* [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET
@ 2025-07-09 22:26 Paul Chaignon
2025-07-09 22:27 ` [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET Paul Chaignon
` (2 more replies)
0 siblings, 3 replies; 8+ messages in thread
From: Paul Chaignon @ 2025-07-09 22:26 UTC (permalink / raw)
To: bpf; +Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
Syzbot reported a kernel warning due to a range invariant violation on
the following BPF program.
0: call bpf_get_netns_cookie
1: if r0 == 0 goto <exit>
2: if r0 & Oxffffffff goto <exit>
The issue is on the path where we fall through both jumps.
That path is unreachable at runtime: after insn 1, we know r0 != 0, but
with the sign extension on the jset, we would only fallthrough insn 2
if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
figure this out, so the verifier walks all branches. The verifier then
refines the register bounds using the second condition and we end
up with inconsistent bounds on this unreachable path:
1: if r0 == 0 goto <exit>
r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
2: if r0 & 0xffffffff goto <exit>
r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)
Improving the range refinement for JSET to cover all cases is tricky. We
also don't expect many users to rely on JSET given LLVM doesn't generate
those instructions. So instead of reducing false positives due to JSETs,
Eduard suggested we forget the ranges whenever we're narrowing tnums
after a JSET. This patch implements that approach.
Reported-by: syzbot+c711ce17dd78e5d4fdcf@syzkaller.appspotmail.com
Suggested-by: Eduard Zingerman <eddyz87@gmail.com>
Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
---
kernel/bpf/verifier.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 53007182b46b..e2fcea860755 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -16208,6 +16208,10 @@ static void regs_refine_cond_op(struct bpf_reg_state *reg1, struct bpf_reg_state
if (!is_reg_const(reg2, is_jmp32))
break;
val = reg_const_value(reg2, is_jmp32);
+ /* Forget the ranges before narrowing tnums, to avoid invariant
+ * violations if we're on a dead branch.
+ */
+ __mark_reg_unbounded(reg1);
if (is_jmp32) {
t = tnum_and(tnum_subreg(reg1->var_off), tnum_const(~val));
reg1->var_off = tnum_with_subreg(reg1->var_off, t);
--
2.43.0
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET
2025-07-09 22:26 [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Paul Chaignon
@ 2025-07-09 22:27 ` Paul Chaignon
2025-07-09 23:09 ` Yonghong Song
2025-07-09 23:26 ` [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Eduard Zingerman
2025-07-09 23:57 ` Yonghong Song
2 siblings, 1 reply; 8+ messages in thread
From: Paul Chaignon @ 2025-07-09 22:27 UTC (permalink / raw)
To: bpf; +Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
This patch adds coverage for the warning detected by syzkaller and fixed
in the previous patch. Without the previous patch, this test fails with:
verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds
violation u64=[0x0, 0x0] s64=[0x0, 0x0] u32=[0x1, 0x0] s32=[0x0, 0x0]
var_off=(0x0, 0x0)(1)
Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
---
.../selftests/bpf/progs/verifier_bounds.c | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)
diff --git a/tools/testing/selftests/bpf/progs/verifier_bounds.c b/tools/testing/selftests/bpf/progs/verifier_bounds.c
index 6f986ae5085e..2232bce1bdce 100644
--- a/tools/testing/selftests/bpf/progs/verifier_bounds.c
+++ b/tools/testing/selftests/bpf/progs/verifier_bounds.c
@@ -2,6 +2,7 @@
/* Converted from tools/testing/selftests/bpf/verifier/bounds.c */
