Commit 2ab3b380 authored by Kumar Kartikeya Dwivedi's avatar Kumar Kartikeya Dwivedi Committed by Alexei Starovoitov

bpf: Make BTF type match stricter for release arguments

The current of behavior of btf_struct_ids_match for release arguments is
that when type match fails, it retries with first member type again
(recursively). Since the offset is already 0, this is akin to just
casting the pointer in normal C, since if type matches it was just
embedded inside parent sturct as an object. However, we want to reject
cases for release function type matching, be it kfunc or BPF helpers.

An example is the following:

struct foo {
	struct bar b;
};

struct foo *v = acq_foo();
rel_bar(&v->b); // btf_struct_ids_match fails btf_types_are_same, then
		// retries with first member type and succeeds, while
		// it should fail.

Hence, don't walk the struct and only rely on btf_types_are_same for
strict mode. All users of strict mode must be dealing with zero offset
anyway, since otherwise they would want the struct to be walked.
Signed-off-by: default avatarKumar Kartikeya Dwivedi <memxor@gmail.com>
Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20220424214901.2743946-10-memxor@gmail.com
parent a1ef1959
...@@ -1748,7 +1748,8 @@ int btf_struct_access(struct bpf_verifier_log *log, const struct btf *btf, ...@@ -1748,7 +1748,8 @@ int btf_struct_access(struct bpf_verifier_log *log, const struct btf *btf,
u32 *next_btf_id, enum bpf_type_flag *flag); u32 *next_btf_id, enum bpf_type_flag *flag);
bool btf_struct_ids_match(struct bpf_verifier_log *log, bool btf_struct_ids_match(struct bpf_verifier_log *log,
const struct btf *btf, u32 id, int off, const struct btf *btf, u32 id, int off,
const struct btf *need_btf, u32 need_type_id); const struct btf *need_btf, u32 need_type_id,
bool strict);
int btf_distill_func_proto(struct bpf_verifier_log *log, int btf_distill_func_proto(struct bpf_verifier_log *log,
struct btf *btf, struct btf *btf,
......
...@@ -5746,7 +5746,8 @@ static bool btf_types_are_same(const struct btf *btf1, u32 id1, ...@@ -5746,7 +5746,8 @@ static bool btf_types_are_same(const struct btf *btf1, u32 id1,
bool btf_struct_ids_match(struct bpf_verifier_log *log, bool btf_struct_ids_match(struct bpf_verifier_log *log,
const struct btf *btf, u32 id, int off, const struct btf *btf, u32 id, int off,
const struct btf *need_btf, u32 need_type_id) const struct btf *need_btf, u32 need_type_id,
bool strict)
{ {
const struct btf_type *type; const struct btf_type *type;
enum bpf_type_flag flag; enum bpf_type_flag flag;
...@@ -5755,7 +5756,12 @@ bool btf_struct_ids_match(struct bpf_verifier_log *log, ...@@ -5755,7 +5756,12 @@ bool btf_struct_ids_match(struct bpf_verifier_log *log,
/* Are we already done? */ /* Are we already done? */
if (off == 0 && btf_types_are_same(btf, id, need_btf, need_type_id)) if (off == 0 && btf_types_are_same(btf, id, need_btf, need_type_id))
return true; return true;
/* In case of strict type match, we do not walk struct, the top level
* type match must succeed. When strict is true, off should have already
* been 0.
*/
if (strict)
return false;
again: again:
type = btf_type_by_id(btf, id); type = btf_type_by_id(btf, id);
if (!type) if (!type)
...@@ -6197,7 +6203,7 @@ static int btf_check_func_arg_match(struct bpf_verifier_env *env, ...@@ -6197,7 +6203,7 @@ static int btf_check_func_arg_match(struct bpf_verifier_env *env,
return -EINVAL; return -EINVAL;
} }
if (!btf_struct_ids_match(log, btf, ref_id, 0, off_desc->kptr.btf, if (!btf_struct_ids_match(log, btf, ref_id, 0, off_desc->kptr.btf,
off_desc->kptr.btf_id)) { off_desc->kptr.btf_id, true)) {
