diff options
-rw-r--r-- | include/uapi/linux/bpf.h | 1 | ||||
-rw-r--r-- | kernel/bpf/verifier.c | 70 |
2 files changed, 69 insertions, 2 deletions
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index 4a3d0f84f178..45da7ec7d274 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h | |||
@@ -117,6 +117,7 @@ enum bpf_map_type { | |||
117 | 117 | ||
118 | enum bpf_prog_type { | 118 | enum bpf_prog_type { |
119 | BPF_PROG_TYPE_UNSPEC, | 119 | BPF_PROG_TYPE_UNSPEC, |
120 | BPF_PROG_TYPE_SOCKET_FILTER, | ||
120 | }; | 121 | }; |
121 | 122 | ||
122 | /* flags for BPF_MAP_UPDATE_ELEM command */ | 123 | /* flags for BPF_MAP_UPDATE_ELEM command */ |
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index b6a1f7c14a67..a28e09c7825d 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c | |||
@@ -1172,6 +1172,70 @@ static int check_ld_imm(struct verifier_env *env, struct bpf_insn *insn) | |||
1172 | return 0; | 1172 | return 0; |
1173 | } | 1173 | } |
1174 | 1174 | ||
1175 | /* verify safety of LD_ABS|LD_IND instructions: | ||
1176 | * - they can only appear in the programs where ctx == skb | ||
1177 | * - since they are wrappers of function calls, they scratch R1-R5 registers, | ||
1178 | * preserve R6-R9, and store return value into R0 | ||
1179 | * | ||
1180 | * Implicit input: | ||
1181 | * ctx == skb == R6 == CTX | ||
1182 | * | ||
1183 | * Explicit input: | ||
1184 | * SRC == any register | ||
1185 | * IMM == 32-bit immediate | ||
1186 | * | ||
1187 | * Output: | ||
1188 | * R0 - 8/16/32-bit skb data converted to cpu endianness | ||
1189 | */ | ||
1190 | static int check_ld_abs(struct verifier_env *env, struct bpf_insn *insn) | ||
1191 | { | ||
1192 | struct reg_state *regs = env->cur_state.regs; | ||
1193 | u8 mode = BPF_MODE(insn->code); | ||
1194 | struct reg_state *reg; | ||
1195 | int i, err; | ||
1196 | |||
1197 | if (env->prog->aux->prog_type != BPF_PROG_TYPE_SOCKET_FILTER) { | ||
1198 | verbose("BPF_LD_ABS|IND instructions are only allowed in socket filters\n"); | ||
1199 | return -EINVAL; | ||
1200 | } | ||
1201 | |||
1202 | if (insn->dst_reg != BPF_REG_0 || insn->off != 0 || | ||
1203 | (mode == BPF_ABS && insn->src_reg != BPF_REG_0)) { | ||
1204 | verbose("BPF_LD_ABS uses reserved fields\n"); | ||
1205 | return -EINVAL; | ||
1206 | } | ||
1207 | |||
1208 | /* check whether implicit source operand (register R6) is readable */ | ||
1209 | err = check_reg_arg(regs, BPF_REG_6, SRC_OP); | ||
1210 | if (err) | ||
1211 | return err; | ||
1212 | |||
1213 | if (regs[BPF_REG_6].type != PTR_TO_CTX) { | ||
1214 | verbose("at the time of BPF_LD_ABS|IND R6 != pointer to skb\n"); | ||
1215 | return -EINVAL; | ||
1216 | } | ||
1217 | |||
1218 | if (mode == BPF_IND) { | ||
1219 | /* check explicit source operand */ | ||
1220 | err = check_reg_arg(regs, insn->src_reg, SRC_OP); | ||
1221 | if (err) | ||
1222 | return err; | ||
1223 | } | ||
1224 | |||
1225 | /* reset caller saved regs to unreadable */ | ||
1226 | for (i = 0; i < CALLER_SAVED_REGS; i++) { | ||
1227 | reg = regs + caller_saved[i]; | ||
1228 | reg->type = NOT_INIT; | ||
1229 | reg->imm = 0; | ||
1230 | } | ||
1231 | |||
1232 | /* mark destination R0 register as readable, since it contains | ||
1233 | * the value fetched from the packet | ||
1234 | */ | ||
1235 | regs[BPF_REG_0].type = UNKNOWN_VALUE; | ||
1236 | return 0; | ||
1237 | } | ||
1238 | |||
1175 | /* non-recursive DFS pseudo code | 1239 | /* non-recursive DFS pseudo code |
1176 | * 1 procedure DFS-iterative(G,v): | 1240 | * 1 procedure DFS-iterative(G,v): |
1177 | * 2 label v as discovered | 1241 | * 2 label v as discovered |
@@ -1677,8 +1741,10 @@ process_bpf_exit: | |||
1677 | u8 mode = BPF_MODE(insn->code); | 1741 | u8 mode = BPF_MODE(insn->code); |
1678 | 1742 | ||
1679 | if (mode == BPF_ABS || mode == BPF_IND) { | 1743 | if (mode == BPF_ABS || mode == BPF_IND) { |
1680 | verbose("LD_ABS is not supported yet\n"); | 1744 | err = check_ld_abs(env, insn); |
1681 | return -EINVAL; | 1745 | if (err) |
1746 | return err; | ||
1747 | |||
1682 | } else if (mode == BPF_IMM) { | 1748 | } else if (mode == BPF_IMM) { |
1683 | err = check_ld_imm(env, insn); | 1749 | err = check_ld_imm(env, insn); |
1684 | if (err) | 1750 | if (err) |