Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp478999rwi; Wed, 2 Nov 2022 14:18:36 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4aPZEh3Ds1RGyeUOMaWeryCgb1BwirPdB3ZjdIPSq1/sXBOW2SlNoC5EBNqUOb4SXGmqJr X-Received: by 2002:a17:902:9049:b0:180:7922:ce36 with SMTP id w9-20020a170902904900b001807922ce36mr27570801plz.30.1667423916324; Wed, 02 Nov 2022 14:18:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667423916; cv=none; d=google.com; s=arc-20160816; b=SyAgelHTaf/h5YiOPJMis8QlENlV6Vk1XFtkTqVVUESeKYCHE1JaBdmo/WxXJkcPmQ 3IJ+DajRdfExT8hXtgSBf1bjrcBZXOdoaTmtdYaudH4n51OmFk/aeRRKxYsmG9fUDtmF Fw2BTQG5ZCG64DwCS24fT/bLSVDe3VCk8DH0myntilOddUTx6T/qSK8mQg/kXr8cc/Ak 6aJ9FDrSzCD/TTtxEWhYnPHUylb+aYwoXf7eJi5udEDjmFVWQhtAu0/vTf6oONSFTTQM NJR+3qIA7xzOG0sHKKca7j/AFgAPleB2mh6uHYC8VNOpYDpNNt+lRUIuvt6eQChrenTo dj8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=4DW7Wiuo6fJB+ChU3jee/4BtuzHzCYAkn/6YSsK1vmI=; b=b2Qhkqx36iprQQCbtf7UR3oeQ+2BRorSI0UXhyiz+mj8s6EJBTqbP1xRyFGQd8I6Qo 3cv4urNyw72BBI4Snm8pEMLmnYcPOudwNlqssukIYlkAsbyyQHH29QKe39gaWmLZcsoB Vy9ljezFTkfx2ueH0Kt0BlPfTg/lSJIUIE/FKUmsLVubpXKOhSDN6/aE/EgkE+9XKP1E Um5w/p0KcgU5S0/aRbJjjXalq4f88x7ZhiUFNWCJjcpNg8JpWjawDFoxfYS1oVhtmeHJ swDUt2YjwGeGvUNd6bE9JagefrXhCmXPqIxLWalkDvv5ziNoUFykpitQNQDOexV9+J1c M8dA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Q7lUWSdl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p33-20020a635b21000000b0045a8b142a48si19833668pgb.657.2022.11.02.14.18.23; Wed, 02 Nov 2022 14:18:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Q7lUWSdl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229637AbiKBUst (ORCPT + 99 others); Wed, 2 Nov 2022 16:48:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229770AbiKBUsr (ORCPT ); Wed, 2 Nov 2022 16:48:47 -0400 Received: from mail-pg1-x544.google.com (mail-pg1-x544.google.com [IPv6:2607:f8b0:4864:20::544]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD088BF8; Wed, 2 Nov 2022 13:48:45 -0700 (PDT) Received: by mail-pg1-x544.google.com with SMTP id b62so6885662pgc.0; Wed, 02 Nov 2022 13:48:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=4DW7Wiuo6fJB+ChU3jee/4BtuzHzCYAkn/6YSsK1vmI=; b=Q7lUWSdlJceUvvMpMpEbEjJ64Rj4NNGqAsAj5KeEvlZWRIffiwxarEIwuqTdnmPxAk kwfvmpUCQShTDMxHkSU9m9c1uc+HQMgwckdwVFxK/AmA/5r4B1LuRQXIz6WhvmB9b4IJ fG/cY9IK2DbpK7HVI108wU+he/bT+RxWBSV7RGKU3yygwxmY8vgVs0rn1+hwZsuEvXUE eTE7QCaYokAZ5u4YwbyOfYiVx45/2zX9xUjJ8LcmYQ7Wynja7cEbTiOlugPJSoA7Qgcx lApkacBkCeeogcKhxTqwA+XF+CCIy5EzRxWsrPHkylJ3I1nBq0R+NEfpcPnXstqwArg0 rz2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=4DW7Wiuo6fJB+ChU3jee/4BtuzHzCYAkn/6YSsK1vmI=; b=yLE/SaIBlXJP2VGKyHalGoH5UcGWKjxpC3zCzFEexqg8ajv6hlnEQiPsMcATTZDN69 KRj81InImnODAH6MNOxp2gbrKKby9NAi36W2eI51wM6WnOwpzWfdwBMdM1xSQp2bQeN7 uZejfoAU0s/zvpxrlMXHUIfFyAq+NzHdwQJBUFkQztWrNU0Mq6lfMC6ogA9A+VrdB38A sRcWEYwo1J+3xnFUGSBHmoftEhJY/WCfopRjwQDCq6TC4KxBAdkPk7auRqmjwQ6KjA33 hjuAceFzMgDeT2iBob1u29xV8BFXjEWIkWVPaCMo7SLtWV+IbTuBnBMocUqvU44LBQel l19g== X-Gm-Message-State: ACrzQf0gMRDu7qErGZDVjg23++2usZTuMwshRNAffnP5hftzd00p4JPh ikj3QB+mcukGjfP7HCfQoto= X-Received: by 2002:a63:cd42:0:b0:46f:9f49:9468 with SMTP id a2-20020a63cd42000000b0046f9f499468mr18598178pgj.361.1667422125080; Wed, 02 Nov 2022 13:48:45 -0700 (PDT) Received: from localhost ([59.152.80.69]) by smtp.gmail.com with ESMTPSA id g31-20020a63565f000000b00460fbe0d75esm7988167pgm.31.2022.11.02.13.48.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 02 Nov 2022 13:48:44 -0700 (PDT) Date: Thu, 3 Nov 2022 02:18:35 +0530 From: Kumar Kartikeya Dwivedi To: Alexei Starovoitov Cc: David Vernet , bpf , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , LKML , Kernel Team , Tejun Heo Subject: Re: [PATCH bpf-next v6 1/3] bpf: Allow trusted pointers to be passed to KF_TRUSTED_ARGS kfuncs Message-ID: <20221102204835.uxze44lottozywbj@apollo> References: <20221020222416.3415511-1-void@manifault.com> <20221020222416.3415511-2-void@manifault.com> <20221101000239.pbbmym4mbdbmnzjd@macbook-pro-4.dhcp.thefacebook.com> <20221102003222.2isv2ewxxamoe6lw@macbook-pro-4.dhcp.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 02, 2022 at 08:04:57AM IST, Alexei Starovoitov wrote: > On Tue, Nov 1, 2022 at 6:01 PM Kumar Kartikeya Dwivedi wrote: > > > > On Wed, 2 Nov 2022 at 06:02, Alexei Starovoitov > > wrote: > > > > > > On Wed, Nov 02, 2022 at 04:01:11AM +0530, Kumar Kartikeya Dwivedi wrote: > > > > On Wed, 2 Nov 2022 at 03:06, David Vernet wrote: > > > > > > > > > > On Tue, Nov 01, 2022 at 01:22:39PM -0700, Alexei Starovoitov wrote: > > > > > > On Tue, Nov 1, 2022 at 11:11 AM David Vernet wrote: > > > > > > > > > > > > > > > What kind of bpf prog will be able to pass 'struct nf_conn___init *' into these bpf_ct_* ? > > > > > > > > We've introduced / vs nf_conf specifically to express the relationship > > > > > > > > between allocated nf_conn and other nf_conn-s via different types. > > > > > > > > Why is this not enough? > > > > > > > > > > > > > > Kumar should have more context here (he originally suggested this in > > > > > > > [0]), > > > > > > > > > > > > Quoting: > > > > > > " > > > > > > Unfortunately a side effect of this change is that now since > > > > > > PTR_TO_BTF_ID without ref_obj_id is considered trusted, the bpf_ct_* > > > > > > functions would begin working with tp_btf args. > > > > > > " > > > > > > I couldn't find any tracepoint that has nf_conn___init as an argument. > > > > > > The whole point of that new type was to return it to bpf prog, > > > > > > so the verifier type matches it when it's passed into bpf_ct_* > > > > > > in turn. > > > > > > So I don't see a need for a new OWNED flag still. > > > > > > If nf_conn___init is passed into tracepoint it's a bug and > > > > > > we gotta fix it. > > > > > > > > > > Yep, this is what I'm seeing as well. I think you're right that > > > > > KF_OWNED_ARGS is just strictly unnecessary and that creating wrapper > > > > > types is the way to enable an ownership model like this. > > > > > > > > > > > > > It's not just nf_conn___init. Some CT helpers also take nf_conn. > > > > e.g. bpf_ct_change_timeout, bpf_ct_change_status. > > > > Right now they are only allowed in XDP and TC programs, so the tracing > > > > args part is not a problem _right now_. > > > > > > ... and it will be fine to use bpf_ct_change_timeout from tp_btf as well. > > > > > > > So currently it may not be possible to pass such a trusted but > > > > ref_obj_id == 0 nf_conn to those helpers. > > > > But based on changes unrelated to this, it may become possible in the > > > > future to obtain such a trusted nf_conn pointer. > > > > > > From kfunc's pov trusted pointer means valid pointer. > > > It doesn't need to be ref_obj_id refcounted from the verifier pov. > > > It can be refcounted on the kernel side and it will be trusted. > > > The code that calls trace_*() passes only trusted pointers into tp-s. > > > If there is a tracepoint somewhere in the kernel that uses a volatile > > > pointer to potentially uaf kernel object it's a bug that should be fixed. > > > > > > > This is all fine. I'm asking you to distinguish between > > trusted-not-refcounted and trusted-and-refcounted. > > That's not what you're asking :) > > > It is necessary for nf_conn, since the object can be reused if the > > refcount is not held. > > of course. No one argues the opposite. > > > Some other CPU could be reusing the same memory and allocating a new > > nf_conn on it while we change its status. > > So it's not ok to call bpf_ct_change_timeout/status on trusted > > nf_conn, but only on trusted+refcounted nf_conn. > > and here we start to disagree. > > > Trusted doesn't capture the difference between 'valid' vs 'valid and > > owned by prog' anymore with the new definition > > for PTR_TO_BTF_ID. > > and here we disagree completely. > You're asking to distinguish refcnt++ done by the program > and recognized by the verifier as ref_obj_id > 0 vs > refcnt++ done by the kernel code before it calls into tracepoint. > That's odd, right? > I don't think people adding kfuncs should care what piece > of code before kfunc did refcnt++. > I think we're talking past each other. Your point is that whenever PTR_TRUSTED is set (tracepoint args, etc.) the kernel itself should ensure it holds the refcount on behalf of the program. There shouldn't be a scenario where PTR_TRUSTED nf_conn is obtained and the program or the kernel isn't holding an active refcount during its use with helpers/kfuncs. I was not making that