Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

bpf: Replace bpf_lpm_trie_key 0-length array with flexible array

Replace deprecated 0-length array in struct bpf_lpm_trie_key with
flexible array. Found with GCC 13:

../kernel/bpf/lpm_trie.c:207:51: warning: array subscript i is outside array bounds of 'const __u8[0]' {aka 'const unsigned char[]'} [-Warray-bounds=]
207 | *(__be16 *)&key->data[i]);
| ^~~~~~~~~~~~~
../include/uapi/linux/swab.h:102:54: note: in definition of macro '__swab16'
102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
| ^
../include/linux/byteorder/generic.h:97:21: note: in expansion of macro '__be16_to_cpu'
97 | #define be16_to_cpu __be16_to_cpu
| ^~~~~~~~~~~~~
../kernel/bpf/lpm_trie.c:206:28: note: in expansion of macro 'be16_to_cpu'
206 | u16 diff = be16_to_cpu(*(__be16 *)&node->data[i]
^
| ^~~~~~~~~~~
In file included from ../include/linux/bpf.h:7:
../include/uapi/linux/bpf.h:82:17: note: while referencing 'data'
82 | __u8 data[0]; /* Arbitrary size */
| ^~~~

And found at run-time under CONFIG_FORTIFY_SOURCE:

UBSAN: array-index-out-of-bounds in kernel/bpf/lpm_trie.c:218:49
index 0 is out of range for type '__u8 [*]'

Changing struct bpf_lpm_trie_key is difficult since has been used by
userspace. For example, in Cilium:

struct egress_gw_policy_key {
struct bpf_lpm_trie_key lpm_key;
__u32 saddr;
__u32 daddr;
};

While direct references to the "data" member haven't been found, there
are static initializers what include the final member. For example,
the "{}" here:

struct egress_gw_policy_key in_key = {
.lpm_key = { 32 + 24, {} },
.saddr = CLIENT_IP,
.daddr = EXTERNAL_SVC_IP & 0Xffffff,
};

To avoid the build time and run time warnings seen with a 0-sized
trailing array for struct bpf_lpm_trie_key, introduce a new struct
that correctly uses a flexible array for the trailing bytes,
struct bpf_lpm_trie_key_u8. As part of this, include the "header"
portion (which is just the "prefixlen" member), so it can be used
by anything building a bpf_lpr_trie_key that has trailing members that
aren't a u8 flexible array (like the self-test[1]), which is named
struct bpf_lpm_trie_key_hdr.

Unfortunately, C++ refuses to parse the __struct_group() helper, so
it is not possible to define struct bpf_lpm_trie_key_hdr directly in
struct bpf_lpm_trie_key_u8, so we must open-code the union directly.

Adjust the kernel code to use struct bpf_lpm_trie_key_u8 through-out,
and for the selftest to use struct bpf_lpm_trie_key_hdr. Add a comment
to the UAPI header directing folks to the two new options.

Reported-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Closes: https://paste.debian.net/hidden/ca500597/
Link: https://lore.kernel.org/all/202206281009.4332AA33@keescook/ [1]
Link: https://lore.kernel.org/bpf/20240222155612.it.533-kees@kernel.org

authored by

Kees Cook and committed by
Daniel Borkmann
896880ff b9a62998

+59 -25
+1 -1
Documentation/bpf/map_lpm_trie.rst
··· 17 17 18 18 LPM tries may be created with a maximum prefix length that is a multiple 19 19 of 8, in the range from 8 to 2048. The key used for lookup and update 20 - operations is a ``struct bpf_lpm_trie_key``, extended by 20 + operations is a ``struct bpf_lpm_trie_key_u8``, extended by 21 21 ``max_prefixlen/8`` bytes. 22 22 23 23 - For IPv4 addresses the data length is 4 bytes
+18 -1
include/uapi/linux/bpf.h
··· 77 77 __s32 imm; /* signed immediate constant */ 78 78 }; 79 79 80 - /* Key of an a BPF_MAP_TYPE_LPM_TRIE entry */ 80 + /* Deprecated: use struct bpf_lpm_trie_key_u8 (when the "data" member is needed for 81 + * byte access) or struct bpf_lpm_trie_key_hdr (when using an alternative type for 82 + * the trailing flexible array member) instead. 83 + */ 81 84 struct bpf_lpm_trie_key { 82 85 __u32 prefixlen; /* up to 32 for AF_INET, 128 for AF_INET6 */ 83 86 __u8 data[0]; /* Arbitrary size */ 87 + }; 88 + 89 + /* Header for bpf_lpm_trie_key structs */ 90 + struct bpf_lpm_trie_key_hdr { 91 + __u32 prefixlen; 92 + }; 93 + 94 + /* Key of an a BPF_MAP_TYPE_LPM_TRIE entry, with trailing byte array. */ 95 + struct bpf_lpm_trie_key_u8 { 96 + union { 97 + struct bpf_lpm_trie_key_hdr hdr; 98 + __u32 prefixlen; 99 + }; 100 + __u8 data[]; /* Arbitrary size */ 84 101 }; 85 102 86 103 struct bpf_cgroup_storage_key {
+10 -10
kernel/bpf/lpm_trie.c
··· 164 164 */ 165 165 static size_t longest_prefix_match(const struct lpm_trie *trie, 166 166 const struct lpm_trie_node *node, 167 - const struct bpf_lpm_trie_key *key) 167 + const struct bpf_lpm_trie_key_u8 *key) 168 168 { 169 169 u32 limit = min(node->prefixlen, key->prefixlen); 170 170 u32 prefixlen = 0, i = 0; 171 171 172 172 BUILD_BUG_ON(offsetof(struct lpm_trie_node, data) % sizeof(u32)); 173 - BUILD_BUG_ON(offsetof(struct bpf_lpm_trie_key, data) % sizeof(u32)); 173 + BUILD_BUG_ON(offsetof(struct bpf_lpm_trie_key_u8, data) % sizeof(u32)); 174 174 175 175 #if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) && defined(CONFIG_64BIT) 176 176 ··· 229 229 { 230 230 struct lpm_trie *trie = container_of(map, struct lpm_trie, map); 231 231 struct lpm_trie_node *node, *found = NULL; 232 - struct bpf_lpm_trie_key *key = _key; 232 + struct bpf_lpm_trie_key_u8 *key = _key; 233 233 234 234 if (key->prefixlen > trie->max_prefixlen) 235 235 return NULL; ··· 309 309 struct lpm_trie *trie = container_of(map, struct lpm_trie, map); 310 310 struct lpm_trie_node *node, *im_node = NULL, *new_node = NULL; 311 311 struct lpm_trie_node __rcu **slot; 312 - struct bpf_lpm_trie_key *key = _key; 312 + struct bpf_lpm_trie_key_u8 *key = _key; 313 313 unsigned long irq_flags; 314 314 unsigned int next_bit; 315 315 size_t matchlen = 0; ··· 437 437 static long trie_delete_elem(struct bpf_map *map, void *_key) 438 438 { 439 439 struct lpm_trie *trie = container_of(map, struct lpm_trie, map); 440 - struct bpf_lpm_trie_key *key = _key; 440 + struct bpf_lpm_trie_key_u8 *key = _key; 441 441 struct lpm_trie_node __rcu **trim, **trim2; 442 442 struct lpm_trie_node *node, *parent; 443 443 unsigned long irq_flags; ··· 536 536 sizeof(struct lpm_trie_node)) 537 537 #define LPM_VAL_SIZE_MIN 1 538 538 539 - #define LPM_KEY_SIZE(X) (sizeof(struct bpf_lpm_trie_key) + (X)) 539 + #define LPM_KEY_SIZE(X) (sizeof(struct bpf_lpm_trie_key_u8) + (X)) 540 540 #define LPM_KEY_SIZE_MAX LPM_KEY_SIZE(LPM_DATA_SIZE_MAX) 541 541 #define LPM_KEY_SIZE_MIN LPM_KEY_SIZE(LPM_DATA_SIZE_MIN) 542 542 ··· 565 565 /* copy mandatory map attributes */ 566 566 bpf_map_init_from_attr(&trie->map, attr); 567 567 trie->data_size = attr->key_size - 568 - offsetof(struct bpf_lpm_trie_key, data); 568 + offsetof(struct bpf_lpm_trie_key_u8, data); 569 569 trie->max_prefixlen = trie->data_size * 8; 570 570 571 571 spin_lock_init(&trie->lock); ··· 616 616 { 617 617 struct lpm_trie_node *node, *next_node = NULL, *parent, *search_root; 618 618 struct lpm_trie *trie = container_of(map, struct lpm_trie, map); 619 - struct bpf_lpm_trie_key *key = _key, *next_key = _next_key; 619 + struct bpf_lpm_trie_key_u8 *key = _key, *next_key = _next_key; 620 620 struct lpm_trie_node **node_stack = NULL; 621 621 int err = 0, stack_ptr = -1; 622 622 unsigned int next_bit; ··· 703 703 } 704 704 do_copy: 705 705 next_key->prefixlen = next_node->prefixlen; 706 - memcpy((void *)next_key + offsetof(struct bpf_lpm_trie_key, data), 706 + memcpy((void *)next_key + offsetof(struct bpf_lpm_trie_key_u8, data), 707 707 next_node->data, trie->data_size); 708 708 free_stack: 709 709 kfree(node_stack); ··· 715 715 const struct btf_type *key_type, 716 716 const struct btf_type *value_type) 717 717 { 718 - /* Keys must have struct bpf_lpm_trie_key embedded. */ 718 + /* Keys must have struct bpf_lpm_trie_key_u8 embedded. */ 719 719 return BTF_INFO_KIND(key_type->info) != BTF_KIND_STRUCT ? 720 720 -EINVAL : 0; 721 721 }
+1 -1
samples/bpf/map_perf_test_user.c
··· 370 370 371 371 static void fill_lpm_trie(void) 372 372 { 373 - struct bpf_lpm_trie_key *key; 373 + struct bpf_lpm_trie_key_u8 *key; 374 374 unsigned long value = 0; 375 375 unsigned int i; 376 376 int r;
+1 -1
samples/bpf/xdp_router_ipv4_user.c
··· 91 91 static void read_route(struct nlmsghdr *nh, int nll) 92 92 { 93 93 char dsts[24], gws[24], ifs[16], dsts_len[24], metrics[24]; 94 - struct bpf_lpm_trie_key *prefix_key; 94 + struct bpf_lpm_trie_key_u8 *prefix_key; 95 95 struct rtattr *rt_attr; 96 96 struct rtmsg *rt_msg; 97 97 int rtm_family;
+18 -1
tools/include/uapi/linux/bpf.h
··· 77 77 __s32 imm; /* signed immediate constant */ 78 78 }; 79 79 80 - /* Key of an a BPF_MAP_TYPE_LPM_TRIE entry */ 80 + /* Deprecated: use struct bpf_lpm_trie_key_u8 (when the "data" member is needed for 81 + * byte access) or struct bpf_lpm_trie_key_hdr (when using an alternative type for 82 + * the trailing flexible array member) instead. 83 + */ 81 84 struct bpf_lpm_trie_key { 82 85 __u32 prefixlen; /* up to 32 for AF_INET, 128 for AF_INET6 */ 83 86 __u8 data[0]; /* Arbitrary size */ 87 + }; 88 + 89 + /* Header for bpf_lpm_trie_key structs */ 90 + struct bpf_lpm_trie_key_hdr { 91 + __u32 prefixlen; 92 + }; 93 + 94 + /* Key of an a BPF_MAP_TYPE_LPM_TRIE entry, with trailing byte array. */ 95 + struct bpf_lpm_trie_key_u8 { 96 + union { 97 + struct bpf_lpm_trie_key_hdr hdr; 98 + __u32 prefixlen; 99 + }; 100 + __u8 data[]; /* Arbitrary size */ 84 101 }; 85 102 86 103 struct bpf_cgroup_storage_key {
+1 -1
tools/testing/selftests/bpf/progs/map_ptr_kern.c
··· 316 316 } __attribute__((preserve_access_index)); 317 317 318 318 struct lpm_key { 319 - struct bpf_lpm_trie_key trie_key; 319 + struct bpf_lpm_trie_key_hdr trie_key; 320 320 __u32 data; 321 321 }; 322 322
+9 -9
tools/testing/selftests/bpf/test_lpm_map.c
··· 211 211 volatile size_t n_matches, n_matches_after_delete; 212 212 size_t i, j, n_nodes, n_lookups; 213 213 struct tlpm_node *t, *list = NULL; 214 - struct bpf_lpm_trie_key *key; 214 + struct bpf_lpm_trie_key_u8 *key; 215 215 uint8_t *data, *value; 216 216 int r, map; 217 217 ··· 331 331 static void test_lpm_ipaddr(void) 332 332 { 333 333 LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_NO_PREALLOC); 334 - struct bpf_lpm_trie_key *key_ipv4; 335 - struct bpf_lpm_trie_key *key_ipv6; 334 + struct bpf_lpm_trie_key_u8 *key_ipv4; 335 + struct bpf_lpm_trie_key_u8 *key_ipv6; 336 336 size_t key_size_ipv4; 337 337 size_t key_size_ipv6; 338 338 int map_fd_ipv4; ··· 423 423 static void test_lpm_delete(void) 424 424 { 425 425 LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_NO_PREALLOC); 426 - struct bpf_lpm_trie_key *key; 426 + struct bpf_lpm_trie_key_u8 *key; 427 427 size_t key_size; 428 428 int map_fd; 429 429 __u64 value; ··· 532 532 static void test_lpm_get_next_key(void) 533 533 { 534 534 LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_NO_PREALLOC); 535 - struct bpf_lpm_trie_key *key_p, *next_key_p; 535 + struct bpf_lpm_trie_key_u8 *key_p, *next_key_p; 536 536 size_t key_size; 537 537 __u32 value = 0; 538 538 int map_fd; ··· 693 693 { 694 694 int i, j, ret, iter, key_size; 695 695 struct lpm_mt_test_info *info = arg; 696 - struct bpf_lpm_trie_key *key_p; 696 + struct bpf_lpm_trie_key_u8 *key_p; 697 697 698 - key_size = sizeof(struct bpf_lpm_trie_key) + sizeof(__u32); 698 + key_size = sizeof(*key_p) + sizeof(__u32); 699 699 key_p = alloca(key_size); 700 700 for (iter = 0; iter < info->iter; iter++) 701 701 for (i = 0; i < MAX_TEST_KEYS; i++) { ··· 717 717 ret = bpf_map_lookup_elem(info->map_fd, key_p, &value); 718 718 assert(ret == 0 || errno == ENOENT); 719 719 } else { 720 - struct bpf_lpm_trie_key *next_key_p = alloca(key_size); 720 + struct bpf_lpm_trie_key_u8 *next_key_p = alloca(key_size); 721 721 ret = bpf_map_get_next_key(info->map_fd, key_p, next_key_p); 722 722 assert(ret == 0 || errno == ENOENT || errno == ENOMEM); 723 723 } ··· 752 752 753 753 /* create a trie */ 754 754 value_size = sizeof(__u32); 755 - key_size = sizeof(struct bpf_lpm_trie_key) + value_size; 755 + key_size = sizeof(struct bpf_lpm_trie_key_hdr) + value_size; 756 756 map_fd = bpf_map_create(BPF_MAP_TYPE_LPM_TRIE, NULL, key_size, value_size, 100, &opts); 757 757 758 758 /* create 4 threads to test update, delete, lookup and get_next_key */