc].ins;
>> switch (bc_op(ins)) {
>> case BC_MOV:
>> name = gco2str(gcref(var_get(ls, fs, bc_d(ins)).name));
>> diff --git a/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>> new file mode 100644
>> index 00000000..17f1b994
>> --- /dev/null
>> +++ b/test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>> @@ -0,0 +1,18 @@
>> +local tap = require('tap')
>> +local test = tap.test('lj-1054-incorrect-pc-value-in-predict_next')
>> +test:plan(1)
>> +
>> +
>> +-- The test demonstrates a problem with out of boundary access to a stack.
>> +-- Sample executed in LuaJIT instrumented by ASAN leads to
>> +-- a heap-buffer-overflow.
>> +-- See also https://github.com/LuaJIT/LuaJIT/issues/528
> This chunk is a bit dated and I don't really want to bother with
> going through a bunch of emails and sequential diffs, so I'll just
> bring the actual one here by myself.
>
> Here it is:
> -- The test demonstrates a problem with out-of-boundary
> -- access to a stack. The problem can be easily observed
> -- on execution the sample by LuaJIT by ASAN, sanitizer
> Typo: s/execution/execution of/
> Typo: s/sanitizer/where the sanitizer/
> -- reports a heap-based buffer overflow.
> -- See also https://github.com/LuaJIT/LuaJIT/issues/1054.
>
> Otherwise, considering the changes you've already made after
> Sergey's comments, this part is ok.
Updated comment:
---
a/test/tarantool-tests/lj-1054-fix-incorrect-pc-value-in-predict_next.test.lua
+++
b/test/tarantool-tests/lj-1054-fix-incorrect-pc-value-in-predict_next.test.lua
@@ -4,8 +4,8 @@ test:plan(3)
-- The test demonstrates a problem with out-of-boundary
-- access to a stack. The problem can be easily observed
--- on execution the sample by LuaJIT by ASAN, sanitizer
--- reports a heap-based buffer overflow.
+-- on execution of the sample by LuaJIT instrumented by ASAN,
+-- where the sanitizer reports a heap-based buffer overflow.
-- See also https://github.com/LuaJIT/LuaJIT/issues/1054.
local res_f = loadstring([[
>> +local lua_code = [[
>> +a, b, c = 1, 2, 3
>> +local d
>> +for _ in nil do end
>> +]]
>> +
>> +test:ok(loadstring(lua_code), 'parsing is correct')
>> +
>> +test:done(true)
>> --
>> 2.34.1
>>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again).
2023-08-29 10:42 [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again) Sergey Bronnikov via Tarantool-patches
2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
2023-08-30 10:53 ` Maxim Kokryashkin via Tarantool-patches
@ 2023-09-27 12:33 ` Igor Munkin via Tarantool-patches
2 siblings, 0 replies; 8+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-09-27 12:33 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: max.kokryashkin, tarantool-patches
Sergey,
I've checked the patchset into all long-term branches in
tarantool/luajit and bumped a new version in master, release/2.11 and
release/2.10.
On 29.08.23, Sergey Bronnikov via Tarantool-patches wrote:
> From: sergeyb@tarantool.org
>
> Reported by Sergey Bronnikov. #1054
>
> (cherry picked from commit 309fb42b871b6414f53e0e0e708bce0b0d62daff)
>
> The following Lua snippet triggers an out of boundary access to a stack:
>
> ```lua
> a, b, c = 1, 2, 3
> local d
> for _ in nil do end
> ```
>
> With execution snippet by LuaJIT instrumented by ASAN it leads to
> a heap-buffer-overflow.
>
> In a function `predict_next` variable `exprpc` looks forward and expects
> extra bytecodes on the stack. However, `KPRI` is merged to the `KNIL`
> and there is no new bytecode to add, so `exprpc == fs->bclim` and it
> leads to out of boundary access.
>
> Sergey Bronnikov:
> * added the description and the test for the problem
>
> Part of tarantool/tarantool#8825
> ---
>
> PR: https://github.com/tarantool/tarantool/pull/9054
> Branch: https://github.com/tarantool/luajit/tree/ligurio/lj-1054-incorrect-pc-value-predict_next
> Related issue:
> * https://github.com/LuaJIT/LuaJIT/issues/1054
>
> src/lj_parse.c | 4 +++-
> ...incorrect-pc-value-in-predict_next.test.lua | 18 ++++++++++++++++++
> 2 files changed, 21 insertions(+), 1 deletion(-)
> create mode 100644 test/tarantool-tests/lj-1054-incorrect-pc-value-in-predict_next.test.lua
>
<snipped>
> --
> 2.34.1
>
--
Best regards,
IM
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2023-09-27 12:54 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-08-29 10:42 [Tarantool-patches] [PATCH luajit] Fix predict_next() in parser (again) Sergey Bronnikov via Tarantool-patches
2023-08-29 13:38 ` Sergey Kaplun via Tarantool-patches
2023-08-29 14:38 ` Sergey Bronnikov via Tarantool-patches
2023-08-29 14:43 ` Sergey Kaplun via Tarantool-patches
2023-08-29 15:11 ` Sergey Bronnikov via Tarantool-patches
2023-08-30 10:53 ` Maxim Kokryashkin via Tarantool-patches
2023-08-31 11:48 ` Sergey Bronnikov via Tarantool-patches
2023-09-27 12:33 ` Igor Munkin via Tarantool-patches
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox