BPF List
 help / color / mirror / Atom feed
* Packet pointers with 32-bit assignments
@ 2022-02-02 20:59 Paul Chaignon
  2022-02-03  3:24 ` Yonghong Song
  0 siblings, 1 reply; 3+ messages in thread
From: Paul Chaignon @ 2022-02-02 20:59 UTC (permalink / raw)
  To: bpf; +Cc: Yonghong Song

Hi,

We're hitting the following verifier error in Cilium, on bpf-next
(86c7ecad3bf8) with LLVM 10.0.0 and mcpu=v3.

    ; return (void *)(unsigned long)ctx->data;
    2: (61) r9 = *(u32 *)(r7 +76)
    ; R7_w=ctx(id=0,off=0,imm=0) R9_w=pkt(id=0,off=0,r=0,imm=0)
    ; return (void *)(unsigned long)ctx->data;
    3: (bc) w6 = w9
    ; R6_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_w=pkt(id=0,off=0,r=0,imm=0)
    ; if (data + tot_len > data_end)
    4: (bf) r2 = r6
    ; R2_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R6_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff))
    5: (07) r2 += 54
    ; R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
    ; if (data + tot_len > data_end)
    6: (2d) if r2 > r1 goto pc+466
    ; R1_w=pkt_end(id=0,off=0,imm=0) R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
    ; tmp = a->d1 - b->d1;
    7: (71) r2 = *(u8 *)(r6 +22)
    R6 invalid mem access 'inv'

As seen above, the verifier loses track of the packet pointer at
instruction 3, which then leads to an invalid memory access. Since
ctx->data is on 32 bits, LLVM generated a 32-bit assignment at
instruction 3.

We're usually able to avoid this by removing all 32-bit comparisons and
additions with the 64-bit variables for data and data_end. But in this
case, all variables are already on 64 bits.

Is there maybe a compiler patch we're missing which prevents such
assignments? If not, could we teach the verifier to track and convert
such assignments?

Regards,
Paul

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Packet pointers with 32-bit assignments
  2022-02-02 20:59 Packet pointers with 32-bit assignments Paul Chaignon
@ 2022-02-03  3:24 ` Yonghong Song
  2022-02-03 18:21   ` Paul Chaignon
  0 siblings, 1 reply; 3+ messages in thread
From: Yonghong Song @ 2022-02-03  3:24 UTC (permalink / raw)
  To: Paul Chaignon, bpf



On 2/2/22 12:59 PM, Paul Chaignon wrote:
> Hi,
> 
> We're hitting the following verifier error in Cilium, on bpf-next
> (86c7ecad3bf8) with LLVM 10.0.0 and mcpu=v3.
> 
>      ; return (void *)(unsigned long)ctx->data;
>      2: (61) r9 = *(u32 *)(r7 +76)
>      ; R7_w=ctx(id=0,off=0,imm=0) R9_w=pkt(id=0,off=0,r=0,imm=0)
>      ; return (void *)(unsigned long)ctx->data;
>      3: (bc) w6 = w9
>      ; R6_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_w=pkt(id=0,off=0,r=0,imm=0)
>      ; if (data + tot_len > data_end)
>      4: (bf) r2 = r6
>      ; R2_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R6_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff))
>      5: (07) r2 += 54
>      ; R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
>      ; if (data + tot_len > data_end)
>      6: (2d) if r2 > r1 goto pc+466
>      ; R1_w=pkt_end(id=0,off=0,imm=0) R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
>      ; tmp = a->d1 - b->d1;
>      7: (71) r2 = *(u8 *)(r6 +22)
>      R6 invalid mem access 'inv'
> 
> As seen above, the verifier loses track of the packet pointer at
> instruction 3, which then leads to an invalid memory access. Since
> ctx->data is on 32 bits, LLVM generated a 32-bit assignment at
> instruction 3.
> 
> We're usually able to avoid this by removing all 32-bit comparisons and
> additions with the 64-bit variables for data and data_end. But in this
> case, all variables are already on 64 bits.
> 
> Is there maybe a compiler patch we're missing which prevents such
> assignments? If not, could we teach the verifier to track and convert
> such assignments?

We kind of tackled this problem sometimes back. For example, the
following is a proposed llvm builtin for this purpose:
   https://reviews.llvm.org/D81479
   https://reviews.llvm.org/D81480
the builtin looks like
   void *ptr = __builtin_bpf_load_u32_to_ptr(void *base,
                   int const_offset);

The patches are abandoned since the functionality can be
achieved with bpf asm code. Something likes below
    asm("%0 = *(u32 *)(%1 + %2)" : "=r"(ptr) : "r"(ctx), "i"(76));
We could define the above asm insn as a macro and put it
in bpf_helpers.h.

Could you give a try?

> 
> Regards,
> Paul

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Packet pointers with 32-bit assignments
  2022-02-03  3:24 ` Yonghong Song
@ 2022-02-03 18:21   ` Paul Chaignon
  0 siblings, 0 replies; 3+ messages in thread
From: Paul Chaignon @ 2022-02-03 18:21 UTC (permalink / raw)
  To: Yonghong Song, bpf

On Wed, Feb 02, 2022 at 07:24:20PM -0800, Yonghong Song wrote:
> 
> 
> On 2/2/22 12:59 PM, Paul Chaignon wrote:
> > Hi,
> > 
> > We're hitting the following verifier error in Cilium, on bpf-next
> > (86c7ecad3bf8) with LLVM 10.0.0 and mcpu=v3.
> > 
> >      ; return (void *)(unsigned long)ctx->data;
> >      2: (61) r9 = *(u32 *)(r7 +76)
> >      ; R7_w=ctx(id=0,off=0,imm=0) R9_w=pkt(id=0,off=0,r=0,imm=0)
> >      ; return (void *)(unsigned long)ctx->data;
> >      3: (bc) w6 = w9
> >      ; R6_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_w=pkt(id=0,off=0,r=0,imm=0)
> >      ; if (data + tot_len > data_end)
> >      4: (bf) r2 = r6
> >      ; R2_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R6_w=inv(id=1,umax_value=4294967295,var_off=(0x0; 0xffffffff))
> >      5: (07) r2 += 54
> >      ; R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
> >      ; if (data + tot_len > data_end)
> >      6: (2d) if r2 > r1 goto pc+466
> >      ; R1_w=pkt_end(id=0,off=0,imm=0) R2_w=inv(id=0,umin_value=54,umax_value=4294967349,var_off=(0x0; 0x1ffffffff))
> >      ; tmp = a->d1 - b->d1;
> >      7: (71) r2 = *(u8 *)(r6 +22)
> >      R6 invalid mem access 'inv'
> > 
> > As seen above, the verifier loses track of the packet pointer at
> > instruction 3, which then leads to an invalid memory access. Since
> > ctx->data is on 32 bits, LLVM generated a 32-bit assignment at
> > instruction 3.
> > 
> > We're usually able to avoid this by removing all 32-bit comparisons and
> > additions with the 64-bit variables for data and data_end. But in this
> > case, all variables are already on 64 bits.
> > 
> > Is there maybe a compiler patch we're missing which prevents such
> > assignments? If not, could we teach the verifier to track and convert
> > such assignments?
> 
> We kind of tackled this problem sometimes back. For example, the
> following is a proposed llvm builtin for this purpose:
>   https://reviews.llvm.org/D81479
>   https://reviews.llvm.org/D81480
> the builtin looks like
>   void *ptr = __builtin_bpf_load_u32_to_ptr(void *base,
>                   int const_offset);
> 
> The patches are abandoned since the functionality can be
> achieved with bpf asm code. Something likes below
>    asm("%0 = *(u32 *)(%1 + %2)" : "=r"(ptr) : "r"(ctx), "i"(76));
> We could define the above asm insn as a macro and put it
> in bpf_helpers.h.
> 
> Could you give a try?

It works fine! One more piece of asm bytecode in Cilium but who's
counting at this point :))

Thanks Yonghong!

> 
> > 
> > Regards,
> > Paul

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-02-03 18:21 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-02-02 20:59 Packet pointers with 32-bit assignments Paul Chaignon
2022-02-03  3:24 ` Yonghong Song
2022-02-03 18:21   ` Paul Chaignon

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox