Em Tue, Nov 14, 2017 at 02:09:34PM +0100, Daniel Borkmann escreveu: > On 11/14/2017 01:58 PM, Arnaldo Carvalho de Melo wrote: > > Em Tue, Nov 14, 2017 at 01:09:39AM +0100, Daniel Borkmann escreveu: > >> On 11/13/2017 04:08 PM, Arnaldo Carvalho de Melo wrote: > >>> libbpf: -- BEGIN DUMP LOG --- > >>> libbpf: > >>> 0: (79) r3 = *(u64 *)(r1 +104) > >>> 1: (b7) r2 = 0 > >>> 2: (bf) r6 = r1 > >>> 3: (bf) r1 = r10 > >>> 4: (07) r1 += -128 > >>> 5: (b7) r2 = 128 > >>> 6: (85) call bpf_probe_read_str#45 > >>> 7: (bf) r1 = r0 > >>> 8: (07) r1 += -1 > >>> 9: (67) r1 <<= 32 > >>> 10: (77) r1 >>= 32 > >>> 11: (25) if r1 > 0x7f goto pc+11 > >> > >> Right, so the compiler is optimizing the two tests into a single one above, > >> which means lower bound cannot properly be derived again by the verifier > >> due > >> to this and thus you'll get the error. Similar issue was seen recently [1]. > >> > >> Does the below hack work for you? > >> > >> int prog([...]) > >> { > >> char filename[128]; > >> int ret = bpf_probe_read_str(filename, sizeof(filename), > >> filename_ptr); > >> if (ret > 0) > >> bpf_perf_event_output(ctx, &__bpf_stdout__, > >> BPF_F_CURRENT_CPU, filename, > >> ret & (sizeof(filename) - 1)); > >> return 1; > >> } > >> > >> r0 should keep on tracking bounds here at least: > >> > >> prog: > >> 0: bf 16 00 00 00 00 00 00 r6 = r1 > >> 1: bf a1 00 00 00 00 00 00 r1 = r10 > >> 2: 07 01 00 00 80 ff ff ff r1 += -128 > >> 3: b7 02 00 00 80 00 00 00 r2 = 128 > >> 4: 85 00 00 00 2d 00 00 00 call 45 > >> 5: 67 00 00 00 20 00 00 00 r0 <<= 32 > >> 6: c7 00 00 00 20 00 00 00 r0 s>>= 32 > >> 7: b7 01 00 00 01 00 00 00 r1 = 1 > >> 8: 6d 01 0a 00 00 00 00 00 if r1 s> r0 goto 10 > >> 9: 57 00 00 00 7f 00 00 00 r0 &= 127 > >> 10: bf a4 00 00 00 00 00 00 r4 = r10 > >> 11: 07 04 00 00 80 ff ff ff r4 += -128 > >> 12: bf 61 00 00 00 00 00 00 r1 = r6 > >> 13: 18 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 r2 = 0ll > >> 15: 18 03 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 r3 = > >> 4294967295ll > >> 17: bf 05 00 00 00 00 00 00 r5 = r0 > >> 18: 85 00 00 00 19 00 00 00 call 25 > >> > >> [1] http://patchwork.ozlabs.org/project/netdev/list/?series=13211 > > > > Not yet: > > > > 6: (85) call bpf_probe_read_str#45 > > 7: (bf) r1 = r0 > > 8: (67) r1 <<= 32 > > 9: (77) r1 >>= 32 > > 10: (15) if r1 == 0x0 goto pc+10 > > R0=inv(id=0) R1=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) > > R6=ctx(id=0,off=0,imm=0) R10=fp0 > > 11: (57) r0 &= 127 > > 12: (bf) r4 = r10 > > 13: (07) r4 += -128 > > 14: (bf) r1 = r6 > > 15: (18) r2 = 0xffff92bfc2aba840 > > 17: (18) r3 = 0xffffffff > > 19: (bf) r5 = r0 > > 20: (85) call bpf_perf_event_output#25 > > invalid stack type R4 off=-128 access_size=0 > > > > I'll try updating clang/llvm... > > > > Full details: > > > > [root@jouet bpf]# cat open.c > > #include "bpf.h" > > > > SEC("prog=do_sys_open filename") > > int prog(void *ctx, int err, const char __user *filename_ptr) > > { > > char filename[128]; > > const unsigned len = bpf_probe_read_str(filename, sizeof(filename), > > filename_ptr); > > Btw, I was using 'int' here above instead of 'unsigned' as > strncpy_from_unsafe() > could potentially return errors like -EFAULT.
I changed to int, didn't help > Currently having a version compiled from the git tree: > > # llc --version > LLVM (http://llvm.org/): > LLVM version 6.0.0git-2d810c2 > Optimized build. > Default target: x86_64-unknown-linux-gnu > Host CPU: skylake [root@jouet bpf]# llc --version LLVM (http://llvm.org/): LLVM version 4.0.0svn Old stuff! ;-) Will change, but improving these messages should be on the radar, I think :-) - Arnaldo > Registered Targets: > bpf - BPF (host endian) > bpfeb - BPF (big endian) > bpfel - BPF (little endian) > x86 - 32-bit X86: Pentium-Pro and above > x86-64 - 64-bit X86: EM64T and AMD64 > > > if (len > 0) > > perf_event_output(ctx, &__bpf_stdout__, > > BPF_F_CURRENT_CPU, filename, > > len & (sizeof(filename) - 1)); > > return 1; > > }