Skip to content
On this page

eBPF Verifier

This will be a really lengthy one.

You can get an impression of the internals of a verifier from:

Note that eBPF is not Turing-complete.

BPF Permissions

Some checks in the verifier are permission based. Usually the verifier allows a wider set of operations for programs from the root user, including pointer comparison, bounded loops, etc.

The commit message of bpf: Implement CAP_BPF briefs on these permissions, and you are advised to read it first.

bpf_check

bpf_check is where the verification process starts.

It starts by checking bpf_verifier_ops- a handcrafted virtual method table thing that binds different data types to their verification functions.

Then it does some allocation and initializes a struct bpf_verifier_env.

bpf_get_btf_vmlinux initializes kernel BTF info.

The most of the work happens here:

c
// https://github.com/torvalds/linux/blob/4dc12f37a8e98e1dca5521c14625c869537b50b6/kernel/bpf/verifier.c#L15245-L15279
	ret = add_subprog_and_kfunc(env);
	if (ret < 0)
		goto skip_full_check;

	ret = check_subprogs(env);
	if (ret < 0)
		goto skip_full_check;

	ret = check_btf_info(env, attr, uattr);
	if (ret < 0)
		goto skip_full_check;

	ret = check_attach_btf_id(env);
	if (ret)
		goto skip_full_check;

	ret = resolve_pseudo_ldimm64(env);
	if (ret < 0)
		goto skip_full_check;

	if (bpf_prog_is_dev_bound(env->prog->aux)) {
		ret = bpf_prog_offload_verifier_prep(env->prog);
		if (ret)
			goto skip_full_check;
	}

	ret = check_cfg(env);
	if (ret < 0)
		goto skip_full_check;

	ret = do_check_subprogs(env);
	ret = ret ?: do_check_main(env);

	if (ret == 0 && bpf_prog_is_dev_bound(env->prog->aux))
		ret = bpf_prog_offload_finalize(env);

Let's take them down one by one.

add_subprog_and_kfunc

This function does the following:

  1. Extract all "subprogs" from the eBPF instructions.

    By "subprog" we actually mean an eBPF function, as is in BPF_PSEUDO_CALL. We will try to find the PC to their first instruction for each one.

    • The "main" subprog starts at insn[0].
    • Each BPF_PSEUDO_CALL denotes an eBPF function.
    • Each BPF_PSEUDO_FUNC relocation denotes an eBPF function. (See resolve_pseudo_ldimm64.)

    The verifier assumes and ensures that instructions in one function are consecutive, that is, the following pseudo assembly is not allowed:

    func1:
        ...
        jmp func1_part2
    func2:
        ret
    func1_part2:
        ret
    

    Therefore, we can easily locate the boundaries of a function:

    func1: // start of func1
        ...
    func2: // start of func2, end of func1
        ...
    exit:  // end of the whole program, end of func2
    

    It adds a fake "exit" subprog to the list, denoting the end of the last function.

  2. Extract all "kfunc" calls. (See BPF_PSEUDO_KFUNC_CALL.)

check_subprogs

check_subprogs checks subprogs 😛

  1. Ensure that jump instructions are within bounds (i.e., that it does not jump from one subprog to another).
  2. Ensures that one subprog does not "fall through" to another by ensuring that it ends with a BPF_EXIT or a proper jump.
  3. Checks whether a subprog contains certain instructions and sets some flags accordingly:
    • tail calls,
    • BPF_IND or BPF_ABS instructions.

check_btf_info

Checks BTF info.

BTF info is optional for most eBPF programs, unless they contain tail calls or BPF_ABS / BPF_IND instructions.

check_attach_btf_id

(WIP)

resolve_pseudo_ldimm64

Just read these comments for this function and these comments for these macros.

INFO

Why are these types of relocation done in kernel space instead of user space?

Well, the verifier needs these extra info to know what exactly lies in one register slot. Otherwise, all of these pseudo instructions translate into a single type-less LD_IMM64 instruction, and the verifier has to treat them as scalar values and forbid using them as pointers.

mov_map_ptr R1, map_1      // typed insn
mov         R1, 0xdeadbeef // type-less

mov_func    R1, func1      // typed insn
mov         R1, 0xcafebabe // type-less

check_cfg

Checks if there are unreachable instructions. (No, it cannot detect those wrapped with if (0) { ... }.)

do_check_subprogs

Checks each subprog if BTF info is present.

Notice that it calls do_check_common, which eventually calls do_check.

do_check_main

Just calls do_check_common, which eventually calls do_check.

do_check_common

Prepares a struct bpf_verifier_state and calls do_check.

For subprogs with BTF info, it sets up the state according to the types of their arguments.

Post-processing

See post-processing.

do_check

kernel/bpf/verifier.c#do_check: The central part of the verifier where it does most of the work.

If you have skimmed through the interpreter implementation, you will find that, despite being significantly more complex, do_check is quite similar to the interpreter: an outer loop, switch-like dispatching (one uses a dispatching table, while the other is if-else).

While it contains only hundreds of lines of code, you can count on it to just lead you to the other 10k lines of code, which is rather beyond my reach (yet).

Structure

Despite the daunting size of the verifier, one can split it up into several portions: