Conditional Jump Tracking
do_check
calls check_cond_jmp_op
to update tracked values and diverge the execution path.
INFO
Among JMP/JMP32
opcodes, there are some other instructions:
BPF_CALL
: Function callsBPF_EXIT
: ReturnsBPF_JA
: Unconditional jumps
Verifying them is done elsewhere.
check_cond_jmp_op
Some important functions that it calls (i.e., those functions that it passes an opcode
parameter):
is_branch_taken
: According to the comments, it willcompute branch direction of the expression "if (reg opcode val) goto target;"
.reg_combine_min_max
: WithBPF_JEQ
for example,a == b
means that they share the same set of possible values and this can be used to narrow down the their ranges.reg_set_min_max
: Adjusts the ranges of scalars for branches after comparison likea < constant
ora >= constant
, etc.reg_set_min_max_inv
: Wrapper ofreg_set_min_max
with inverted parameter pair (e.g.,constant > b
).find_equal_scalars
: Seems to propagate scalar info to other registers that were assigned the same value.
Pointer comparison:
mark_ptr_or_null_regs
: Mark non-null / null pointers.try_match_pkt_pointers
: Pattern matching packet pointer comparison, gathering packet size info.
Some straightforward checks:
- Disallowing pointer comparison unless
allow_ptr_leaks
is on.
(WIP)
Register state propagation
Sometimes you have too many variables in your program and the compiler has to spill them onto the stack. (Or if you are using clang -O0
, then all variables are allocated on the stack by default.)
Now consider the following scenario (in pseudo eBPF assembly):
call func1 # return values is stored in r0
*(u64*)(r10 - 8) = r0 # spilling r0 onto stack
... # doing other stuff
r1 = *(u64*)(r10 - 8) # getting the value back
if r1 > 1000 goto +20 # conditional jump
We know that r1 = *(u64*)(r10 - 8)
. So if r1 > 1000
, we believe *(u64*)(r10 - 8) > 100
holds as well. The eBPF verifier puts some effort into passing these information around by doing the following:
- Assign each value a unique id;
- The id is generated from
++env->id_gen
. Since the verifier limits the number of total instructions in a verification branch, we should be safe from overflowing theu32
field.
- The id is generated from
- Pass the id on when copying values;
- Clear the id field each time the value gets changed.
Read the source code for more information:
bpf_verifier.h#bpf_for_each_spilled_reg
: The verifier walks through the whole allocated stack for spilled registers.bpf_verifier.h#bpf_for_each_reg_in_vstate
: A macro to iterate through all register values (including spilled ones).struct bpf_verifier_env
: Theid_gen
field is used to generate unique ids for values and pointers. (You can search for++env->id_gen
inverifier.c
for its usages.verifier.c#find_equal_scalars
: Propagates a value to registers of the same id.