#include <linux/bpf.h>
+#include <../../../include/linux/filter.h>
#include <bpf/bpf_helpers.h>
#include "bpf_misc.h"
@@ -1532,4 +1533,22 @@ __naked void sub32_partial_overflow(void)
: __clobber_all);
}
+SEC("socket")
+__description("dead branch on jset, does not result in invariants violation error")
+__success __log_level(2)
+__retval(0) __flag(BPF_F_TEST_REG_INVARIANTS)
+__naked void jset_range_analysis(void)
+{
+ asm volatile (" \
+ call %[bpf_get_netns_cookie]; \
+ if r0 == 0 goto l0_%=; \
+ .8byte %[jset]; /* if r0 & 0xffffffff goto +0 */ \
+l0_%=: r0 = 0; \
+ exit; \
+" :
+ : __imm(bpf_get_netns_cookie),
+ __imm_insn(jset, BPF_JMP_IMM(BPF_JSET, BPF_REG_0, 0xffffffff, 0))
+ : __clobber_all);
+}
+
char _license[] SEC("license") = "GPL";
--
2.43.0
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET
2025-07-09 22:27 ` [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET Paul Chaignon
@ 2025-07-09 23:09 ` Yonghong Song
2025-07-10 14:38 ` Paul Chaignon
0 siblings, 1 reply; 8+ messages in thread
From: Yonghong Song @ 2025-07-09 23:09 UTC (permalink / raw)
To: Paul Chaignon, bpf
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
On 7/9/25 3:27 PM, Paul Chaignon wrote:
> This patch adds coverage for the warning detected by syzkaller and fixed
> in the previous patch. Without the previous patch, this test fails with:
>
> verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds
> violation u64=[0x0, 0x0] s64=[0x0, 0x0] u32=[0x1, 0x0] s32=[0x0, 0x0]
> var_off=(0x0, 0x0)(1)
>
> Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
> ---
> .../selftests/bpf/progs/verifier_bounds.c | 19 +++++++++++++++++++
> 1 file changed, 19 insertions(+)
>
> diff --git a/tools/testing/selftests/bpf/progs/verifier_bounds.c b/tools/testing/selftests/bpf/progs/verifier_bounds.c
> index 6f986ae5085e..2232bce1bdce 100644
> --- a/tools/testing/selftests/bpf/progs/verifier_bounds.c
> +++ b/tools/testing/selftests/bpf/progs/verifier_bounds.c
> @@ -2,6 +2,7 @@
> /* Converted from tools/testing/selftests/bpf/verifier/bounds.c */
>
> #include <linux/bpf.h>
> +#include <../../../include/linux/filter.h>
> #include <bpf/bpf_helpers.h>
> #include "bpf_misc.h"
>
> @@ -1532,4 +1533,22 @@ __naked void sub32_partial_overflow(void)
> : __clobber_all);
> }
>
> +SEC("socket")
> +__description("dead branch on jset, does not result in invariants violation error")
> +__success __log_level(2)
> +__retval(0) __flag(BPF_F_TEST_REG_INVARIANTS)
> +__naked void jset_range_analysis(void)
> +{
> + asm volatile (" \
> + call %[bpf_get_netns_cookie]; \
> + if r0 == 0 goto l0_%=; \
> + .8byte %[jset]; /* if r0 & 0xffffffff goto +0 */ \
why not just use 'if r0 & 0xffffffff goto +0'? It will be equivelant to
BPF_JMP_IMM(BPF_JSET, BPF_REG_0, 0xffffffff, 0).
> +l0_%=: r0 = 0; \
> + exit; \
> +" :
> + : __imm(bpf_get_netns_cookie),
> + __imm_insn(jset, BPF_JMP_IMM(BPF_JSET, BPF_REG_0, 0xffffffff, 0))
> + : __clobber_all);
> +}
> +
> char _license[] SEC("license") = "GPL";
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET
2025-07-09 22:26 [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Paul Chaignon
2025-07-09 22:27 ` [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET Paul Chaignon
@ 2025-07-09 23:26 ` Eduard Zingerman
2025-07-09 23:57 ` Yonghong Song
2 siblings, 0 replies; 8+ messages in thread
From: Eduard Zingerman @ 2025-07-09 23:26 UTC (permalink / raw)
To: Paul Chaignon, bpf; +Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko
On Thu, 2025-07-10 at 00:26 +0200, Paul Chaignon wrote:
> Syzbot reported a kernel warning due to a range invariant violation on
> the following BPF program.
>
> 0: call bpf_get_netns_cookie
> 1: if r0 == 0 goto <exit>
> 2: if r0 & Oxffffffff goto <exit>
>
> The issue is on the path where we fall through both jumps.
>
> That path is unreachable at runtime: after insn 1, we know r0 != 0, but
> with the sign extension on the jset, we would only fallthrough insn 2
> if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
> figure this out, so the verifier walks all branches. The verifier then
> refines the register bounds using the second condition and we end
> up with inconsistent bounds on this unreachable path:
>
> 1: if r0 == 0 goto <exit>
> r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
> 2: if r0 & 0xffffffff goto <exit>
> r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
> r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)
>
> Improving the range refinement for JSET to cover all cases is tricky. We
> also don't expect many users to rely on JSET given LLVM doesn't generate
> those instructions. So instead of reducing false positives due to JSETs,
> Eduard suggested we forget the ranges whenever we're narrowing tnums
> after a JSET. This patch implements that approach.
>
> Reported-by: syzbot+c711ce17dd78e5d4fdcf@syzkaller.appspotmail.com
> Suggested-by: Eduard Zingerman <eddyz87@gmail.com>
> Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
> ---
Acked-by: Eduard Zingerman <eddyz87@gmail.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET
2025-07-09 22:26 [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Paul Chaignon
2025-07-09 22:27 ` [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET Paul Chaignon
2025-07-09 23:26 ` [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Eduard Zingerman
@ 2025-07-09 23:57 ` Yonghong Song
2025-07-10 14:51 ` Paul Chaignon
2 siblings, 1 reply; 8+ messages in thread
From: Yonghong Song @ 2025-07-09 23:57 UTC (permalink / raw)
To: Paul Chaignon, bpf
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
On 7/9/25 3:26 PM, Paul Chaignon wrote:
> Syzbot reported a kernel warning due to a range invariant violation on
> the following BPF program.
>
> 0: call bpf_get_netns_cookie
> 1: if r0 == 0 goto <exit>
> 2: if r0 & Oxffffffff goto <exit>
>
> The issue is on the path where we fall through both jumps.
>
> That path is unreachable at runtime: after insn 1, we know r0 != 0, but
> with the sign extension on the jset, we would only fallthrough insn 2
> if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
> figure this out, so the verifier walks all branches. The verifier then
> refines the register bounds using the second condition and we end
> up with inconsistent bounds on this unreachable path:
>
> 1: if r0 == 0 goto <exit>
> r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
> 2: if r0 & 0xffffffff goto <exit>
> r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
> r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)
>
> Improving the range refinement for JSET to cover all cases is tricky. We
> also don't expect many users to rely on JSET given LLVM doesn't generate
> those instructions. So instead of reducing false positives due to JSETs,
> Eduard suggested we forget the ranges whenever we're narrowing tnums
> after a JSET. This patch implements that approach.
>
> Reported-by: syzbot+c711ce17dd78e5d4fdcf@syzkaller.appspotmail.com
> Suggested-by: Eduard Zingerman <eddyz87@gmail.com>
> Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
> ---
> kernel/bpf/verifier.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> index 53007182b46b..e2fcea860755 100644
> --- a/kernel/bpf/verifier.c
> +++ b/kernel/bpf/verifier.c
> @@ -16208,6 +16208,10 @@ static void regs_refine_cond_op(struct bpf_reg_state *reg1, struct bpf_reg_state
> if (!is_reg_const(reg2, is_jmp32))
> break;
> val = reg_const_value(reg2, is_jmp32);
> + /* Forget the ranges before narrowing tnums, to avoid invariant
> + * violations if we're on a dead branch.
> + */
> + __mark_reg_unbounded(reg1);
> if (is_jmp32) {
> t = tnum_and(tnum_subreg(reg1->var_off), tnum_const(~val));
> reg1->var_off = tnum_with_subreg(reg1->var_off, t);
The CI reports some invariant violation:
https://github.com/kernel-patches/bpf/actions/runs/16182458904/job/45681940946?pr=9283
[ 283.030177] ------------[ cut here ]------------ [ 283.030517]
verifier bug: REG INVARIANTS VIOLATION (false_reg2): range bounds
violation u64=[0x8000000000000010, 0x800000000000000f]
s64=[0x8000000000000010, 0x800000000000000f] u32=[0x10, 0xf] s32=[0x10,
0xf] var_off=(0x8000000000000000, 0x1f)(1)
[ 283.032139] WARNING: CPU: 0 PID: 103 at kernel/bpf/verifier.c:2689
reg_bounds_sanity_check+0x1dd/0x1f0 ... Probably this change triggered
some other violations. Please take a look.
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET
2025-07-09 23:09 ` Yonghong Song
@ 2025-07-10 14:38 ` Paul Chaignon
0 siblings, 0 replies; 8+ messages in thread
From: Paul Chaignon @ 2025-07-10 14:38 UTC (permalink / raw)
To: Yonghong Song
Cc: bpf, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
On Wed, Jul 09, 2025 at 04:09:41PM -0700, Yonghong Song wrote:
>
>
> On 7/9/25 3:27 PM, Paul Chaignon wrote:
[...]
> > +SEC("socket")
> > +__description("dead branch on jset, does not result in invariants violation error")
> > +__success __log_level(2)
> > +__retval(0) __flag(BPF_F_TEST_REG_INVARIANTS)
> > +__naked void jset_range_analysis(void)
> > +{
> > + asm volatile (" \
> > + call %[bpf_get_netns_cookie]; \
> > + if r0 == 0 goto l0_%=; \
> > + .8byte %[jset]; /* if r0 & 0xffffffff goto +0 */ \
>
> why not just use 'if r0 & 0xffffffff goto +0'? It will be equivelant to
> BPF_JMP_IMM(BPF_JSET, BPF_REG_0, 0xffffffff, 0).
I was having issues with some older versions of LLVM. Some didn't
recognize jset instructions, some simply crashed. That said, the CI
seems to be fine, so let me switch this back to the simpler syntax.
>
> > +l0_%=: r0 = 0; \
> > + exit; \
> > +" :
> > + : __imm(bpf_get_netns_cookie),
> > + __imm_insn(jset, BPF_JMP_IMM(BPF_JSET, BPF_REG_0, 0xffffffff, 0))
> > + : __clobber_all);
> > +}
> > +
> > char _license[] SEC("license") = "GPL";
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET
2025-07-09 23:57 ` Yonghong Song
@ 2025-07-10 14:51 ` Paul Chaignon
2025-07-10 17:09 ` Yonghong Song
0 siblings, 1 reply; 8+ messages in thread
From: Paul Chaignon @ 2025-07-10 14:51 UTC (permalink / raw)
To: Yonghong Song
Cc: bpf, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
On Wed, Jul 09, 2025 at 04:57:28PM -0700, Yonghong Song wrote:
>
>
> On 7/9/25 3:26 PM, Paul Chaignon wrote:
> > Syzbot reported a kernel warning due to a range invariant violation on
> > the following BPF program.
> >
> > 0: call bpf_get_netns_cookie
> > 1: if r0 == 0 goto <exit>
> > 2: if r0 & Oxffffffff goto <exit>
> >
> > The issue is on the path where we fall through both jumps.
> >
> > That path is unreachable at runtime: after insn 1, we know r0 != 0, but
> > with the sign extension on the jset, we would only fallthrough insn 2
> > if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
> > figure this out, so the verifier walks all branches. The verifier then
> > refines the register bounds using the second condition and we end
> > up with inconsistent bounds on this unreachable path:
> >
> > 1: if r0 == 0 goto <exit>
> > r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
> > 2: if r0 & 0xffffffff goto <exit>
> > r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
> > r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)
> >
> > Improving the range refinement for JSET to cover all cases is tricky. We
> > also don't expect many users to rely on JSET given LLVM doesn't generate
> > those instructions. So instead of reducing false positives due to JSETs,
> > Eduard suggested we forget the ranges whenever we're narrowing tnums
> > after a JSET. This patch implements that approach.
> >
> > Reported-by: syzbot+c711ce17dd78e5d4fdcf@syzkaller.appspotmail.com
> > Suggested-by: Eduard Zingerman <eddyz87@gmail.com>
> > Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
> > ---
> > kernel/bpf/verifier.c | 4 ++++
> > 1 file changed, 4 insertions(+)
> >
> > diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> > index 53007182b46b..e2fcea860755 100644
> > --- a/kernel/bpf/verifier.c
> > +++ b/kernel/bpf/verifier.c
> > @@ -16208,6 +16208,10 @@ static void regs_refine_cond_op(struct bpf_reg_state *reg1, struct bpf_reg_state
> > if (!is_reg_const(reg2, is_jmp32))
> > break;
> > val = reg_const_value(reg2, is_jmp32);
> > + /* Forget the ranges before narrowing tnums, to avoid invariant
> > + * violations if we're on a dead branch.
> > + */
> > + __mark_reg_unbounded(reg1);
> > if (is_jmp32) {
> > t = tnum_and(tnum_subreg(reg1->var_off), tnum_const(~val));
> > reg1->var_off = tnum_with_subreg(reg1->var_off, t);
>
> The CI reports some invariant violation:
> https://github.com/kernel-patches/bpf/actions/runs/16182458904/job/45681940946?pr=9283
AFAICS, these invariant violations predate this change. They seem to be
expected and caused by selftests crossing_64_bit_signed_boundary_2 and
crossing_32_bit_signed_boundary_2 which are both marked as "known
invariants violation". They look like fairly different violations as
they are not caused by JSET instructions.
I think it's still worth having the above change for JSET because we
lose only the ranges and not the tnums, whereas with an invariant
violation, we lose all info on the register. I'm looking into the two
other invariant violations to see if there's anything we can improve
there.
>
> [ 283.030177] ------------[ cut here ]------------ [ 283.030517] verifier
> bug: REG INVARIANTS VIOLATION (false_reg2): range bounds violation
> u64=[0x8000000000000010, 0x800000000000000f] s64=[0x8000000000000010,
> 0x800000000000000f] u32=[0x10, 0xf] s32=[0x10, 0xf]
> var_off=(0x8000000000000000, 0x1f)(1)
> [ 283.032139] WARNING: CPU: 0 PID: 103 at kernel/bpf/verifier.c:2689
> reg_bounds_sanity_check+0x1dd/0x1f0 ... Probably this change triggered some
> other violations. Please take a look.
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET
2025-07-10 14:51 ` Paul Chaignon
@ 2025-07-10 17:09 ` Yonghong Song
0 siblings, 0 replies; 8+ messages in thread
From: Yonghong Song @ 2025-07-10 17:09 UTC (permalink / raw)
To: Paul Chaignon
Cc: bpf, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Eduard Zingerman
On 7/10/25 7:51 AM, Paul Chaignon wrote:
> On Wed, Jul 09, 2025 at 04:57:28PM -0700, Yonghong Song wrote:
>>
>> On 7/9/25 3:26 PM, Paul Chaignon wrote:
>>> Syzbot reported a kernel warning due to a range invariant violation on
>>> the following BPF program.
>>>
>>> 0: call bpf_get_netns_cookie
>>> 1: if r0 == 0 goto <exit>
>>> 2: if r0 & Oxffffffff goto <exit>
>>>
>>> The issue is on the path where we fall through both jumps.