bpf_log(log, "kernel function %s args#%d expected pointer to %s %s\n", bpf_log(log, "kernel function %s args#%d expected pointer to %s %s\n",
func_name, i, btf_type_str(ref_t), ref_tname); func_name, i, btf_type_str(ref_t), ref_tname);
return -EINVAL; return -EINVAL;
...@@ -6250,7 +6256,7 @@ static int btf_check_func_arg_match(struct bpf_verifier_env *env, ...@@ -6250,7 +6256,7 @@ static int btf_check_func_arg_match(struct bpf_verifier_env *env,
reg_ref_tname = btf_name_by_offset(reg_btf, reg_ref_tname = btf_name_by_offset(reg_btf,
reg_ref_t->name_off); reg_ref_t->name_off);
if (!btf_struct_ids_match(log, reg_btf, reg_ref_id, if (!btf_struct_ids_match(log, reg_btf, reg_ref_id,
reg->off, btf, ref_id)) { reg->off, btf, ref_id, rel && reg->ref_obj_id)) {
bpf_log(log, "kernel function %s args#%d expected pointer to %s %s but R%d has a pointer to %s %s\n", bpf_log(log, "kernel function %s args#%d expected pointer to %s %s but R%d has a pointer to %s %s\n",
func_name, i, func_name, i,
btf_type_str(ref_t), ref_tname, btf_type_str(ref_t), ref_tname,
......
...@@ -3551,10 +3551,14 @@ static int map_kptr_match_type(struct bpf_verifier_env *env, ...@@ -3551,10 +3551,14 @@ static int map_kptr_match_type(struct bpf_verifier_env *env,
* // to match type * // to match type
* *
* In the kptr_ref case, check_func_arg_reg_off already ensures reg->off * In the kptr_ref case, check_func_arg_reg_off already ensures reg->off
* is zero. * is zero. We must also ensure that btf_struct_ids_match does not walk
* the struct to match type against first member of struct, i.e. reject
* second case from above. Hence, when type is BPF_KPTR_REF, we set
* strict mode to true for type match.
*/ */
if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off, if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off,
off_desc->kptr.btf, off_desc->kptr.btf_id)) off_desc->kptr.btf, off_desc->kptr.btf_id,
off_desc->type == BPF_KPTR_REF))
goto bad_type; goto bad_type;
return 0; return 0;
bad_type: bad_type:
...@@ -5593,6 +5597,13 @@ static int check_reg_type(struct bpf_verifier_env *env, u32 regno, ...@@ -5593,6 +5597,13 @@ static int check_reg_type(struct bpf_verifier_env *env, u32 regno,
found: found:
if (reg->type == PTR_TO_BTF_ID) { if (reg->type == PTR_TO_BTF_ID) {
/* For bpf_sk_release, it needs to match against first member
* 'struct sock_common', hence make an exception for it. This
* allows bpf_sk_release to work for multiple socket types.
*/
bool strict_type_match = arg_type_is_release(arg_type) &&
meta->func_id != BPF_FUNC_sk_release;
if (!arg_btf_id) { if (!arg_btf_id) {
if (!compatible->btf_id) { if (!compatible->btf_id) {
verbose(env, "verifier internal error: missing arg compatible BTF ID\n"); verbose(env, "verifier internal error: missing arg compatible BTF ID\n");
...@@ -5605,7 +5616,8 @@ static int check_reg_type(struct bpf_verifier_env *env, u32 regno, ...@@ -5605,7 +5616,8 @@ static int check_reg_type(struct bpf_verifier_env *env, u32 regno,
if (map_kptr_match_type(env, meta->kptr_off_desc, reg, regno)) if (map_kptr_match_type(env, meta->kptr_off_desc, reg, regno))
return -EACCES; return -EACCES;
} else if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off, } else if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off,
btf_vmlinux, *arg_btf_id)) { btf_vmlinux, *arg_btf_id,
strict_type_match)) {
verbose(env, "R%d is of type %s but %s is expected\n", verbose(env, "R%d is of type %s but %s is expected\n",
regno, kernel_type_name(reg->btf, reg->btf_id), regno, kernel_type_name(reg->btf, reg->btf_id),
kernel_type_name(btf_vmlinux, *arg_btf_id)); kernel_type_name(btf_vmlinux, *arg_btf_id));
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment