Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

bpf: Enforce expected_attach_type for tailcall compatibility

Yinhao et al. recently reported:

Our fuzzer tool discovered an uninitialized pointer issue in the
bpf_prog_test_run_xdp() function within the Linux kernel's BPF subsystem.
This leads to a NULL pointer dereference when a BPF program attempts to
deference the txq member of struct xdp_buff object.

The test initializes two programs of BPF_PROG_TYPE_XDP: progA acts as the
entry point for bpf_prog_test_run_xdp() and its expected_attach_type can
neither be of be BPF_XDP_DEVMAP nor BPF_XDP_CPUMAP. progA calls into a slot
of a tailcall map it owns. progB's expected_attach_type must be BPF_XDP_DEVMAP
to pass xdp_is_valid_access() validation. The program returns struct xdp_md's
egress_ifindex, and the latter is only allowed to be accessed under mentioned
expected_attach_type. progB is then inserted into the tailcall which progA
calls.

The underlying issue goes beyond XDP though. Another example are programs
of type BPF_PROG_TYPE_CGROUP_SOCK_ADDR. sock_addr_is_valid_access() as well
as sock_addr_func_proto() have different logic depending on the programs'
expected_attach_type. Similarly, a program attached to BPF_CGROUP_INET4_GETPEERNAME
should not be allowed doing a tailcall into a program which calls bpf_bind()
out of BPF which is only enabled for BPF_CGROUP_INET4_CONNECT.

In short, specifying expected_attach_type allows to open up additional
functionality or restrictions beyond what the basic bpf_prog_type enables.
The use of tailcalls must not violate these constraints. Fix it by enforcing
expected_attach_type in __bpf_prog_map_compatible().

Note that we only enforce this for tailcall maps, but not for BPF devmaps or
cpumaps: There, the programs are invoked through dev_map_bpf_prog_run*() and
cpu_map_bpf_prog_run*() which set up a new environment / context and therefore
these situations are not prone to this issue.

Fixes: 5e43f899b03a ("bpf: Check attach type at prog load time")
Reported-by: Yinhao Hu <dddddd@hust.edu.cn>
Reported-by: Kaiyan Mei <M202472210@hust.edu.cn>
Reviewed-by: Dongliang Mu <dzm91@hust.edu.cn>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/r/20250926171201.188490-1-daniel@iogearbox.net
Signed-off-by: Alexei Starovoitov <ast@kernel.org>

authored by

Daniel Borkmann and committed by
Alexei Starovoitov
4540aed5 4b211341

+6
+1
include/linux/bpf.h
··· 289 289 bool xdp_has_frags; 290 290 u64 storage_cookie[MAX_BPF_CGROUP_STORAGE_TYPE]; 291 291 const struct btf_type *attach_func_proto; 292 + enum bpf_attach_type expected_attach_type; 292 293 }; 293 294 294 295 struct bpf_map {
+5
kernel/bpf/core.c
··· 2361 2361 map->owner->type = prog_type; 2362 2362 map->owner->jited = fp->jited; 2363 2363 map->owner->xdp_has_frags = aux->xdp_has_frags; 2364 + map->owner->expected_attach_type = fp->expected_attach_type; 2364 2365 map->owner->attach_func_proto = aux->attach_func_proto; 2365 2366 for_each_cgroup_storage_type(i) { 2366 2367 map->owner->storage_cookie[i] = ··· 2373 2372 ret = map->owner->type == prog_type && 2374 2373 map->owner->jited == fp->jited && 2375 2374 map->owner->xdp_has_frags == aux->xdp_has_frags; 2375 + if (ret && 2376 + map->map_type == BPF_MAP_TYPE_PROG_ARRAY && 2377 + map->owner->expected_attach_type != fp->expected_attach_type) 2378 + ret = false; 2376 2379 for_each_cgroup_storage_type(i) { 2377 2380 if (!ret) 2378 2381 break;