Re: [PATCH] Accept program in priv mode when returning from subprog with r10 marked as precise

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Oct 20, 2023 at 3:02 PM Tao Lyu <tao.lyu@xxxxxxx> wrote:
>
> There is another issue about the backtracking.
> When uploading the following program under privilege mode,
> the verifier reports a "verifier backtracking bug".
>
> 0: R1=ctx(off=0,imm=0) R10=fp0
> 0: (85) call pc+2
> caller:
>  R10=fp0
> callee:
>  frame1: R1=ctx(off=0,imm=0) R10=fp0
> 3: frame1:
> 3: (bf) r3 = r10                      ; frame1: R3_w=fp0 R10=fp0
> 4: (bc) w0 = w10                      ; frame1: R0_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0
> 5: (0f) r3 += r0
> mark_precise: frame1: last_idx 5 first_idx 0 subseq_idx -1
> mark_precise: frame1: regs=r0 stack= before 4: (bc) w0 = w10
> mark_precise: frame1: regs=r10 stack= before 3: (bf) r3 = r10
> mark_precise: frame1: regs=r10 stack= before 0: (85) call pc+2
> BUG regs 400
>
> This bug is manifested by the following check:
>
> if (bt_reg_mask(bt) & ~BPF_REGMASK_ARGS) {
>     verbose(env, "BUG regs %x\n", bt_reg_mask(bt));
>     WARN_ONCE(1, "verifier backtracking bug");
>     return -EFAULT;
> }
>
> Since the verifier allows add operation on stack pointers,
> it shouldn't show this WARNING and reject the program.
>
> I fixed it by skipping the warning if it's privilege mode and only r10 is marked as precise.
>

See my reply to your other email. It would be nice if you can rewrite
your tests in inline assembly, it would be easier to follow and debug.

I think your fix is papering over the fact that we don't recognize
non-r10 stack access. Once we fix that, we shouldn't need extra hacks.
So let's solve the underlying problem first.

> Signed-off-by: Tao Lyu <tao.lyu@xxxxxxx>
> ---
>  kernel/bpf/verifier.c                            |  4 +++-
>  .../bpf/verifier/ret-without-checing-r10.c       | 16 ++++++++++++++++
>  2 files changed, 19 insertions(+), 1 deletion(-)
>  create mode 100644 tools/testing/selftests/bpf/verifier/ret-without-checing-r10.c
>
> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> index e777f50401b6..1ce80cdc4f1d 100644
> --- a/kernel/bpf/verifier.c
> +++ b/kernel/bpf/verifier.c
> @@ -3495,6 +3495,7 @@ static int backtrack_insn(struct bpf_verifier_env *env, int idx, int subseq_idx,
>         u32 dreg = insn->dst_reg;
>         u32 sreg = insn->src_reg;
>         u32 spi, i;
> +       u32 reg_mask;
>
>         if (insn->code == 0)
>                 return 0;
> @@ -3621,7 +3622,8 @@ static int backtrack_insn(struct bpf_verifier_env *env, int idx, int subseq_idx,
>                                  * precise, r0 and r6-r10 or any stack slot in
>                                  * the current frame should be zero by now
>                                  */
> -                               if (bt_reg_mask(bt) & ~BPF_REGMASK_ARGS) {
> +                               reg_mask = bt_reg_mask(bt) & ~BPF_REGMASK_ARGS;
> +                               if (reg_mask && !((reg_mask == 1 << BPF_REG_10) && env->allow_ptr_leaks)) {
>                                         verbose(env, "BUG regs %x\n", bt_reg_mask(bt));
>                                         WARN_ONCE(1, "verifier backtracking bug");
>                                         return -EFAULT;
> diff --git a/tools/testing/selftests/bpf/verifier/ret-without-checing-r10.c b/tools/testing/selftests/bpf/verifier/ret-without-checing-r10.c
> new file mode 100644
> index 000000000000..56e529cf922b
> --- /dev/null
> +++ b/tools/testing/selftests/bpf/verifier/ret-without-checing-r10.c
> @@ -0,0 +1,16 @@
> +{
> +  "pointer arithmetic: when returning from subprog in priv, do not checking r10",
> +  .insns = {
> +       BPF_CALL_REL(2),
> +       BPF_MOV64_IMM(BPF_REG_0, 0),
> +       BPF_EXIT_INSN(),
> +       BPF_MOV64_REG(BPF_REG_3, BPF_REG_10),
> +       BPF_MOV32_REG(BPF_REG_0, BPF_REG_10),
> +       BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_0),
> +       BPF_MOV64_IMM(BPF_REG_0, 0),
> +       BPF_EXIT_INSN(),
> +  },
> +  .result  = ACCEPT,
> +  .result_unpriv = REJECT,
> +  .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN",
> +},
> --
> 2.25.1
>





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux