Skip to content

Commit c131187

Browse files
4astborkmann
authored andcommitted
bpf: fix branch pruning logic
when the verifier detects that register contains a runtime constant and it's compared with another constant it will prune exploration of the branch that is guaranteed not to be taken at runtime. This is all correct, but malicious program may be constructed in such a way that it always has a constant comparison and the other branch is never taken under any conditions. In this case such path through the program will not be explored by the verifier. It won't be taken at run-time either, but since all instructions are JITed the malicious program may cause JITs to complain about using reserved fields, etc. To fix the issue we have to track the instructions explored by the verifier and sanitize instructions that are dead at run time with NOPs. We cannot reject such dead code, since llvm generates it for valid C code, since it doesn't do as much data flow analysis as the verifier does. Fixes: 17a5267 ("bpf: verifier (add verifier core)") Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
1 parent 107af8e commit c131187

File tree

2 files changed

+28
-1
lines changed

2 files changed

+28
-1
lines changed

include/linux/bpf_verifier.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ struct bpf_insn_aux_data {
115115
struct bpf_map *map_ptr; /* pointer for call insn into lookup_elem */
116116
};
117117
int ctx_field_size; /* the ctx field size for load insn, maybe 0 */
118-
int converted_op_size; /* the valid value width after perceived conversion */
118+
bool seen; /* this insn was processed by the verifier */
119119
};
120120

121121
#define MAX_USED_MAPS 64 /* max number of maps accessed by one eBPF program */

kernel/bpf/verifier.c

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3827,6 +3827,7 @@ static int do_check(struct bpf_verifier_env *env)
38273827
return err;
38283828

38293829
regs = cur_regs(env);
3830+
env->insn_aux_data[insn_idx].seen = true;
38303831
if (class == BPF_ALU || class == BPF_ALU64) {
38313832
err = check_alu_op(env, insn);
38323833
if (err)
@@ -4022,6 +4023,7 @@ static int do_check(struct bpf_verifier_env *env)
40224023
return err;
40234024

40244025
insn_idx++;
4026+
env->insn_aux_data[insn_idx].seen = true;
40254027
} else {
40264028
verbose(env, "invalid BPF_LD mode\n");
40274029
return -EINVAL;
@@ -4204,6 +4206,7 @@ static int adjust_insn_aux_data(struct bpf_verifier_env *env, u32 prog_len,
42044206
u32 off, u32 cnt)
42054207
{
42064208
struct bpf_insn_aux_data *new_data, *old_data = env->insn_aux_data;
4209+
int i;
42074210

42084211
if (cnt == 1)
42094212
return 0;
@@ -4213,6 +4216,8 @@ static int adjust_insn_aux_data(struct bpf_verifier_env *env, u32 prog_len,
42134216
memcpy(new_data, old_data, sizeof(struct bpf_insn_aux_data) * off);
42144217
memcpy(new_data + off + cnt - 1, old_data + off,
42154218
sizeof(struct bpf_insn_aux_data) * (prog_len - off - cnt + 1));
4219+
for (i = off; i < off + cnt - 1; i++)
4220+
new_data[i].seen = true;
42164221
env->insn_aux_data = new_data;
42174222
vfree(old_data);
42184223
return 0;
@@ -4231,6 +4236,25 @@ static struct bpf_prog *bpf_patch_insn_data(struct bpf_verifier_env *env, u32 of
42314236
return new_prog;
42324237
}
42334238

4239+
/* The verifier does more data flow analysis than llvm and will not explore
4240+
* branches that are dead at run time. Malicious programs can have dead code
4241+
* too. Therefore replace all dead at-run-time code with nops.
4242+
*/
4243+
static void sanitize_dead_code(struct bpf_verifier_env *env)
4244+
{
4245+
struct bpf_insn_aux_data *aux_data = env->insn_aux_data;
4246+
struct bpf_insn nop = BPF_MOV64_REG(BPF_REG_0, BPF_REG_0);
4247+
struct bpf_insn *insn = env->prog->insnsi;
4248+
const int insn_cnt = env->prog->len;
4249+
int i;
4250+
4251+
for (i = 0; i < insn_cnt; i++) {
4252+
if (aux_data[i].seen)
4253+
continue;
4254+
memcpy(insn + i, &nop, sizeof(nop));
4255+
}
4256+
}
4257+
42344258
/* convert load instructions that access fields of 'struct __sk_buff'
42354259
* into sequence of instructions that access fields of 'struct sk_buff'
42364260
*/
@@ -4557,6 +4581,9 @@ int bpf_check(struct bpf_prog **prog, union bpf_attr *attr)
45574581
while (!pop_stack(env, NULL, NULL));
45584582
free_states(env);
45594583

4584+
if (ret == 0)
4585+
sanitize_dead_code(env);
4586+
45604587
if (ret == 0)
45614588
/* program is valid, convert *(u32*)(ctx + off) accesses */
45624589
ret = convert_ctx_accesses(env);

0 commit comments

Comments
 (0)