>>>
>>> That path is unreachable at runtime: after insn 1, we know r0 != 0, but
>>> with the sign extension on the jset, we would only fallthrough insn 2
>>> if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
>>> figure this out, so the verifier walks all branches. The verifier then
>>> refines the register bounds using the second condition and we end
>>> up with inconsistent bounds on this unreachable path:
>>>
>>> 1: if r0 == 0 goto <exit>
>>> r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
>>> 2: if r0 & 0xffffffff goto <exit>
>>> r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
>>> r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)
>>>
>>> Improving the range refinement for JSET to cover all cases is tricky. We
>>> also don't expect many users to rely on JSET given LLVM doesn't generate
>>> those instructions. So instead of reducing false positives due to JSETs,
>>> Eduard suggested we forget the ranges whenever we're narrowing tnums
>>> after a JSET. This patch implements that approach.
>>>
>>> Reported-by: syzbot+c711ce17dd78e5d4fdcf@syzkaller.appspotmail.com
>>> Suggested-by: Eduard Zingerman <eddyz87@gmail.com>
>>> Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
>>> ---
>>> kernel/bpf/verifier.c | 4 ++++
>>> 1 file changed, 4 insertions(+)
>>>
>>> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
>>> index 53007182b46b..e2fcea860755 100644
>>> --- a/kernel/bpf/verifier.c
>>> +++ b/kernel/bpf/verifier.c
>>> @@ -16208,6 +16208,10 @@ static void regs_refine_cond_op(struct bpf_reg_state *reg1, struct bpf_reg_state
>>> if (!is_reg_const(reg2, is_jmp32))
>>> break;
>>> val = reg_const_value(reg2, is_jmp32);
>>> + /* Forget the ranges before narrowing tnums, to avoid invariant
>>> + * violations if we're on a dead branch.
>>> + */
>>> + __mark_reg_unbounded(reg1);
>>> if (is_jmp32) {
>>> t = tnum_and(tnum_subreg(reg1->var_off), tnum_const(~val));
>>> reg1->var_off = tnum_with_subreg(reg1->var_off, t);
>> The CI reports some invariant violation:
>> https://github.com/kernel-patches/bpf/actions/runs/16182458904/job/45681940946?pr=9283
> AFAICS, these invariant violations predate this change. They seem to be
> expected and caused by selftests crossing_64_bit_signed_boundary_2 and
> crossing_32_bit_signed_boundary_2 which are both marked as "known
> invariants violation". They look like fairly different violations as
> they are not caused by JSET instructions.
I double checked and that 'REG INVARIANTS VIOLATION' warning is indeed
not related to your patch so your change looks good to me. You can add
my ack like
Acked-by: Yonghong Song <yonghong.song@linux.dev>
>
> I think it's still worth having the above change for JSET because we
> lose only the ranges and not the tnums, whereas with an invariant
> violation, we lose all info on the register. I'm looking into the two
> other invariant violations to see if there's anything we can improve
> there.
Thanks for looking at this!
>
>> [ 283.030177] ------------[ cut here ]------------ [ 283.030517] verifier
>> bug: REG INVARIANTS VIOLATION (false_reg2): range bounds violation
>> u64=[0x8000000000000010, 0x800000000000000f] s64=[0x8000000000000010,
>> 0x800000000000000f] u32=[0x10, 0xf] s32=[0x10, 0xf]
>> var_off=(0x8000000000000000, 0x1f)(1)
>> [ 283.032139] WARNING: CPU: 0 PID: 103 at kernel/bpf/verifier.c:2689
>> reg_bounds_sanity_check+0x1dd/0x1f0 ... Probably this change triggered some
>> other violations. Please take a look.
>>
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2025-07-10 17:09 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-09 22:26 [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Paul Chaignon
2025-07-09 22:27 ` [PATCH bpf-next 2/2] selftests/bpf: Range analysis test case for JSET Paul Chaignon
2025-07-09 23:09 ` Yonghong Song
2025-07-10 14:38 ` Paul Chaignon
2025-07-09 23:26 ` [PATCH bpf-next 1/2] bpf: Forget ranges when refining tnum after JSET Eduard Zingerman
2025-07-09 23:57 ` Yonghong Song
2025-07-10 14:51 ` Paul Chaignon
2025-07-10 17:09 ` Yonghong Song
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).