@@ -2796,22 +2796,28 @@ static void mark_reg_not_init(struct bpf_verifier_env *env,
2796
2796
__mark_reg_not_init(env, regs + regno);
2797
2797
}
2798
2798
2799
- static void mark_btf_ld_reg(struct bpf_verifier_env *env,
2800
- struct bpf_reg_state *regs, u32 regno,
2801
- enum bpf_reg_type reg_type,
2802
- struct btf *btf, u32 btf_id,
2803
- enum bpf_type_flag flag)
2799
+ static int mark_btf_ld_reg(struct bpf_verifier_env *env,
2800
+ struct bpf_reg_state *regs, u32 regno,
2801
+ enum bpf_reg_type reg_type,
2802
+ struct btf *btf, u32 btf_id,
2803
+ enum bpf_type_flag flag)
2804
2804
{
2805
- if (reg_type == SCALAR_VALUE) {
2805
+ switch (reg_type) {
2806
+ case SCALAR_VALUE:
2806
2807
mark_reg_unknown(env, regs, regno);
2807
- return;
2808
+ return 0;
2809
+ case PTR_TO_BTF_ID:
2810
+ mark_reg_known_zero(env, regs, regno);
2811
+ regs[regno].type = PTR_TO_BTF_ID | flag;
2812
+ regs[regno].btf = btf;
2813
+ regs[regno].btf_id = btf_id;
2814
+ if (type_may_be_null(flag))
2815
+ regs[regno].id = ++env->id_gen;
2816
+ return 0;
2817
+ default:
2818
+ verifier_bug(env, "unexpected reg_type %d in %s\n", reg_type, __func__);
2819
+ return -EFAULT;
2808
2820
}
2809
- mark_reg_known_zero(env, regs, regno);
2810
- regs[regno].type = PTR_TO_BTF_ID | flag;
2811
- regs[regno].btf = btf;
2812
- regs[regno].btf_id = btf_id;
2813
- if (type_may_be_null(flag))
2814
- regs[regno].id = ++env->id_gen;
2815
2821
}
2816
2822
2817
2823
#define DEF_NOT_SUBREG (0)
@@ -5965,6 +5971,7 @@ static int check_map_kptr_access(struct bpf_verifier_env *env, u32 regno,
5965
5971
struct bpf_insn *insn = &env->prog->insnsi[insn_idx];
5966
5972
int class = BPF_CLASS(insn->code);
5967
5973
struct bpf_reg_state *val_reg;
5974
+ int ret;
5968
5975
5969
5976
/* Things we already checked for in check_map_access and caller:
5970
5977
* - Reject cases where variable offset may touch kptr
@@ -5998,8 +6005,11 @@ static int check_map_kptr_access(struct bpf_verifier_env *env, u32 regno,
5998
6005
/* We can simply mark the value_regno receiving the pointer
5999
6006
* value from map as PTR_TO_BTF_ID, with the correct type.
6000
6007
*/
6001
- mark_btf_ld_reg(env, cur_regs(env), value_regno, PTR_TO_BTF_ID, kptr_field->kptr.btf,
6002
- kptr_field->kptr.btf_id, btf_ld_kptr_type(env, kptr_field));
6008
+ ret = mark_btf_ld_reg(env, cur_regs(env), value_regno, PTR_TO_BTF_ID,
6009
+ kptr_field->kptr.btf, kptr_field->kptr.btf_id,
6010
+ btf_ld_kptr_type(env, kptr_field));
6011
+ if (ret < 0)
6012
+ return ret;
6003
6013
} else if (class == BPF_STX) {
6004
6014
val_reg = reg_state(env, value_regno);
6005
6015
if (!register_is_null(val_reg) &&
@@ -7298,8 +7308,11 @@ static int check_ptr_to_btf_access(struct bpf_verifier_env *env,
7298
7308
clear_trusted_flags(&flag);
7299
7309
}
7300
7310
7301
- if (atype == BPF_READ && value_regno >= 0)
7302
- mark_btf_ld_reg(env, regs, value_regno, ret, reg->btf, btf_id, flag);
7311
+ if (atype == BPF_READ && value_regno >= 0) {
7312
+ ret = mark_btf_ld_reg(env, regs, value_regno, ret, reg->btf, btf_id, flag);
7313
+ if (ret < 0)
7314
+ return ret;
7315
+ }
7303
7316
7304
7317
return 0;
7305
7318
}
@@ -7353,13 +7366,19 @@ static int check_ptr_to_map_access(struct bpf_verifier_env *env,
7353
7366
7354
7367
/* Simulate access to a PTR_TO_BTF_ID */
7355
7368
memset(&map_reg, 0, sizeof(map_reg));
7356
- mark_btf_ld_reg(env, &map_reg, 0, PTR_TO_BTF_ID, btf_vmlinux, *map->ops->map_btf_id, 0);
7369
+ ret = mark_btf_ld_reg(env, &map_reg, 0, PTR_TO_BTF_ID,
7370
+ btf_vmlinux, *map->ops->map_btf_id, 0);
7371
+ if (ret < 0)
7372
+ return ret;
7357
7373
ret = btf_struct_access(&env->log, &map_reg, off, size, atype, &btf_id, &flag, NULL);
7358
7374
if (ret < 0)
7359
7375
return ret;
7360
7376
7361
- if (value_regno >= 0)
7362
- mark_btf_ld_reg(env, regs, value_regno, ret, btf_vmlinux, btf_id, flag);
7377
+ if (value_regno >= 0) {
7378
+ ret = mark_btf_ld_reg(env, regs, value_regno, ret, btf_vmlinux, btf_id, flag);
7379
+ if (ret < 0)
7380
+ return ret;
7381
+ }
7363
7382
7364
7383
return 0;
7365
7384
}
0 commit comments