assumption, but it's not wrong. Which is why I wanted to limit their use to only when verifier is tracking a reference in the program for the nf_conn returned from an acquire kfunc. > > Yes, in most cases the tracepoints/tracing functions whitelisted will > > have the caller ensure that, > > but we should then allow trusted nf_conn in those hooks explicitly, > > not implicitly by default everywhere. > > Until then it should be restricted to ref_obj_id > 0 IMO as it is right now. > > > > > > It is a requirement of those kfuncs that the nf_conn has its refcount > > > > held while they are called. > > > > > > and it will be. Just not by the verifier. > > > > > > > KF_TRUSTED_ARGS was encoding this requirement before, but it wouldn't anymore. > > > > It seems better to me to keep that restriction instead of relaxing it, > > > > if it is part of the contract. > > > > > > Disagree as explained above. > > > > > > > It is fine to not require people to dive into these details and just > > > > use KF_TRUSTED_ARGS in general, but we need something to cover special > > > > cases like these where the object is only stable while we hold an > > > > active refcount, RCU protection is not enough against reuse. > > > > > > This is not related to RCU. Let's not mix RCU concerns in here. > > > It's a different topic. > > > > > > > What I meant is that in the normal case, usually objects aren't reused > > while the RCU read lock is held. > > In case of nf_conn, the refcount needs to be held to ensure that, > > since it uses SLAB_TYPESAFE_BY_RCU. > > This is why bpf_ct_lookup needs to bump the refcount and match the key > > after that again, and cannot just return the looked up ct directly. > > bpf_ct_lookup needs to bump a refcnt?! > bpf_skb_ct_lookup calls __bpf_nf_ct_lookup > that calls nf_conntrack_find_get() that does > the search and incs the refcnt in a generic kernel code. > There is nothing bpf specific stuff here. bpf kfunc didn't > add any special refcnt incs. > > There are no tracepoints in netfilter, so this discussion > is all theoretical, but if there was then the code > should have made sure that refcnt is held before > passing nf_conn into tracepoint. > Right, if so, it makes sense. Thanks for explaining. > > > > It could be 'expert only' __ref suffix on the nf_conn arg, or > > > > KF_OWNED_ARGS, or something else. > > > > > > I'm still against that. > > > > > > > I understand (and agree) that you don't want to complicate things further. > > It's fine if you want to deal with this later when the above concern > > materializes. But it will be yet another thing to keep in mind for the > > future. > > I don't share the concern. > With nf_conn there is none, right? > But imagine there is only RCU protected pointer that > is passed into tracepoint somewhere. > The verifier doesn't recognize refcnt++ on it and ref_obj_id == 0 > the kernel code doesn't do refcnt++ either. > But it's still safe and this arg should still be > PTR_TO_BTF_ID | PTR_TRUSTED. > The bpf prog can pass it further into kfunc that has KF_TRUSTED_ARGS. > Since RCU is held before calling into tracepoint the bpf prog > has to be non sleepable. Additional rcu_read_lock done by > the prog is redundant, but doesn't hurt. > When prog is calling kfunc the pointer is still valid and > kfunc can safely operate on it assuming that object is not going away. > That is the definition of KF_TRUSTED_ARGS from pov of kfunc. > You documented it yourself :) > " > The KF_TRUSTED_ARGS flag is used for kfuncs taking pointer arguments. It > indicates that the all pointer arguments will always have a guaranteed lifetime, > " So based on the above, verifier should only mark nf_conn as PTR_TRUSTED in cases where the kernel already holds the refcount on behalf of the program, otherwise for the non-PTR_TRUSTED case program must have ref_obj_id > 0? I.e. 'the guaranteed lifetime' for the nf_conn case also means the refcount is held in context where program can obtain PTR_TRUSTED nf_conn pointer. It will surely be true in the tracepoint case if there ever is one. Won't work easily for fentry/fexit but you already said that PTR_TRUSTED shouldn't be set in that case, atleast by default and without allowlisting those BTF IDs.