Re: [PATCH v3 bpf-next 0/3] bpf: Prevent writing read-only memory

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Nov 8, 2021 at 4:31 PM Hao Luo <haoluo@xxxxxxxxxx> wrote:
>
> There are currently two ways to modify a kernel memory in bpf programs:
>  1. declare a ksym of scalar type and directly modify its memory.
>  2. Pass a RDONLY_BUF into a helper function which will override
>  its arguments. For example, bpf_d_path, bpf_snprintf.
>
> This patchset fixes these two problem. For the first, we introduce a
> new reg type PTR_TO_RDONLY_MEM for the scalar typed ksym, which forbids
> writing. For the second, we introduce a new arg type ARG_CONST_PTR_TO_MEM
> to differentiate the arg types that only read the memory from those
> that may write the memory. The previous ARG_PTR_TO_MEM is now only
> compatible with writable memories. If a helper doesn't write into its
> argument, it can use ARG_CONST_PTR_TO_MEM, which is also compatible
> with read-only memories.
>
> In v2, Andrii suggested using the name "ARG_PTR_TO_RDONLY_MEM", but I
> find it is sort of misleading. Because the new arg_type is compatible
> with both write and read-only memory. So I chose ARG_CONST_PTR_TO_MEM
> instead.

I find ARG_CONST_PTR_TO_MEM misleading. It's the difference between
`char * const` (const pointer to mutable memory) vs `const char *`
(pointer to an immutable memory). We need the latter semantics, and
that *is* PTR_TO_RDONLY_MEM in BPF verifier terms.

Drawing further analogies from C, you can pass `char *` (pointer to
mutable memory) to any function that expects `const char *`, because
it's safe to do so, but not the other way.

So I don't think it's confusing at all that it is PTR_TO_RDONLY_MEM
and that you can pass PTR_TO_MEM register to a helper that expects
ARG_PTR_TO_RDONLY_MEM.

>
> Hao Luo (3):
>   bpf: Prevent write to ksym memory
>   bpf: Introduce ARG_CONST_PTR_TO_MEM
>   bpf/selftests: Test PTR_TO_RDONLY_MEM
>
>  include/linux/bpf.h                           | 20 +++++-
>  include/uapi/linux/bpf.h                      |  4 +-
>  kernel/bpf/btf.c                              |  2 +-
>  kernel/bpf/cgroup.c                           |  2 +-
>  kernel/bpf/helpers.c                          | 12 ++--
>  kernel/bpf/ringbuf.c                          |  2 +-
>  kernel/bpf/syscall.c                          |  2 +-
>  kernel/bpf/verifier.c                         | 60 +++++++++++++----
>  kernel/trace/bpf_trace.c                      | 26 ++++----
>  net/core/filter.c                             | 64 +++++++++----------
>  tools/include/uapi/linux/bpf.h                |  4 +-
>  .../selftests/bpf/prog_tests/ksyms_btf.c      | 14 ++++
>  .../bpf/progs/test_ksyms_btf_write_check.c    | 29 +++++++++
>  13 files changed, 168 insertions(+), 73 deletions(-)
>  create mode 100644 tools/testing/selftests/bpf/progs/test_ksyms_btf_write_check.c
>
> --
> 2.34.0.rc0.344.g81b53c2807-goog
>



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux